Edge Security Acceleration (ESA) collects and processes data at points of presence (POPs) through log analysis, real-time monitoring, and intelligent alerting. This enables prompt detection and response to potential security threats, enhancing data visibility and management, while improving operational efficiency and decision-making.
Features overview
This topic explains how ESA account analytics provides visualized analysis of different metrics from all the websites under your account and walks you through how to use it.
This topic explains how ESA traffic analytics provides visualized analysis of different metrics from your website and walks you through how to use it.
ESA offers standard logs that are packaged on an hourly basis. You can download access logs of your website within the last 31 days to your local PC. Standard logs can help you optimize acceleration policies, monitor your website, detect potential risks, and learn user behavior.
ESA can collect system logs, application logs, or device operation logs of your website in real time. This helps monitor and analyze your business activities and tune related configurations if needed.
Instant logs are lightweight, easy to use, and do not require any additional configurations. With instant logs, you can view the access logs of specific websites in real time in the ESA console. This helps you pinpoint attacks, troubleshoot system faults, and debug or test network connectivity between clients and websites.