Edgio Features
What are the features of Edgio?
Content
- Static Content Caching
- Cache purging
Management
- Dashboard
- Reports
Top Rated Edgio Alternatives
Filter for Features
Content
Static Content Caching | As reported in 11 Edgio reviews. Caching of static content at distributed PoPs for faster load times. | 82% (Based on 11 reviews) | |
Dynamic Content Routing | Routing of dynamic content for faster load time of dynamic pages. | Not enough data | |
Cache purging | Based on 10 Edgio reviews. The ability to purge the cache from different edge location PoPs. | 80% (Based on 10 reviews) |
Security
SSL | Shared SSL certificate. | Not enough data | |
Custom SSL | SSL certificate that you provide to the CDN software, or is provided for you and is not shared. | Not enough data |
Management
Dashboard | An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance. 10 reviewers of Edgio have provided feedback on this feature. | 70% (Based on 10 reviews) | |
Reports | As reported in 10 Edgio reviews. Access pre-built and custom reports. | 73% (Based on 10 reviews) | |
Logs | Record of data changes taking place in the software. | Not enough data | |
IT Alerting | Send summary, update, or actionable alerts to administrators to detail activity. | Not enough data | |
Network Capacity | Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks. | Not enough data | |
Logging | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Role-Based Permissions | Dictate user access and permissions based on organizational role. | Not enough data |
Integration
API | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
CMS Integration | Standard integrations for common CMS tools. | Not enough data |
Administration
Content Delivery | Caching of static or dynamic content at distributed PoPs for faster load times. | Not enough data | |
Dashboard & Reporting | Reporting and analytics that report on activity and program effectiveness. | Not enough data | |
Alerting | Identifies and alerts administrators of threats, issues, incidents and requests related to website security. | Not enough data |
Risk Analysis
Blacklist and Whitelist | Tracking recipient tagging of domains for blacklists and whitelists. | Not enough data | |
Vulnerability Assessment | Analyzes your existing website and network to outline access points that can be easily compromised. | Not enough data | |
Security Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. | Not enough data |
Threat Protection
Firewall | Protects websites and web applications from a variety of attacks and malware threats. | Not enough data | |
DDoS Protection | Protects against distributed denial of service (DDoS) attacks. | Not enough data | |
Malware Detection | Discovers website and web application malware. | Not enough data | |
Malware Removal | Facilitates the remediation of website and web application malware. | Not enough data |
Analysis
Logging and Reporting | Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | Not enough data | |
Issue Tracking | Track issues and manage resolutions. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data |
Controls
Application-Layer Controls | Gives user configurable rules to control requests, protocols and policies. | Not enough data | |
Traffic Controls | Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks. | Not enough data | |
Network Controls | Lets users provision networks, deliver content, balance loads, and manage traffic. | Not enough data |
Functionality
API / Integrations | API / Integrations | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data | |
Bot Traffic | Control and filter bot traffic. | Not enough data | |
Developer Tools | Provide developer-focused tools for website creation and maintenance. | Not enough data | |
Automation | Automate repetitive web development processes. | Not enough data | |
Website Staging | Offer staging and other pre-production environments for web development. | Not enough data |
Protection
DNS Protection | Detect and protect against attacks targeting domain name servers. | Not enough data | |
Website Protection | Detect and protect against attacks targeting websites. | Not enough data | |
Infrastructure Protection | Detect and protect against attacks targeting on-premise or locally controlled infrastructure. | Not enough data |
Resolution
Attack Mitigation | Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions. | Not enough data | |
Network Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Resolution Automation | Diagnoses and resolves incidents without the need for human interaction. | Not enough data |
Support
CMS Variety | Support traditional and headless CMS. | Not enough data | |
Multi-CMS Support | Support several CMS through a single platform. | Not enough data | |
Compliance | Offer or foster security compliance capabilities, e.g., SOC 2. | Not enough data |
Organization
Availability Scheduling | Videos can be timegated or made available only at predetermined times. | Not enough data | |
Workflows | Provides built-in workflow management. | Not enough data | |
Playlists | Allows users to organize video playlists. | Not enough data | |
Deep Search | Allows users to search for videos using words in the title, words spoken during the video, and/or words that appear on the screen. | Not enough data | |
Analytics | Provides analytics concerning video viewership and usage. | Not enough data | |
Permissions | Allows users to set permissions for access to videos or playlists. | Not enough data |
Customization
Branding | Allows users to add custom branding (logos, brand colors, etc) to videos. | Not enough data | |
Customizable Thumbnails | Allows users to choose thumbnails for videos. | Not enough data | |
Custom Metadata | Allows users to attach customized metadata to videos. | Not enough data | |
Annotations | Allows users to add annotations during video capture or during editing. | Not enough data |
Monitoring
Gap Analysis | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. | Not enough data | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. | Not enough data |
Asset Management
Asset Discovery | Detects new assets as they enter cloud environments and networks to add to asset inventory. | Not enough data | |
Shadow IT Detection | Identifies unsanctioned software. | Not enough data | |
Change Management | Provides tools to track and implement required security policy changes. | Not enough data |
Risk Management
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data | |
Reconnaissance | Gathers information about the system and potential exploits to be tested. | Not enough data | |
At-Risk Analysis | Uses machine learning to identify at-risk data. | Not enough data | |
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. | Not enough data |
Generative AI
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |