Learn more about the technology and the network that Fastly manages to allow you to create unforgettable experiences at global scale.
A CDN, or content delivery network, is a network or collection of servers in locations all over the world. Also known as a content distribution network, a CDN can refer to many types of content delivery services, such as load balancing and video streaming. Learn more
A Web Application Firewall, or WAF, is a special type of firewall used for web applications. A WAF acts as a shield between a web application and the internet, protecting the server by detecting and blocking malicious request traffic. Learn more
Edge computing is computational processing at the edge of the network, at or near the source of the data, instead of centralized infrastructure. By processing closer to the end user, communication can be done faster and latency can be reduced. Learn more
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A DDoS attack uses more than one unique IP address or machines, often from thousands of hosts infected with malware. Learn more
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. Learn more
API security is the measures taken to protect APIs from unauthorized access, misuse, and attacks. Because APIs are commonly used and enable access to sensitive software functions and data, they are becoming an increasingly desired target for attackers. Learn more.
Web application security is the process of protecting websites and web-based applications from security vulnerabilities and attacks, ensuring that the application is free from vulnerabilities that could allow hackers to access sensitive data, steal information, or disrupt the application’s functionality. It involves implementing measures to prevent unauthorized access and protect against the loss or theft of sensitive data. Learn more.
Cloud computing provides users with on-demand access to computing resources, such as servers, storage, applications, and services all over the internet, instead of storing and managing them locally on their own servers or data centers. Learn more.