Fastly’s Full-Site Delivery allows you to speed up websites and mobile applications by pushing content closer to users, providing improved and secure experiences across the world. Full-Site Delivery includes the following features.| Fastly Documentation
This guide explains how to configure user roles and permissions to manage access within your account.| Fastly Documentation
Support availability and response times vary depending on the type of account you have and the level of support you have purchased, including those in any packaged offering. The following table summarizes those offerings:| Fastly Documentation
These articles describe the features, functionality, and performance of Fastly's products and services and their applicable SLAs. These articles also contain information about Fastly’s use of third-party technology or distributed software in our products and any certificates and compliance programs applicable to our products.| Fastly Documentation
Fastly’s Compute platform, formerly known as Compute@Edge, helps you compile your custom code to WebAssembly and runs it at the Fastly edge using the WebAssembly System Interface for each compute request. Per-request isolation and lightweight sandboxing create an environment focused on performance and security.| Fastly Documentation
As a content delivery network, Fastly works by having any one of our global points of presence (POP) respond to requests that would otherwise be sent directly to your origin server. Because each POP acts independently, any time it doesn't have a cached version of the requested resource, it will make a request directly to your origin, even if another POP may be in the process of making the same request. You can reduce the load on your origin servers if you specify one of Fastly's POPs as an or...| Fastly Documentation
Fastly offers Fastly Next-Gen WAF customers a Response Security Service (RSS) that provides your organization with enhanced access to our Customer Security Operations Center (CSOC) team and periodic consultation with a Designated Security Specialist for strategic security solutions reviews and planning. Together, Fastly’s CSOC team and your Designated Security Specialist support the design, implementation, and maintenance of your security solutions by assisting with initial configuration, r...| Fastly Documentation
Fastly can automatically detect and, in real time, route around transient connection problems that occur when fetching content from your origin servers or when delivering content to end users from Fastly's Edge Cloud. Fastly uses different, automated techniques depending on where we observe a connection problem. This page describes two capabilities that Precision Path uses to automatically improve fetching and delivery of content to your users: origin connection rerouting and edge connection ...| Fastly Documentation
To help you tune the performance of your Fastly services, we support real-time log streaming of data that passes through Fastly. We support a number of protocols that allow you to stream logs to a variety of locations, including third-party services, for storage and analysis.| Fastly Documentation
Fastly offers customers the ability to purchase the support of a Security Technical Account Manager for your organization. These specialists help you optimize your use of Fastly's security products and features by providing proactive check-ins and regular reviews to help you analyze your account's security service configurations and their performance. Security Technical Account Managers also provide enhanced troubleshooting coordination with Fastly's support and professional services organiza...| Fastly Documentation
Fastly’s Edge Rate Limiting provides customers with the ability to count client requests and optionally penalize clients for exceeding set rate limits, thereby controlling the rate of requests sent to origin servers. Common uses for the Edge Rate Limiting product include mitigating abusive use of a website or service (e.g. by a scraping bot or a denial of service attack) or applying limits on use of an expensive or billable resource (e.g. allowing only up to 1000 requests an hour to an API ...| Fastly Documentation
API tokens are unique security credentials that allow human users and automated systems to prove their identity to Fastly, thereby indicating they can be trusted to access restricted resources and perform specific, restricted operations via the Fastly API.| Fastly Documentation
The Fastly Next-Gen WAF is a web application firewall that monitors for suspicious and anomalous web traffic and protects, in real-time, against attacks directed at the applications and origin servers that you specify.| Fastly Documentation