Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Edgio Features

What are the features of Edgio?

Content

  • Static Content Caching
  • Cache purging

Management

  • Dashboard
  • Reports

Top Rated Edgio Alternatives

Filter for Features

Content

Static Content Caching

As reported in 11 Edgio reviews. Caching of static content at distributed PoPs for faster load times.
82%
(Based on 11 reviews)

Dynamic Content Routing

Routing of dynamic content for faster load time of dynamic pages.

Not enough data

Cache purging

Based on 10 Edgio reviews. The ability to purge the cache from different edge location PoPs.
80%
(Based on 10 reviews)

Security

SSL

Shared SSL certificate.

Not enough data

Custom SSL

SSL certificate that you provide to the CDN software, or is provided for you and is not shared.

Not enough data

Management

Dashboard

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance. 10 reviewers of Edgio have provided feedback on this feature.
70%
(Based on 10 reviews)

Reports

As reported in 10 Edgio reviews. Access pre-built and custom reports.
73%
(Based on 10 reviews)

Logs

Record of data changes taking place in the software.

Not enough data

IT Alerting

Send summary, update, or actionable alerts to administrators to detail activity.

Not enough data

Network Capacity

Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data

Logging

Information on each incident is stored in databases for user reference and analytics.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Role-Based Permissions

Dictate user access and permissions based on organizational role.

Not enough data

Integration

API

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

CMS Integration

Standard integrations for common CMS tools.

Not enough data

Administration

Content Delivery

Caching of static or dynamic content at distributed PoPs for faster load times.

Not enough data

Dashboard & Reporting

Reporting and analytics that report on activity and program effectiveness.

Not enough data

Alerting

Identifies and alerts administrators of threats, issues, incidents and requests related to website security.

Not enough data

Risk Analysis

Blacklist and Whitelist

Tracking recipient tagging of domains for blacklists and whitelists.

Not enough data

Vulnerability Assessment

Analyzes your existing website and network to outline access points that can be easily compromised.

Not enough data

Security Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.

Not enough data

Threat Protection

Firewall

Protects websites and web applications from a variety of attacks and malware threats.

Not enough data

DDoS Protection

Protects against distributed denial of service (DDoS) attacks.

Not enough data

Malware Detection

Discovers website and web application malware.

Not enough data

Malware Removal

Facilitates the remediation of website and web application malware.

Not enough data

Analysis

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data

Issue Tracking

Track issues and manage resolutions.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Controls

Application-Layer Controls

Gives user configurable rules to control requests, protocols and policies.

Not enough data

Traffic Controls

Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.

Not enough data

Network Controls

Lets users provision networks, deliver content, balance loads, and manage traffic.

Not enough data

Functionality

API / Integrations

API / Integrations

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Bot Traffic

Control and filter bot traffic.

Not enough data

Developer Tools

Provide developer-focused tools for website creation and maintenance.

Not enough data

Automation

Automate repetitive web development processes.

Not enough data

Website Staging

Offer staging and other pre-production environments for web development.

Not enough data

Protection

DNS Protection

Detect and protect against attacks targeting domain name servers.

Not enough data

Website Protection

Detect and protect against attacks targeting websites.

Not enough data

Infrastructure Protection

Detect and protect against attacks targeting on-premise or locally controlled infrastructure.

Not enough data

Resolution

Attack Mitigation

Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.

Not enough data

Network Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Resolution Automation

Diagnoses and resolves incidents without the need for human interaction.

Not enough data

Support

CMS Variety

Support traditional and headless CMS.

Not enough data

Multi-CMS Support

Support several CMS through a single platform.

Not enough data

Compliance

Offer or foster security compliance capabilities, e.g., SOC 2.

Not enough data

Organization

Availability Scheduling

Videos can be timegated or made available only at predetermined times.

Not enough data

Workflows

Provides built-in workflow management.

Not enough data

Playlists

Allows users to organize video playlists.

Not enough data

Deep Search

Allows users to search for videos using words in the title, words spoken during the video, and/or words that appear on the screen.

Not enough data

Analytics

Provides analytics concerning video viewership and usage.

Not enough data

Permissions

Allows users to set permissions for access to videos or playlists.

Not enough data

Customization

Branding

Allows users to add custom branding (logos, brand colors, etc) to videos.

Not enough data

Customizable Thumbnails

Allows users to choose thumbnails for videos.

Not enough data

Custom Metadata

Allows users to attach customized metadata to videos.

Not enough data

Annotations

Allows users to add annotations during video capture or during editing.

Not enough data

Monitoring

Gap Analysis

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Compliance Monitoring

Monitors data quality and sends alerts based on violations or misuse.

Not enough data

Continuous Monitoring

Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.

Not enough data

Asset Management

Asset Discovery

Detects new assets as they enter cloud environments and networks to add to asset inventory.

Not enough data

Shadow IT Detection

Identifies unsanctioned software.

Not enough data

Change Management

Provides tools to track and implement required security policy changes.

Not enough data

Risk Management

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data

Reconnaissance

Gathers information about the system and potential exploits to be tested.

Not enough data

At-Risk Analysis

Uses machine learning to identify at-risk data.

Not enough data

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Generative AI

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data

AI Text Summarization

Condenses long documents or text into a brief summary.

Not enough data