tencent cloud



Last updated: 2024-05-08 20:31:12

    Integrated Acceleration Security Capability Protection

    Tencent Cloud EdgeOne offers an integrated solution combining content acceleration and security protection. While enhancing the speed of your business, it also establishes a 3D security protection system spanning layers 3 to 7.

    3D Security Protection System

    DDoS Protection: Leveraging an Anycast-based distributed defense architecture, Tencent Cloud EdgeOne has established over 25 cleansing centers in globally available zones. This system effectively counters all types of DDoS attacks originating from the network layer, transport layer, and application layer. It detects and cleanses DDoS attack traffic within 3 seconds, mitigating the impact of the attack.
    WEB Attack Protection: With a comprehensive attack feature library that covers key security threats from the OWASP Top 10, it effectively blocks Web attacks, exploits of intrusion vulnerabilities, trojans, backdoors and other web service security issues. It also provides 0day vulnerability defense. The system utilizes a syntax analysis + AI intelligent detection engine to enhance detection accuracy and effectively reduce false positives.
    Intelligent CC Recognition: Drawing on Tencent Cloud's years of experience in CC protection and research on current CC protection trends, Tencent Cloud EdgeOne passively analyzes a large amount of network traffic. By combining multiple parameter characteristics such as TCP option, timestamp, TTL, it automatically identifies the client's operating system, application category, and unique device ID, accurately locating and identifying the attack source, effectively solving industry challenges such as CC protection pass-through.
    BOT Recognition and Protection: Based on protocol features, IP intelligence features, and custom session features, it accurately identifies and protects against BOTs. By using data and threat intelligence for comprehensive analysis and learning, it establishes a crawler recognition model, effectively resolving issues such as malicious crawler pass-through and benign crawler misidentification.
    Precise Attack Tracing: By packet analysis of abnormal/attack events and extraction of attack sources and attack messages, it serves as an important basis for attack tracing. Tencent Cloud EdgeOne also provides a comprehensive monitoring page, displaying various types of attack information such as attack types, attack sources, attack ports, attack traffic, providing a basis for users to adjust their protection strategies.
    24/7 Proactive Monitoring and Response: Tencent's security team monitors around the clock, proactively discovering and responding, effectively shortening the response cycle.

    Intelligent Dynamic and Static Network Acceleration

    Static Acceleration: With the support of rich network optimization and content caching strategies, and relying on the vast node and bandwidth resources of Tencent Cloud EdgeOne, we can effectively ameliorate the quality of access across regions and carriers. This results in an enhanced download speed, reduced response time, and a seamless user experience.
    Dynamic Acceleration: Leveraging Tencent Cloud's proprietary network transmission optimization technology, we monitor the latency and quality of the back-to-source link in real-time, and intelligently optimize the HTTP business back-to-source routing, thereby enhancing the experience of dynamic request access.
    Application Acceleration: Through widespread 4 layer proxy nodes of Tencent Cloud EdgeOne, unique DDoS protection module, and intelligent routing technology, we enable end-users to access nearby, edge traffic cleaning, and port forwarding. This provides high-availability, low-latency DDoS protection, and 4 layer acceleration services for 4 layer applications.

    Vast Node and Bandwidth Resource Reserves

    Tencent Cloud EdgeOne resources are dispersed across 100+ countries and regions, with a total network bandwidth exceeding 160Tbps. It encompasses over 2800 acceleration nodes and 50+ small and medium-sized operator access points globally. Each node boasts a storage capacity ranging from 40 TB to 1.5 PB, and a bandwidth load that can reach from 40 Gbps to over 200 Gbps. This extensive network effectively ameliorates the quality of access across different regions and operators, and is well-equipped to handle scenarios of sudden traffic surges.

    Nodes in Mainland China

    East China
    Shanghai, Jiangsu, Zhejiang, Anhui, Jiangxi, Shandong, Fujian
    North China
    Beijing, Tianjin, Shanxi, Hebei, Central Inner Mongolia Autonomous Region
    Central China
    Henan, Hubei, Hunan
    Northwest China
    Shaanxi, Gansu, Qinghai, Ningxia Hui Autonomous Region, Xinjiang Uygur Autonomous Region, Western Inner Mongolia Autonomous Region
    South China
    Guangdong, Hainan, Guangxi Zhuang Autonomous Region
    Southwest China
    Chongqing, Sichuan, Guizhou, Yunnan, Tibet Autonomous Region
    Northeast China
    Heilongjiang, Jilin, Liaoning, Eastern Inner Mongolia Autonomous Region

    Nodes Outside Mainland China

    North America
    United States, Mexico, Canada
    South America
    Brazil, Colombia, Peru, Ecuador, Chile, Argentina
    Hong Kong (China), Macao (China), Taiwan (China), Japan, South Korea, Mongolia, Vietnam, Laos, Singapore, Thailand, Philippines, Myanmar, Cambodia, Malaysia, Indonesia, India, Bangladesh, Nepal, Pakistan, Kuwait, Kyrgyzstan, Qatar, Israel, Turkey, Iraq, Saudi Arabia, Oman, United Arab Emirates, Bahrain, Lebanon, Jordan, Kazakhstan, Uzbekistan, Azerbaijan
    Djibouti, Kenya, Madagascar, Mauritius, Egypt, South Africa
    Australia, New Zealand
    Italy, Austria, Poland, Finland, Denmark, Belgium, Sweden, Spain, France, Netherlands, Germany, United Kingdom

    Versatile and Flexible Console Capabilities

    Tencent Cloud EdgeOne provides an integrated management console within the console, offering a wealth of capabilities including domain name resolution, site acceleration, security protection, rule engine, layer-4 proxy, edge functions, log services, data analysis, and more. This comprehensive platform aids in providing one-stop security protection and content acceleration at the edge. Through flexible rule configuration and edge functions, it can assist in tailoring business responses and back-to-source rules according to specific needs, thereby achieving flexible edge business processing.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support