ES EN
Under attack?
  • Is your web secure?
  • Log in
  • Why Transparent Edge
    • Why Transparent Edge
    • What makes us different
    • European technology
    • Our platform
    • Success stories
    • About us
  • Products
    • CYBERSECURITY
      • Perimetrical
        • WAF
        • Anti-DDos
        • Bot Mitigation
        • Anomaly detection
      • IP Analysis
    • CONTENT DELIVERY
      • Next-generation CDN
      • Dedicated CDN
      • Licensed CDN
    • i3 image optimizer
    • Edge Transcoding
    • Origin
  • Solutions
    • BY SECTOR
      • Public Administration
      • Mass media
      • E-Commerce
      • E-Learning
      • Hostings
      • Travel
      • Government and defense
    • BY NEED
      • Securing websites and API
      • Observability
      • Cloud cost reduction
      • Video Streaming
    • USE CASES
      • Ticket scalping
      • Denial of inventory
      • DDoS attacks
      • Website spoofing
  • Partners
  • Packs
  • Blog
CONTACT US
CONTACT US
Under attack?


  • Why Transparent Edge
    • Why Transparent Edge
    • What makes us different
    • European technology
    • Our platform
    • Success stories
    • About us
  • Products
    • CYBERSECURITY
      • Perimetrical
        • WAF
        • Anti-DDos
        • Bot Mitigation
        • Anomaly detection
      • IP Analysis
    • CONTENT DELIVERY
      • Next-generation CDN
      • Dedicated CDN
      • Licensed CDN
    • i3 image optimizer
    • Edge Transcoding
    • Origin
  • Solutions
    • BY SECTOR
      • Public Administration
      • Mass media
      • E-Commerce
      • E-Learning
      • Hostings
      • Travel
      • Government and defense
    • BY NEED
      • Securing websites and API
      • Observability
      • Cloud cost reduction
      • Video Streaming
    • USE CASES
      • Ticket scalping
      • Denial of inventory
      • DDoS attacks
      • Website spoofing
  • Partners
  • Packs
  • Blog
  • Is your web secure?
  • Log in
Español English
Home
21 Sep 23

Securing content through the use of tokens

In this post we discuss how to secure the delivery of video content with tokens and what strategy we use in our CDN.
06 Mar 23

Female leaders in technology

Improving the world defined by the Internet is in Transparent Edge’s DNA. We do this with our CDN, which we […]
01 Sep 22

The current challenge: cloud cost saving

Cloud computing has transformed the way in which businesses and organizations operate. Who remembers that time when online activities revolved […]
04 Aug 22

PrestaShop: security vulnerability

PrestaShop, the company that gives name to the famous CMS (content management system) in open source, has reported a vulnerability […]
28 Jul 22

Our real-time log delivery system

When I started at Transparent Edge, one of my first tasks was to implement a log delivery system in real-time. […]
14 Jul 22

Origin shield: CDN and additional protection

In this hyperconnected world, in which devices multiply exponentially, overloads are a reality. This is why it’s advisable to look […]
07 Jul 22

A/B Testing at the edge

In a world defined by the Internet, many companies need to evaluate different options regarding their business development. We’re not […]
29 Jun 22

Ensuring maximum CDN performance

Benefits of CDN and how to ensure maximum CDN performance to reduce latency in loading web page content.
23 Jun 22

CDN and online media

When at Transparent Edge we explain (to someone with no technical knowledge) what a CDN is, we usually bring up […]
15 Jun 22

What is canary deployment?

What is canary deployment and how does this type of test prevent an entire application from crashing?
08 Jun 22

Mujeres en Informática

A Sara Fernández Arias le gusta la Informática desde pequeña. Siempre tuvo mucha facilidad con ella. Por ejemplo, si en […]
01 Jun 22

2FA and security

Security is the top priority everyone’s after when, as in our case, you are the line of defense separating your […]
1 2 3 »
  • Solutions
    • By sector
      • E-Commerce
      • E-Learning
      • Hostings
      • Media outlets
      • Public Administration
      • Travel
    • By need
      • Cloud cost reduction
      • Securing web environments and API
      • Observability
      • Video streaming
    • Solutions for partners
      • Join our partners program
  • Resources
    • Blog
    • Download area
    • Documentation
  • Transparent Edge
    • About us
    • Our clients
    • Work with us
    • Press room
SUBSCRIBE TO THE NEWSLETTER!

Stay up to date on all the latest about cybersecurity for websites and API and protect your digital vector.

ENS certified Esquema Nacional de Seguridad categoria ALTA
  • Legal Notice
  • Privacy Policy
  • Cookies Policy
  • Information security policy
linkedin twitter
Gestionar el consentimiento de las cookies
Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones.
Funcional Always active
El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Estadísticas
El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en una web o en varias web con fines de marketing similares.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Ver preferencias
  • {title}
  • {title}
  • {title}