Sign Up

Cloud security

Fastly’s massive globally distributed network provides rapid protection against web application vulnerabilities, DDoS, and botnet attacks. Enforce security rules at the edge with real-time insights into suspicious traffic and the ability to update your configuration in milliseconds.

Start your free trial

Web application firewall

Fastly’s web application firewall protects your applications from malicious attacks designed to compromise web servers. Built on our powerful edge cloud platform, it protects against injection attacks, cross site scripting, HTTP protocol violations, and more. Our WAF is continuously updated to address ongoing threats using multiple rulesets. Rules can be configured in real time via our API, and can run in active blocking mode or passive logging mode only.

Comprehensive protection

Fastly’s cloud-based WAF consumes third-party rules from the OWASP Core Ruleset, commercial sources, and open source, in addition to Fastly-generated rules. Customers are protected from key application-layer attacks, such as injection attacks and malicious inputs, cross site scripting, data exfiltration, HTTP protocol violations, and other OWASP Top 10 threats. Fastly WAF rules are instantly configurable so you can respond to threats as they arise.

Comprehensive-protection

Superior performance

Fastly’s WAF provides global protection without any significant performance impact because it’s fully integrated into our Varnish-based edge cloud platform. Using a set of pre-built rules, we only run WAF detection logic on requests that cannot be served from cache, saving valuable milliseconds in detecting attacks aimed at the origin server. Integration with our edge cloud platform also ensures support for IPv6 and HTTP/2.

Superior performance

Deeper integration

Third-party CMS platforms are increasingly becoming the target for application-layer attacks. Having the ability to virtually patch these platforms allows you to protect your applications until you roll out software updates. Fastly’s WAF is tightly integrated into our cache nodes, allowing us to detect your website’s application stack. We can apply pre-defined rulesets to protect against known vulnerabilities in popular tools like Drupal and WordPress. You can also quickly add, remove or change WAF-based rules for these platforms.

Deeper integration2-01

Real-time visibility and control

Built on our powerful edge cloud platform, Fastly’s WAF gives you access to 100% of your security events and notifications within seconds from the edge. You can quickly identify potential application layer threats and make instant configuration changes to your WAF rules from within our service. Real-time log streaming also gives you immediate visibility into attack mitigation efforts.

Real-time visibility and control2-01

DDoS mitigation

Fastly’s high-bandwidth, globally distributed network is built to absorb DDoS attacks. Our entire network acts as a DDoS scrubbing center, so you don’t sacrifice performance for protection. We protect against highly disruptive Layer 3 and Layer 4 attacks, as well as more complex Layer 7 attacks. We allow you to respond in real time, filtering malicious requests at the network edge before they get near your origin.

Edge filtering

Fastly sees all bidirectional traffic (encrypted and unencrypted) between browsers and your web server and automatically filters all non-HTTP / HTTPS traffic at our global nodes, blocking highly disruptive Layer 3 and Layer 4 attacks. We protect against Ping floods, ICMP floods, reflection / amplification attacks, transaction floods, resource exhaustion, and UDP abuse.

Fastly’s edge cache nodes act as enforcement points. Using VCL, we apply rules to protect your network from complex Layer 7 attacks. We inspect the entire HTTP / HTTPS requests, and block based on client and request criteria, like headers, cookies, request path, and client IP, or indicators like geolocation.

Rapid response

Fastly’s edge cloud platform gives you the flexibility to keep up with rapidly changing attacker methods. Our real-time streaming logs help you monitor site performance and quickly identify anomalies like traffic spikes and instability. Our service is highly configurable; if you identify signs of a potential DDoS attack, you can use our configuration control panel or upload custom VCL to block certain URLs, client types, geographies, or types of requests. We also keep a history of previous configurations so you can quickly roll back changes if needed.

Origin Cloaking

Sophisticated attackers use tools like Cloudpiercer to uncover the IP address of origin servers. This allows them to direct attack traffic at these exposed origin servers, bypassing a traditional CDN’s protection capabilities. Fastly’s Origin Cloaking prevents these kinds of attacks by hiding your origin from attackers. Using private network interconnections, we connect directly with your origin server, hiding the IP address from the public internet — forcing all attack traffic through our network where we apply DDoS mitigation rules.

Flexible service options

Choose one of our two options as an add-on to your Fastly service: both plans provide DDoS protection of HTTP (port 80) and HTTPS (port 443, TLS) with unlimited overage protection.

DDoS Protection and Mitigation Service: our 12-month service helps you minimize risk with continuous, year-long protection.

DDoS Threat Response Service: use our month-to-month service to respond to immediate DDoS threats or for ongoing DDoS attacks.

Bot detection & mitigation

Fastly has partnered with PerimeterX to offer powerful behavior-based bot detection and mitigation at the edge. We help prevent account takeover, scraping, digital fraud, and complex application-layer attacks. Our joint offering protects both cached and origin content, defending against bot abuse without impacting performance. This solution is easy to install, and can be up and running in a matter of hours.

Tight Integration

Tight integration

Fastly and PerimeterX offer a tightly integrated solution on both the client and server level. Once a user requests a page, Fastly serves the page along with PerimeterX’s sensor (a JavaScript snippet). The sensor collects non-personally identifiable information from the browser at the network, user, and device layers.

Data collected is sent to the PerimeterX detector, where real-time algorithms are run to generate a trust score for user sessions. Fastly uses these trust scores to allow or deny access to your website, blocking suspected bot activity. You can also apply additional levels of control, such as further authentication or redirecting to a support page.

Powerful edge platform-01

Powerful edge platform

Leveraging Fastly’s edge cloud platform, PerimeterX has built a solution that combines their advanced behavior-based bot detection with our rapid mitigation capabilities at the network edge. Fastly’s multi-terabit-per-second network manages millions of simultaneous connections globally, allowing us to operate as a distributed filter to enforce bot policies. Our cache nodes perform real-time evaluation of PerimeterX trust scores for request-by-request edge enforcement.

Highly Accurate Bot Protection2-01

Highly accurate bot protection

The PerimeterX Bot Defender™ can identify highly sophisticated man-in-the-browser bots which use advanced browser automation tools or reside inside infected browsers to control users’ machines. These bots are detected by identifying suspicious user behavior patterns over time, such as repetitive, machine-like actions that are indicative of malicious bot activity. By offering advanced behavior-based detection, PerimeterX can identify more sophisticated application-layer bot traffic attacking specific functions like user logins or shopping carts.

Protect Cached and Origin Content2-01

Protect cached and origin content

Our joint offering protects both origin and edge traffic, so you can keep more in cache without the risk of bot abuse. Cache rapidly changing content like sports scores or stock prices at the network edge for faster delivery, without worrying about content or price scraping. With Fastly’s Instant Purge and surrogate key purging, you can also proactively manage this content, swapping out outdated information instantly.

Maintain performance-01

Maintain performance

Fastly and PerimeterX offer the lowest latency bot detection and mitigation solution on the market. JavaScript from the sensor is run in the background in asynchronous, non-blocking mode and cached on our CDN for zero impact on performance. Evaluating client requests at the edge and assigning a trust score only adds a few milliseconds; alternative bot detection solutions return to origin to evaluate and score bot traffic, adding significant latency and increasing backend server costs.

TLS encryption

Protecting customer identities and the integrity of your website requires strong encryption. Fastly supports Transport Layer Security (TLS), the next-generation encryption protocol. TLS connections between Fastly and your origin are encrypted and terminated at our network edge, closer to your customers. We’re optimized to handle heavy volumes of encrypted traffic without impacting performance. Fastly follows industry standards throughout our network, ensuring the safety of your users.

Certificate hosting

  • Shared certificates allow customers to add their domain names (including wildcards) to the Subject Alternative Name (SAN) section of Fastly certificates. We take care of certificate procurement and distribution.
  • Hosted certificates allow customers to procure and upload their own keys and certificates, which Fastly will distribute to our caches. This service is often used for Extended Validation (EV) certificates, but we also support Organization Validated (OV) and Domain Validated (DV) certificates. We support Server Name Indication (SNI) for customers with modern clients, while customers with legacy clients can purchase dedicated IP addresses.

TLS termination at the edge

We believe that implementing the highest standard of TLS encryption across your website shouldn’t slow it down. As part of our standard service, you can terminate secure TLS connections at our network edge, closer to users, offloading encrypted traffic from your web server for better performance.

Single secure network

Since any internet-facing network is exposed to the same threats, we maintain one compliant, secure, high-performance network for all customer traffic. This ensures a single platform for unified inspection and enforcement of both encrypted and unencrypted traffic flows.

Compliance

Fastly is a certified PCI DSS Level 1 service provider. The power of our edge cloud platform and fine-grained controls allows us to cache sensitive PCI or HIPAA-related content while maintaining compliance. Legacy CDNs are unable to cache this content and can only route it on separate, sub-optimal networks. Our Assurance Services provide additional support for customers handling data subject to audit requirements.

Single compliant network

Traditional CDNs send sensitive data on a separate network with less capacity than their main network, or they pass it directly to the customer’s origin. Both approaches can cause slower response times, and bypassing the CDN altogether leads to extra load on the origin server.

Fastly’s entire network supports compliance across all our services. We speed up the caching and delivery of sensitive content at the edge, without splitting your traffic into separate networks to satisfy PCI DSS requirements or maintain good HIPAA security practices.

Event log data

Fastly also provides event logs for user activity related to your service or account. When a change occurs, we capture who made that change and when it occurred and expose it via our API and web interface. Examples of logged events include failed logins, password updates, API key creation, and users added, updated, or deleted. You can also see when user accounts are locked or unlocked, and when two-factor authentication is enabled or disabled. Timely access to this log data improves monitoring and ensures your configuration settings are more secure.

Assurance Services

Our Assurance Services provide additional support for customers handling sensitive data which may be subject to audit requirements. We offer access to our library of third-party audit reports and certification attestations in addition to security-related policies and procedures. Executive summary reports are available for annual risk assessments, penetration tests, and network scans. Subscribers to Assurance Services can also use professional service hours to conduct direct audits of Fastly’s security and technology compliance programs.

Reminder: No security solutions will detect or prevent all possible attacks or threats