Limelight Cloud Security Services use the Orchestrate Platform’s global reach to secure content and mitigate attacks on your website and web servers. They include encrypted content delivery and multiple access control methods that enable you to protect your digital assets.
Ensuring a great quality of experience for users entails securing and protecting content from a variety of potential threats. With the cost and complexity of preventing and responding to security breaches on the rise, only a comprehensive suite of global cloud-based security services allows you to keep abreast of the latest threats and preventive mitigation measures without adding latency to the delivery experience.
Limelight Cloud Security Services provide powerful features to protect against attacks on websites and control access to content. Security of content in transit against theft is provided by the largest SSL footprint, and website access authorization is controlled by geo-fencing, URL tokenization, and IP address white and black listing so you can enforce licensing restrictions and prevent theft of content.
Passive attack mitigation via massive CDN.
Deliver digital assets securely via the largest SSL global footprint.
Host customer’s SSL certificates.
Control access based on geolocation
Detect and mitigate attacks against websites.
Tokenization-based video stream access control.
Allow multiple content sources while restricting sharing to designated origins.
Control access based on IP addresses.
Authorizing which files can connect for playback.
Cloud-based globally distributed infrastructure integrated with the CDN, identifies and blocks attacks.
Security Alert adds the following features to our standard Cloud Security Services:
Ensure large attacks are distributed to multiple Limelight POP locations rather than a single POP for improved mitigation.
Attacks are detected and communicated through an email-alert, providing awareness so that appropriate measures can be taken to defend their valuable assets.
WAF Complete includes Security Alert and capabilities and adds these additional security features:
Control the maximum number of requests per second from a single IP address.
Protect websites against bots and scripts by requiring human logic.
Block access based on IP address, or geographic location.
Allows customers to easily turn specific WAF features on or off, and easily view important data related to the WAF.
Origin is shielded by the CDN and traffic filtering by the WAF which covers the OWASP Top 10.
Limelight security experts assist in the setup and configuration of the WAF and its associated rules.
Multiple defenses deployed to protect web applications including good bot/bad bot detection, IP rate limiting, IP access control, and CAPTCHA challenges.
Incoming requests for content are challenged and ﬁnger-printed to determine if generated by bot/script or human user.
Access rules based on IP addresses, location of the end user, browser type, and URL being accessed.
Custom rules on a per web application basis, created by description of vulnerabilities and how detected.
Dashboards in control displays WAF rules state, requests alerted, and request handling.
Daily threat intelligence monitoring, vulnerability and threat analysis, full threat simulation and regression testing.
DDoS Attack Interceptor provides a powerful solution to the threat of cyber-attacks through a variety of compelling capabilities.
Limelight’s distributed network of data centers provides enormous capacity to absorb attacks that are not complex enough to be moved to scrubbing.
Using behavior-based analysis, DDoS Attack Interceptor intelligently detects attacks even when a signature does not exist, offering protection from a broad spectrum of attack types in addition to network based attacks (Layer 3, 4).
DDoS Attack Interceptor actively monitors for DDoS attacks so you don’t have to. Proactive detection shortens response times and allows mitigation to begin quickly.
Attack traffic is mitigated by the Security Operations team by diverting it to globally distributed scrubbing centers, giving you the protection you need, when you need it, without having to install costly security appliances locally.
Mitigation of attack traffic means you only pay for filtered traffic, avoiding costly overcharges due to a DDoS attack.
View available realtime data regarding attack detections and mitigations, while historical attack data and threat intelligence reports allow you to identify trends and plan for the future.
DDoS protection services are easy to activate and manage – which means no new hardware or software and no changes to your web applications.
Covered shortname/anycast address for potential DDoS attacks.
Choose the best approach with cloud-based security services:
Massive global network absorbs traffic flooding.
On Network scrubbing maintains performance even under attack.
URL tokenization limits access to licensed content, keeping unauthorized users off corporate websites.
Block network attacks with globally distributed DDoS AI and WAF protection mechanisms, performance is not sacriﬁced for security, and your websites are available for business.