EDGE PROTECTION

Website Firewall

EDGE FIREWALL

Our cloud-based Website Firewall (WAF) sits between your visitors and your server, filtering out malicious traffic before it ever reaches your site. We block SQL injection, cross-site scripting, brute-force attacks, and zero-day exploits — and update rules across the entire network within minutes of identifying a new threat.

How the firewall works

When a visitor types your URL, their request first goes to our global edge network — not your server. We inspect the request, check it against our rule set, and only forward it to your server if it passes. Malicious requests never touch your hosting.

This architecture has two big advantages: attacks consume our resources, not yours, and we can update protection instantly across every site on the grid without you needing to do anything.

What we block

  • SQL injection — attempts to read or modify your database through crafted query strings
  • Cross-site scripting (XSS) — malicious scripts injected through forms, URL parameters, or comments
  • Remote code execution — exploit attempts targeting WordPress core, plugins, or themes
  • Brute-force attacks — repeated login attempts from bots trying password lists
  • File upload exploits — attempts to upload shells, malware, or backdoors
  • XML-RPC abuse — request floods designed to overwhelm WordPress endpoints
  • Zero-day exploits — emerging attacks blocked via virtual patches

No configuration required

The firewall is fully managed, requires no server configuration, and works with any hosting provider. After you connect your site, our rule set deploys automatically — and updates continuously without any action from you.

Performance, not just protection

Because the firewall lives on a global CDN, requests from your visitors are served from the nearest edge node — meaning the average page load is actually faster after enabling protection, not slower.

We also handle HTTP/2 and HTTP/3 termination, image optimization, and intelligent caching at no extra cost.

9.2B
Attacks blocked / yr
< 60s
Rule deploy time
12 PoP
Global edge nodes
// THREATS BLOCKED

What we stop, every minute of every day

CRITICAL

SQL Injection

Crafted query strings that try to read or modify your database.

CRITICAL

Remote Code Execution

Exploits that try to run attacker code on your server.

HIGH

Brute-force

Bots cycling through password combinations on /wp-login.

HIGH

Cross-Site Scripting

Malicious JavaScript injected through forms or URLs.

HIGH

File Upload Exploits

Attempts to upload shells or backdoors disguised as media.

WATCH

Zero-day Exploits

Newly-disclosed vulnerabilities patched via virtual patches.

// TECHNICAL SPECS

Built on serious infrastructure

Edge locations12 PoPs across 6 continents
CapacityUp to 10 Tbps absorption
Rule deploy< 60 seconds network-wide
Latency overhead< 10ms at the edge
TLS1.3 default, HTTP/2 + HTTP/3
APIREST + webhooks, OpenAPI spec
ComplianceSOC 2 Type II, ISO 27001
Data residencyEU/US options for enterprise

Ready to get started?

Talk to our team and find the right protection for your site.