CDNetworks Service
CDNetworks Service
• CDNetworks Overview
• Why CDNetworks
• Products & Solutions
• Web & Network Performance
• Media Delivery
Contents • Cloud Security
• Zero Trust Security
• Edge Computing
• China & Emerging Markets
• Compliance
3
CDNetworks Overview
4
What is CDNetworks?
Dublin Moscow
Headquartered in Singapore
Toronto London
Santa Clara
Los Angeles
Silicon Valley
Beijing
Shanghai
Seoul
Tokyo 14 Global Offices and 10 R&D Centers
Shenzhen Xiamen
Guangzhou US$56.08 Million invested in R&D by 2021
Kuala Lumpur
Singapore
Cutting-edge Solutions: Web Performance,
Media Delivery, Cloud Security, Zero Trust Security,
and Professional Services, etc.
Our Mission
To Deliver the Fastest
and Most Secure Digital
Experience at the Edge.
7
A History of Growth
2022
Recognized in Gartner
Competitive Landscape: CDN
2019-2021 and Edge Services
Established Subsidiaries in Japan, China and US (DDoS protection+WAF) Introduced Edge Container
CDNetworks in Solution and Edge Hosting Solution
Korea Leveraged Dynamic Acceleration
Technology for Content Delivery Won 2016 Cloud Security
Excellence Award From IMC
Listed as Korea #1, Asia #1, and
Global Top 3 CDN Provider by Tier1 Established R&D Centers in
Research China and US
8
CDNetworks was recognized by Gartner for 6 • Received the 2023 Frost & Sullivan Customer Value
Leadership Award for WAF
consecutive years since 2018
• Recognized as a top CDN provider in the Frost Radar: Global
• Recognized as the recommended vendor by Gartner in Market
Content Delivery Network, 2023
Guide for Zero Trust Network Access, China, 2023*
Online Education
Manufacturing
Online Gaming
E-commerce
Why CDNetworks
12
Proven and reliable Vast global networks Rapid onboarding and Top-rated expert customer
comprehensive solutions and resources implementation service and support
13
CDN Performance
According to PerfOps, CDNetworks ranks 1st in web performance in Asia region.
CDNetworks 34.48 15.00 47.00 88.00 31.00 13.60 27.33 68.00 77.00 35.14 26.65 34.00 24.50 58.67
Cloudflare 38.19 203.00 49.00 68.00 31.00 19.40 41.11 30.33 80.67 43.43 25.75 33.29 26.00 50.33
Cloudfront 38.37 163.00 57.00 53.00 30.00 18.60 36.22 55.67 91.00 43.14 23.45 41.57 18.00 52.33
Edgio 38.52 171.00 57.00 55.00 28.00 21.00 40.00 62.67 102.00 26.29 27.20 28.86 33.50 53.33
Google 38.95 77.00 50.00 57.00 28.00 16.20 42.67 62.33 89.67 51.43 25.10 33.86 32.50 52.33
G-Core 39.10 211.00 20.00 114.00 36.00 26.60 38.78 53.00 42.00 39.71 28.60 31.86 38.00 55.33
CDN Pro 45.16 14.00 22.00 86.00 34.00 13.60 35.00 120.00 97.00 60.71 29.55 60.14 23.50 57.00
Fastly 45.19 150.00 65.00 57.00 29.00 28.20 40.67 85.00 108.00 68.71 28.20 33.00 17.00 50.00
Edgecast 45.27 302.00 64.00 61.00 27.00 17.40 39.11 62.67 102.67 64.14 25.90 40.86 24.50 53.67
CDN77 45.71 189.00 43.00 147.00 32.00 32.40 54.89 93.67 76.67 45.29 24.35 36.57 35.00 57.33
Akamai 47.86 208.00 72.00 62.00 32.00 73.60 33.56 82.00 105.00 64.00 24.95 31.57 19.00 68.00
CacheFly 49.62 152.00 42.00 73.00 26.00 48.40 44.22 82.67 85.00 65.43 40.75 28.71 31.50 51.00
Professional Services
Cloud Monitoring
Server Business Status
Monitoring server workload in Monitoring from multiple angles
real-time, and understand (Request Number, Traffic and Status Code),
operational status accordingly. and triggering Email/SMS alerts when it
exceeds pre-defined threshold.
Platform Security
Monitoring traffic and attacks,
Origin
intervening promptly when abnormal Monitoring origin servers to detect failure
traffic or unusual attack is detected. and prompt notification to client.
By leveraging the comprehensive insights offered by CDNetworks' global monitoring system, businesses can gain invaluable
information and enjoy robust support from CDNetworks.
20
Webpage
NGB Scheduling Security Image Processing Origin offloading
Route content requests Encrypt transmission Improve image loading by Connection reuse, origin
from end-user to optimal using Transport Layer resizing, cropping, gray probe and monitoring
PoP, bringing users faster Security(TLS) and scaling, format changing of keep origin from
and more satisfying web provide access control image at CDN pop overloading
experiences. based on rules
23
Smart Routing
CDNetworks transmit TCP/UDP traffic through Smart Routing to ensure that the content is delivered in optimum path.
Origin
Users
Origin Offloading
30ms 10ms
CDN Pro
A Serverless Nginx Edge Platform to secure, accelerate, and
scale your application globally!
Version control
Syntax highlight
Auto-completion
Detailed Documents
27
Media Delivery
29
Media Delivery
The flexibility and scalability of our Media Delivery products are designed to manage all types of traffic demand, ensuring q uick
load times for your users even during peak periods.
Object Storage
Provide customers with reliable, available and high-performance storage
30
Live Video
QUIC,RTMP HLS, RTMP, DASH
Tablet
v PC
VoD Files
TV
CDNetworks Media Processing also provides Adaptive bitrate (ABR) streaming involves wrapping multiple
renditions of the original video stream to enable playback for a variety of devices and connection speed.
32
1080p, Bitrate:
19,343 kbps 1080p, Bitrate:
9,757 kbps
AI Super Resolution
BEFORE AFTER CDNetworks AI Super Resolution
AI Algorithm Model
6x Super-Resolution
Video Denoising
Media Storage
Recording
Record live streams and
store in persistence VoD
format for playback
Media Acceleration
Live Broadcast
Screenshot
Take once or periodically
screenshots for video preview Object Storage
thumbnail or content audit
35
Cloud Security
36
Cloud Security
Multi-layered security technology backed by 24/7 support,
keeps your business safe from known and unknown attacks.
DDoS Protection
Distributed cloud-based DDoS mitigation protects
websites and network infrastructures from all types
and layers of DDoS attacks
Security Services
Provide professional security services such as 24/7
Monitoring and Alert, Vulnerability Scanning and
Reporting Service, etc.
37
API
• SYN Flood
• ACK Flood
• UDP Flood
• ICMP Flood
• Reflected Attack
• Amplified Attack
……
DDoS Mitigation Architecture
L7 DDoS Protection
Defend against all kinds of L7 DDoS attacks, such as HTTP(S) Flood, low & slow attack.
AI Protection
Access Control L4 Signature Matching Challenge Policies Access Control L7 Rate Limiting
API Protection
Set API usage limits to ensure availability and protect
against abuse.
Other Years
88%
The total number of WAF Rules are1,000+ and 100+ rules were upated in 2022.
Threat Intelligence
Smart/Complex Bots
• Fingerprint Verification
Smart/Complex Bots
• Human Interaction Verification
• SDK Security Policy
• Captcha Verification
• Workflow Analysis
APBs
Advance Persistence Bots (APBs)
• Preset Attack Models
• Customized Attack Models *
• AI Protection
• Client Intelligence Sharing *
(Note: * available soon)
44
Bot Management
Good Bots Management Malicious Bots Management
AI Protection
• Use the AI tech and machine learning to learn the access baseline of
normal user, and automatically set the security policies to block the
attack.
Text/HTML – 17%
Source:
[Link]
48
API Security
Access Control
Efficient Management
Easy to manage and secure existing API assets. Discover forgotten API assets in real time
Attacker End User Request Method Limit
to effectively prevent such APIs from being exploited by attacks.
Traffic Control
Request Concurrency Limit
Two dimensions of API traffic control are supported:
• API Request Quota: Traffic control for a single consumer within a configure time period. Customer Origin
Sensitive Data Detection
• Request Concurrent Limit: Control the Global traffic for a single API.
49
Security Services
Onboarding Service Vulnerability Scanning Service
Professional Guidance
Enterprise Secure
Access
ESA is a cloud service implemented based on SDP
infrastructure that delivers a secure, simple and
efficiency solution for remote and office secure access.
ESA benefits your business with:
On-Prem Workload
Device Security
IoT Devices
Trust Engine
Applications
54
Workloads •
•
•
Port scanning
Trojan virus
DDoS attacks
•
•
•
Port scanning
Trojan virus
DDoS attacks
ESA Access
Denied
Three-layer protection to eliminate attack surface
Secure Gateway
Enterprise Intranet
55
• Access Control
Threats Exception Access
DNS Attack
56
Edge Computing
57
Key Features
● Full lifecycle management
● Image management service
● Diverse Network Management
● Operation & Maintenance Management
Developer ECP API / Console App Deployer GSLB App Deployment Into Edge PoP Requests Edge PoP End Users IoT Devices
Deliver your applications to the edge globally with a few simple clicks or API call. Intelligently
route traffic to application instances based on both geographic proximity and performance.
59
CDNetworks provides China Premium Service which includes China Local PoPs and direct routes from
Outside of China's mainland, and ensures superior performance, high reliability, and low latency.
Saudi Arabia, Iraq, Kuwait, UAE, Oman, Qatar, Turkey, Israel, Egypt
64
Compliance
67
ISO/IEC 27001:2013 is an industry-wide The Payment Card Industry Data Security ISMS is a national certification system A SOC 2 report is designed to
accepted information security Standard (PCI DSS) is an information that ensures safe management of assure service organizations' clients ,
certification that focuses on the security standard for organizations that important information assets such as management and user entities
implementation of an Information handle branded credit cards from the major “corporate information, industrial about the suitability and
Security Management System (ISMS) card schemes. The PCI standard was secrets, and personal information” held effectiveness of the service
and security risk management created to increase controls around by companies and organizations by organization's controls relevant to
processes. cardholder data to reduce credit card fraud. comprehensively reviewing technical, security, availability, processing
administrative, and physical protection integrity, confidentiality and privacy.
measures.
68
Thank you!
sales@[Link] | [Link]