Help Center/ Edge Security/ Service Overview/ Service Edition Differences
Updated on 2024-10-31 GMT+08:00

Service Edition Differences

Currently, EdgeSec provides the enterprise edition. For details, see Version Description and Functions and Features Supported by Each Version.

Description

Table 1 describes each version of EdgeSec.

Table 1 Description

Service Scale

Enterprise Edition

Number of domain names

20

CC attack prevention rules

100

Precise protection rules

100

Reference table rules

100

IP address blacklist and whitelist rules

1,000

Geolocation access control rules

100

Web tamper protection rules

100

Information leakage prevention rules

100

Global protection whitelist rules

1,000

Data masking rules

100

Functions Supported by Each Edition

Table 2 lists the security features applicable to each version.

Description:

  • √: The function is included in the current edition.
  • x: The function is not included in the current edition.
Table 2 Security features

Function Template

Enterprise Edition

Domain expansion package

Adding wildcard domain names

Flexibly configuring defense policies in a batch

Batch adding domain names to a policy

Protection against common web attacks, such as SQL injections, XSS, remote overflow vulnerabilities, file inclusions, Bash vulnerabilities, remote command execution, directory traversal, sensitive file access, and command/code injections

Updating protection rules against zero-day vulnerabilities to the latest on the cloud and delivering virtual patches in a timely manner

Web shell detection

Deep anti-evasion inspection to identify and block evasion attacks, such as the ones that use homomorphic character obfuscation, command injection with deformed wildcard characters, UTF7, data URI scheme, and other techniques

Inspection of all header fields in the requests

CC attack prevention

Precise protection

Reference table management

IP address whitelist and blacklist and batch importing of IP addresses/IP address ranges

Allowing or blocking web requests based on the countries that the requests originate from.

Identification and blocking of crawler behavior such as search engines, scanners, script tools, and other crawlers

JavaScript-based anti-crawler protection

Information leakage prevention rules

Global protection whitelist rules

Data masking