Network

Secure by Design

Edge is secure by design, utilizing state of the art cryptography and decentralized techniques to ensure the security of your applications and files.

Security in Distributed Devices

Edge nodes are contributed to the network by individuals and businesses around the world. Nodes are untrusted in the network by design. Their connectivity to the network is controlled through account-linked, and use-once keys. This ACL is tied in to a consensus mechanism that periodically and randomly checks the veracity of expected responses from nodes.

Host devices are abstracted from the frontline of the network, and are not directly addressable or exposed to the consumers of services.

In addition to this, no single file is stored on a single device in the network. Files are encrypted and broken into hundreds of parts, which are then seeded across devices in the network. This means that even if you knew what you were looking for in the network, you would have to break into hundreds of homes and offices, then break in to hundreds of individual devices.

Security in Distributed Devices

Application and File Security

Individual files are encrypted and split into hundreds of pieces, which are then distributed across nodes in the network. Secured virtual machines and custom hypervisors are used in tandem with secure enclaves such as Intel SGX and key attestation servers to ensure application-level security.

Application and File Security

DDoS Mitigation

Edge has built in mitigation against Distributed Denial of Service Attacks to maintain the performance and availability of your apps. This is handled both through the decentralized nature of the network itself, utilizing BGP routing to offset incoming load, and through network scrubbing services, provided by the data centers contributing capacity to the network.

Find out More
DDoS Mitigation

Secure DNS

DNS over HTTPS (DoH) is employed to increase security. Check sums between node types from the point of request to the point of delivery are employed to remove the potential for eavesdropping and manipulation (such as man in the middle attacks).

Secure DNS
Global Reach

Global Reach

Edge is a fully decentralized network, built through contributions of computing power from all over the world.

About Global Reach
Security

Architecture

The world’s first edge network, built using the spare computing capacity all around us.

About Edge Architecture
Monitoring

Monitoring

Telemetry built in at every level, bringing accountability and auditability to every transaction in the network.

About Edge Monitoring
DDoS Protection

DDoS Protection

Built in mitigation against Distributed Denial of Service Attacks to maintain the performance and availability of your apps.

About DDoS Protection
Mail icon

Like what you are reading? Want to earn tokens by becoming an Edge Node? Save money on your hosting services? Build amazing digital products on top of Edge services? Join our mailing list.

To hear about our news, events, products and services, subscribe now. You can also indicate which services you are interested in, which we use for research and to inform the content that we send.

* You can unsubscribe at any time by emailing us at data@edge.network or by clicking on the unsubscribe link which can be found in our emails to you. Read our Privacy Policy.
Winner Best Edge Computing Platform Technology & Innovation Awards
Presented by Juniper Research