Product Introduction
  • Overview
  • Strengths
  • Use Cases
  • Comparison Between EdgeOne and CDN Products
  • Use Limits
このページは現在英語版のみで提供されており、日本語版も近日中に提供される予定です。ご利用いただきありがとうございます。

Use Cases

Business Requirements
Common Scenes
Applicable Industries
Solution
Poor User Access Quality
Due to the wide distribution of users, cross-regional and cross-ISP access may result in slow loading speed, lag, or even access failure.
Loading static files for websites, such as portals/personal blogs/forums
Various download scenarios for games/apps/videos
Suitable for all industries, more prominent in gaming/ecommerce/social entertainment industries
EdgeOne provides globally distributed nodes to offer nearby node access for site users, effectively improving their access experience.
Payment/login APIs are unstable, e.g., ecommerce platform access load/transactions.
Business Traffic Burst
The server bandwidth resources and performance of the site are limited. When there is a large number of users accessing simultaneously, it will cause the origin server to be unable to handle, resulting in unavailability of user access.
Game Publish/Update
Sports Events live stream
Popular series release
Suitable for all industries, more prominent in gaming/ecommerce industries
Utilizing EdgeOne's self-developed global scheduling system, it can flexibly handle traffic surges, ensuring smooth business operation.
Ecommerce major promotion
OTA Upgrade
Encounter a Network Attack
After the site's server is directly exposed to the public network, it is prone to traffic-based and HTTP DDoS attacks, resulting in service being unable to access.
Sites and applications that provide services to the Internet directly through Public IP addresses
Gaming/Finance/Ecommerce/Social Entertainment/SaaS Services, etc.
EdgeOne provides a default reverse proxy access service with security capability for all connected site domains, reducing unnecessary public exposure of the origin server and lowering attack risk. It also offers protection capability against traffic-based DDoS attacks and HTTP DDoS attacks.
Exploit Web Security Vulnerabilities To Gain Data and System Permissions
Hackers can exploit known or 0-Day web vulnerabilities to intrude into site service components or systems, steal key data or gain advanced system permissions, leading to issues such as data leakage, data tampering, and malicious extortion.
Sites or applications that store customer data or commercial data
Online Payment/Retail/Ecommerce/Finance/Social Industry
EdgeOne provides comprehensive vulnerability attack protection capabilities at the edge for sites. It uses managed rules with semantic analysis to recognize exploitative access behaviors and supports automatic updates and automatic deployment. This effectively protects site security and reduces the risk of external attacks stealing sensitive data and system permissions.
Use Crawler Tool To Forge Human Access and Abuse Services
Arbitrary access by Crawler Tool may cause abnormal website traffic and increased backend load, affecting the access experience of legitimate users. Meanwhile, malicious crawlers can crawl commercial information for unfair competition or service abuse (e.g., automatic registration of numerous accounts to obtain coupons and free trial qualifications), and further steal valuable account permissions (e.g., credential stuffing, brute force cracking of accounts).
Sites or applications that provide transactional services (e.g., login, registration, payment, query) or SaaS Services (e.g., information query, price query, large model dialogue services).
Retail/Ecommerce/Finance/Education/SaaS Services, etc.
EdgeOne provides a variety of Bot Management strategies, which can quickly identify risky crawler activities through intelligent analysis technology and Tencent security big data, offering crawler behavior visualization. It also provides flexible disposition and countermeasures to control crawler activities and reduce the risks associated with crawler access.