Security, Performance, And Reliability – All In One Package
Free
From
$0/month
For personal or hobby projects that aren’t business critical.
- Unlimited Website Delivery & DDoS Protection Traffic
- Standard Bot Manager
- Encrypt TLS Certificates
- Managed Security Ruleset
- 28 DAYS Real User Monitoring (RUM)
Professional
For personal or hobby projects that aren’t business critical.
- Unlimited Website Delivery & DDoS Protection Traffic
- Standard Bot Manager
- Encrypt TLS Certificates
- Security Audit Control
- Emergency Escalations
- 60 DAYS Real User Monitoring (RUM)
Enterprise
For personal or hobby projects that aren’t business critical.
- Unlimited Website Delivery & DDoS Protection Traffic
- Advanced Bot Manager
- DV/OV/EV Wildcard-SAN
- Crisis Bridge Support
- API Security
- 180 DAYS Real User Monitoring (RUM)
Premier
For personal or hobby projects that aren’t business critical.
- Unlimited Website Delivery & DDoS Protection Traffic
- Security Audit Control
- DV/OV/EV Wildcard-SAN
- TLS Fingerprinting
- Dedicated Virtual Patch Support
- 365 DAYS Real User Monitoring (RUM)
Compare Features
Basic Features
Free
Professional
Enterprise
Premier
Platform Features
Support unmetered delivery of all in-scope application traffic as well as unmetered DDoS protection of all application traffic through Edgio Application Platform.
- Unlimited
- Unlimited
- Unlimited
- Unlimited
Support managing application configuration via the use of RESTful API, Command Line Interface (CLI), and Configuration as Code (Edge JS). Integrates management of services with a variety of developer and operation workflows.
Support restricting system access based on predefined roles and permissions. Users are assigned roles, and each role has specific access rights to resources, ensuring they can only perform authorized actions.
The authoritative DNS is the source of truth for a domain’s DNS records and is the final holder of the domain’s IP address and other DNS records like A, MX and CNAME records. The authoritative DNS is responsible for answering DNS queries with the most accurate data.
Support access to Edgio’s PCI DSS Level 1 compliant network footprints.
To include a Platform Uptime Service Level Agreement (SLA) availability and operational continuity for the platform. More info about Platform Uptime SLA can be found in the Service Supplement in the service order form.
Supports setting up SSO with identity provider using SAML to allow login using the credentials stored in customer’s organization’s SAML Identity Provider (IDP).
Support deploying TLS certificates as well as serving customer content from dedicated IP groups for customer applications. Note: While the IP groups are dedicated to a specific customer’s content, the IP addresses are not intended to be static and are subject to change without notice.
Origin Shield establishes an additional layer of proxy servers in a tiered-distribution architecture to increase cache hit ratio and reduce the number of connections from proxy server to origin.
- 1
- 2
- 4
Each property can have multiple environments which contain app configurations i.e. caching rules.
- 1
- 3
- 10
- 100
X.509 certificates that facilitate delivering content via Transport Layer Security (Protocol). It uses public key cryptography to encrypt communications between clients and servers.
- Let’s Encrypt
- Let’s Encrypt
-
DV/OV/EV
Wildcard-SAN -
DV/OV/EV
Wildcard-SAN
Security Features
Feature to protect your website & application
Protection from Layer 3, 4 and 7 (network, transport and application/HTTP) distributed denial of service attacks.
- Unlimited
- Unlimited
- Unlimited
- Unlimited
Ability to create access rules that identify valid or malicious requests via allowlists, accesslists, and blocklists.
Protection from web application and API threats with rulesets automatically maintained and updated by Edgio’s security team.
Offer the ability to analyze rule changes against production traffic without disabling production WAAP rules or affecting legitimate users. Dual WAAP enables faster, more accurate deployment of custom security rules.
Ability to log policy configuration changes and save version histories for policies across applications and domains.
The ability to create custom rules matching on request metadata attributes including URL, request headers/body, cookies and more. This feature allows customers to quickly address any threat, including zero-days.
Manage up to 10,000 IP addresses or IP blocks per access rule for access lists, allowlists, and blocklists (standard is up to 1,000 per access rule).
API Security provides protection for APIs, using machine learning (ML) to detect APIs while allowing you to manage multiple JSON schemas. API Security also allows you to enforce a positive security model, blocking all requests that do not adhere to the schema, and provides safeguards against sensitive data & code leaks, plus L7 (HTTP/S) DDoS attacks
Additional client identification and tracking using information from the TLS protocol, to more accurately determine whether a request is legitimate or fraudulent.
Flexible mitigation options for protection against automated threats with response options including CAPCHAs, silent drops, or the ability to serve a Base64-encoded HTML page while Edgio evaluates whether a client request is legitimate.
Secure your web forms and APIs against programmatic attacks. With Bot Manager Standard, Edgio’s high performance bot rules use browser validation to detect malicious automated traffic and prevent it from reaching your web application.
Advanced Bot Management applies machine learning (ML) on top of signature and behavioral fingerprints to detect and mitigate malicious bots while allowing known good bots to do their job.
- Standard
- Standard
- Advanced
- Advanced
Performance Features
Features to drive performance of your properties
Application Rules determine how requests for a specific environment will be processed.
CDN-as-code allows you to configure CDN behavior using EdgeJS within a file.
Image Optimization dynamically transforms your images to tailor them to your site and optimize their size.
Purge cached content to force the CDN to request a new version of that content from an origin server or Cloud Functions.
Edgio allows you to speed up the user’s browsing experience by prefetching pages and API calls that they are likely to need.
Edge server compression occurs when an edge server compresses cached content and provides this compressed response to the client.
Purge cached content by surrogate key (aka cache tag). A surrogate key is a label that you may apply to cached responses. Purging by surrogate key allows you to purge related content across your entire site.
WebSocket is a bidirectional communication protocol that can send the data from the client to the server or from the server to the client by reusing the established connection channel.
Traffic & Feature Management Features
Features to test and experiment with variations of your website
Progressive rollout of an application that splits traffic between an already-deployed version and a new version, rolling it out to a subset of users before rolling out fully
Allows site administrators to enable or disable a feature without modifying the source code or requiring a redeploy.
Experiment where two or more variants of a page (or multiple pages) are shown to users at random in order to determine which variation performs better for a given conversion goal.
Incrementally migrate from a website a page or section at a time for the purpose of redesigning or replatforming a site.
Configuring a domain in the Domain Name System (DNS) such that client requests to the domain are distributed across a group of servers.
Edgio Experimentation rules (Experiments) enable the distribution of site traffic among alternative origins or site variations for purposes that include iterative site migrations, canary deploys, and A/B testing with options to maintain caching and user session consistency.
- 1
- 10
- 20
- Unlimited
Edge Compute and Development Platform
Features to build or augment your websites, apps and APIs on the Edge and the Cloud
Pre-built integrations for frontend frameworks.
Edge Functions enable you to execute a small piece of JavaScript code on our edge servers.
- 5 million
- 50 million
- 100 million
- 200 million
Develop, test, and deploy JavaScript Cloud Functions.
- 100
- 1,000
- 2,000
- 3,000
Deployments are versioned. Each deployment is assigned a unique version number. This allows you to preview or quickly roll back to any change.
- 100
- 1,000
- 2,000
- 3,000
Observability Features
Observability Features
Real-Time Log Delivery (RTLD) delivers log data in near real-time to a variety of destinations.
Delivers Security log data via API calls.
Near real-time and comprehensive reporting for security events.
- 7 Days
- 30 Days
- 60 Days
- 60 Days
Use Edge Insights to gain historical and near real-time insights into threat profiles, performance, and CDN usage.
-
7 Days w/ 6hrs
Full Sampling -
30 Days w/ 12hrs
Full Sampling -
30 days w/ 24hrs
Full Sampling
Our real user monitoring (RUM) library allows real-time tracking of your websites Core Web Vitals for Chromium-based browsers and Firefox.
Managed Security Services (SOC) Features
Managed Security Services (SOC) Features
Edgio’s Threat Intelligence team continuously monitors evolving security trends and attack techniques to tailor intelligence-driven rule and signature updates for our customers’. Through analysis of traffic on Edgio’s platform, combined with scanning of sources including forums, code repositories, and social media, Edgio identifies emerging threats and applies this intelligence within our managed ruleset across all customers, as well as specifically tailored rules for specific customers with very unique needs.
Edgio’s Managed WAF (Web Application Firewall) service provides 24/7 monitoring and management of your Web Application Firewall. As part of this service, our experts will tailor the deployment and configuration of Edgio WAF to your tech stack. By tuning rules to current traffic patterns and threats, we will maximize the performance and security afforded by Edgio WAF. We leverage our security expertise and Threat Intelligence service to create policies, signatures, and rules that protect your web assets against OWASP Top 10 risks including injection attacks, cross-site scripting, broken authentication, and more. Included in the Managed WAF service is ongoing tuning which helps to ensure we block the latest threats while ensuring site availability by minimizing false positives.
Edgio’s 24/7 Monitoring and Response service provides continuous protection through our Security Operations Center (SOC), staffed by Security Analysts around the clock who are constantly analyzing events and anomalous activity identified across the Edgio platform. The SOC uses both manual and automated techniques to detect anomalous behavior, and leverage information provided by Edgio’s Threat Intelligence service. When the SOC identifies a potential threat or incident, the team initiates a response based on predefined playbooks coupled with your custom preferences.
The SOC can contain attacks through the Edgio platform by way of request rewrites and redirects, access control lists, rate limiting, bot management techniques, and more. The SOC will provide ongoing status and recommendations in response to detected attacks and the subsequent implementation of mitigation efforts.to attacks.
The Security Operations Center (SOC) follows a set of custom run books that define the operating procedures for responding to a customer’s threats. Run books are crafted to align seamlessly to each customer’s security needs. The run-book defines rules of engagement specifying customer points of contact, Edgio points of contact, threat severity identification, escalation procedures, and more. Defined run books allow the SOC to respond both efficiently and consistently, facilitating swift resolution during any engagement.
The Security Operations Center (SOC) is available 24/7/365 to respond to any customer inquiries or issues, regardless of how the incidents are created. Edgio’s commitment to customer success ensures inquiries are addressed promptly maintaining the integrity of your security posture. Based on custom runbooks the SOC can suggest rule changes or process the changes with approval based on the request.
- ≤ 30 minutes
- ≤ 15 minutes
- ≤ 10 minutes
Enterprise and Premier level customers receive the added benefit of a named / assigned security architect to collaborate with in enhancing their web application / API security posture. The dedicated Security Architect is a seasoned expert acting as an extension of the customer’s IT team, committed to working hand in hand with stakeholders to fortify their web applications against potential threats. This partnership is designed to provide personalized insights, strategic guidance, and proactive measures tailored to specific security needs.
Enterprise and Premier level customers can gain meaningful insights into their security posture with Advanced Reporting, which provides both an overview of the customer’s overall level of security, as well as specific recommendations for addressing any deficiencies. Customers can choose to receive scheduled reports on a weekly or monthly basis, for a consistent and comprehensive overview of their security posture. Customers can also request onetime ad-hoc reports for DDoS events, which will give them a comprehensive understanding of these critical occurrences and enable them to make informed decisions about how to optimize their security posture.
Edgio provides comprehensive services to constantly enhance a robust security posture, including a scheduled monthly review and strategy session led by a designated security architect. This session serves as a point-in-time analysis to assess the current state of affairs and strategic planning for the upcoming month based on expected events, projects, and specific customer needs. The monthly review can include: (1) an examination of potential security gaps based on the customer’s current security configuration, including recommendations to address unprotected assets and strategies to prevent direct to origin attacks, 2) a holistic analysis of current security controls in place to ensure adequate Layer 7 DDoS protections are in place 3) a comprehensive review of active WAAP rulesets to ensure they are current and finetuned to optimal thresholds, minimizing false-positives while maximizing protection from threats, (4) an evaluation of audit policies with recommendations to enhance security posture, and (5) a report on attacks mitigated in the past 30 days, aiding customers in understanding and mitigating the threats they face.
With Dedicated Threat Hunting, Enterprise and Premier customers will get ahead of the curve for protection from zeroday vulnerabilities through rapid deployment of mitigating rules, before those updates are available for GA. The Security Architect assigned to the customer will: (1) Determine if the disclosed vulnerabilities are relevant to the customer’s web properties. (2) Use the suite of WAF tools to mitigate vulnerabilities (custom rules, access rules, rate rules, and bot detection). (3) Identify encoding obfuscation attacks that are specific to the customer’s properties and suggest custom rules to mitigate such attacks.
Custom Reporting refers to the ability to define the WAAP activity reports that cannot be generated with UI features or cannot be covered by readily available Advanced Reports. Custom reporting can include report that cover multiple properties (all, or specific subset of properties), specific WAAP actions (e.g. Alerts and 403 Block), most abusing clients (by IP, ASN, UA, JA3 hash, bot type, etc.), top attack methods, top targeted URLs, and more. Custom reports will be generated by the security architect assigned to the customer on the monthly basis and delivered via email with the option to meet with the customer to discuss the report in detail.
Edgio s Rule and Policy Assessment is an ad-hoc review conducted outside the regular monthly security posture review, initiated either at a customers request or when our Security Operations Center (SOC) identifies anomalies. This service is particularly beneficial ahead of significant events or when abnormal behavior is detected in your Web Application Firewall (WAF) configurations. During the assessment, Edgio experts meticulously review WAF configurations, policies, and audit records to spot coverage gaps, outdated rules, and opportunities for performance tuning, ensuring alignment with best practices like the OWASP Core Rule Set. The team provides actionable recommendations, including rule revisions, updated allow/deny lists, and new policy sets, all aimed at ensuring consistent and enhanced security.
Dedicated Virtual Patch Support includes custom written WAF signatures to protect application specific vulnerabilities not covered by current Edgio rulesets. This would apply for any zero-day protections outside of publicly disclosed CVEs.
These are on-demand in nature and require iterative testing to ensure no false positives are included.
General Support Features
General Support Features
Access to support via email tickets@edg.io or (877)334-3236.
- Documentation
- Email & Phone
- Email & Phone
- Email & Phone
Access to online network and platform service status updates at status.edg.io.
Access to an online, self-service Help Center to find user guides, release notes, diagnostic tools, customer notification, setup and troubleshooting information, and more.
Access to a welcome kit delivered by email, with information on support contact information, response times, and more.
Access to an online ticketing portal for support requests.
An Official Incident Report (OIR) will be delivered within 24 hours of the resolution of a service degrading incident.
A Root Cause Analysis (RCA) will be delivered within 5 business days of a major service disruption.
Access to the Support Management Team for critical events at escalations@edg.io.
Access to custom monitoring and alerting based on unique customer application and service thresholds.
Access to a bridge support call that remains open (at the discretion of the support team) until the resolution of any incident.
Access to monitoring and support during pre-planned events. Customers should contact support before the event.
Get Started Today
Gain Your Edge Today!
Deliver sub-second websites with unparalleled multi-layered security from a single developer-friendly platform.