Product Introduction
Based on eSurfing Cloud’s distributed edge nodes distributed around the world and cloud native technology, AccessOne provides product services that integrate performance, security, and computing power to serve diverse scenarios.
• Acceleration
Based on eSurfing Cloud’s global edge nodes and multiple technologies such as intelligent routing and transmission optimization, AccessOne supports network acceleration for different protocols (L3/L4/L7).
• Security Protection
AccessOne upgrades the security of edge nodes comprehensively, detects website security through methods such as vulnerability scanning, content audit, and detection of security events including Trojan injection and hidden link tampering, and supports security protection features such as DDoS, WAF, Bot, and API for protection, providing a one-stop solution to clients’ problems.
• Remote Access
Based on the core concept of zero trust - "continuous verification, and never trust", it provides more secure, convenient, and unified remote access services based on identity authentication and dynamic evaluation.
• Edge Function
You do not need to pay attention to the service deployment area, or build and maintain infrastructure. One-click code deployment can take effect immediately on the edge nodes, which respond to the requests from end users or devices nearby.
Architecture
With the product architecture diagram, you can have a clearer understanding of the product architecture. Different terminals using various protocols can be connected to edge nodes nearby for real-time traffic analysis, timely blocking of abnormal traffic, and back-to-origin through CDN accelerated network.
AccessOne provides four major services, namely, EdgeTrans, EdgeAccess, EdgeWan, and EdgeDevelop, which can be combined and orchestrated for different business scenarios.
EdgeTrans
Based on eSurfing Cloud’s edge cloud nodes, EdgeTrans provides acceleration features such as dynamic and static data acceleration, and intelligent routing optimization, and integrates security protection capabilities such as DDoS and WAF. This enables efficient support for related businesses with strong sensitivity to latency and high security requirements, ensuring security for sectors such as government and enterprises, e-commerce and retail, financial services, content information and gaming, and offering product services that integrates acceleration and security protection.
Large-scale Traffic Cleaning
Users access edge nodes nearby that prioritize intelligent identification for large-scale traffic attacks and perform real-time traffic cleaning at L3/L4/L7 layers.
Web Security Protection
Web rule engines, intelligent AI engines, and Bot anti-crawler engines make secondary analysis on traffic, identify malicious requests for real-time processing, block malicious requests from reaching the user’s origin server, and support security protection such as API security, WAF, Bot and crawler protection.
Network Acceleration
After security testing, it differentiates the traffic based on the traffic conditions, and performs network acceleration according to different policies.
EdgeAccess
Based on identity authentication and dynamic evaluation, EdgeAccess can be flexibly deployed to distributed edge nodes, and supports on-demand dynamic scaling. It is capable of internal and external network isolation, Internet traffic management, refined authority control, terminal data security, and dynamic continuous authentication, and can replace traditional VPNs and IAMs with an integrated remote access solution.
Multi-terminal Access
Users can access with PCs or mobile clients, web browsers, and their own APPs integrating zero-trust SDKs. During the access, it performs user identity authentication (namely, account password) first, and then preliminary access judgments about terminal environment, devices, and behaviors. If the security conditions are met, the login succeeds, otherwise it fails.
Security Policy Detection
After successful login, it conducts security detection for clients and edge nodes, with different detection locations corresponding to different scenarios.
• In the case of client detection, it establishes a sandbox isolation zone at the client layer for terminal data security control. In addition, it carries out continuous detection of the terminal environment, and deals with abnormalities in a timely manner. For instance, if abnormal processes are detected, it disconnects the internal network and requires relevant disposal.
• In the case of edge node detection, the user who successfully logs in establishes a connection with the edge nodes nearby. The edge nodes, integrating DDoS and WAF protection plug-ins, preferentially perform large-scale traffic cleaning and WAF security detection, in which normal traffic is forwarded to the zero-trust gateway for horizontal scanning and protection, dealing with any abnormalities promptly.
Aggregation Acceleration Back-to-Origin
After passing the security detection policy, it carries out the CDN intelligent routing and transfer convergence, and forwards the access requests to the client connector. Through aggregation acceleration, the concurrency pressure of the origin server connector is reduced, thus improving the access speed.
EdgeWan
EdgeWan, based on quality edge network resources and application security acceleration, provides secure, high-performance network connectivity, TCP/UDP protocol acceleration, private protocol acceleration, and other services for enterprise networks. You can securely connect data resources from any location to the edge network portal and achieves high-speed, stable, and secure cross-regional data transmission through high-speed channels, intelligent routing, and security protection technology. This helps solve global access congestion and high latency and provides an available-upon-delivery, on-demand, and secure network environment.
Diversified Access Method
• It supports access through PCs, mobile phones, and various terminals to edge networks nearby.
Ultimate Acceleration
• Multi-protocol acceleration: Layer 4 acceleration based on TCP/UDP.
• Intelligent routing: real-time detection, back-to-origin through optimal path
• Quality transmission: self-developed transmission optimization and link optimization mechanisms.
• HA: abundant policies for load balancing and origin server DR.
Secure and Reliable Transmission
• Content security: transparent forwarding of business and secure transmission.
• Access security: Abundant access control policies to restrict unauthorized user access.
• Security protection: built-in DDoS protection and advanced attack protection.
Developer Platform
With the development of Internet business, the proportion of dynamic requests (such as search results and personalized recommendations) is increasing. Such diversified content needs to be calculated and then returned to users.
The AccessOne EdgeDevelop provides edge functions and edge KV storage. When the standard configuration on the console cannot meet your business needs, you can use the edge functions for fast programming.
Via JavaScript ES6 standard syntax and templates, you can customize edge node configurations in a modular manner. Through computing at edge nodes, this avoids request overload on the origin server, thus reducing concurrency and requests, which makes business operations smoother and reduces both fluctuations and bandwidth costs.
Global Deployment with Ultra-low Latency
The AccessOne EdgeDevelop places your code globally at POPs close to your users, shortening the distance over which requests need to travel by more than 50%. Incoming requests are handled at the POPs, significantly reducing the response time and helping you deliver a more responsive user experience.
Serverless mode, efficient and easy to use
After you upload your code to AccessOne, our serverless architecture takes over and manages the computing and storage resources. AccessOne takes care of all the hard parts, including distributing your code to POPs all around the world. In short, you no longer need to manage any resources or plan for availability, but instead focus on improving the performance and efficiency of your code.
Elastic Scaling
When the number of client requests in a region surges, AccessOne enables nearby computing resources and automatically completes scaling and scheduling.
Abundant Programming Language Environments
• Easy-to-learn tools for developers: Provides web IDE on-line programming and tools for developers.
• Supports JavaScript ES6, TypeScript, and Node.js environments.
• Provides Service Worker API, Streams API, and WebCrypto API that comply with W3C standards.