Security
Security Shortcuts
Firewall Security Shortcuts Firewall Security Shortcuts allow you to apply powerful security protections with just a few clicks. Each shortcut represents a pre-configured firewall rule tailored for a specific use case such as blocking scraping bots, ...
Known Crawler Whitelisting in VergeCloud
Overview Automated bots often referred to as crawlers or spiders are programs that systematically browse the web. Search engines, analytics platforms, AI services, and other online tools rely on these bots to index content, collect website ...
Understanding VergeCloud’s DDoS Challenge Modes
VergeCloud’s DDoS protection uses multiple layers of mitigation to protect against both network-level (Layer 3 & 4) and application-level (Layer 7) attacks. Each challenge mode handles threats differently. This guide explains each type to observe ...
DDoS Mitigation
VergeCloud’s DDoS protection ensures that your website remains secure from malicious traffic while maintaining a seamless experience for legitimate users. With advanced filtering at multiple layers, customizable options, and user-friendly challenge ...
Steps to Create a Secure Link
Overview VergeCloud allows you to generate secure links for files that are protected from unauthorized access. The process involves creating a hash based on the visitor's IP, file path, expiry timestamp, and a secret key. This document will guide you ...
Web Application Firewall
Overview VergeCloud’s Web Application Firewall (WAF) provides advanced application-layer protection through a highly accurate Regex-based Anomaly Scoring system. Instead of relying solely on signature matches, VergeCloud assigns weighted scores to ...
Rate Limiting
Understanding Rate Limiting Rate limiting is a method used to control how many requests a user or system can send to your website or API within a specific time frame. It helps protect your servers from abuse, ensures fair use of resources, and ...
Cloud Firewall
Overview The VergeCloud Firewall provides fine-grained control over HTTP(S) traffic to your website or application, allowing you to filter requests, protect sensitive endpoints, block malicious actors, and apply intelligent challenges to suspicious ...