Varnish Layered Security Suite

Stop Bad Traffic. Accelerate Real Users.

Varnish Layered Security is a unified security runtime that integrates WAF, bot mitigation, and API protection into the caching and delivery layer. Eliminate the latency of external hops with in-process security logic that ensures privacy and resilience, from edge to origin.

 

Explore Tiers + Pricing

A unified security runtime

What is Varnish Layered Security?

Varnish Layered Security is a programmable policy engine that transforms your delivery tier into a unified security runtime.

It provides Layer 7 protection, distributed traffic governance, and origin shielding across your entire infrastructure, for total programmatic control over how traffic is sanitized and secured.

Replace inflexible, opaque defenses with a software layer that filters traffic and synchronizes global threat responses. Protect operations with autonomous real-time defenses while keeping costs predictable at scale.

Built on Varnish Enterprise: An extension for the Varnish Enterprise core that acts as a unified security runtime for your delivery environment, executing logic in-process wherever your traffic flows.

Layeredsecuritydiagram

Capabilities

Integrated Defense & Enforcement

Layer 7 Threat Protection
WAF WAF & Vulnerability Defense Block OWASP Top 10 threats in-process. Stop exploits directly in the request path without latency-heavy inspection hops.
Bot & Abuse Mitigation Identify and neutralize scrapers and automated fraud at the edge before they hit your compute resources.
Origin & DDoS Shielding Absorb volumetric attacks and protect backend stability with a high-performance buffer that blocks requests pre-origin.
Identity & Access Control
High-Speed API Security Validate JWT and HMAC tokens at the entry point. Offload the "handshake tax" from your application logic.
In-Core TLS Secure communication with hardware-accelerated encryption and certificate validation.
Distributed Intelligence
Global Rate Limiting Synchronize traffic quotas across regions in real-time. Stop "low and slow" attacks that bypass local counters.
Real-Time State (KV Store) Instantly propagate security flags and dynamic blocklists across your entire global cluster in milliseconds.
Operations & Governance
Data & Logic Sovereignty Keep your code, logs, and certificates within your own perimeter. No third-party data-processing "black boxes."
Deep Observability Export 100+ log fields via OpenTelemetry or SIEM integrations for real-time forensics and audit compliance.

Why use Varnish Layered Security?

Architectural Advantages

Varnish Layered Security replaces rigid hardware and black-box cloud services with a private, programmable security suite that operates directly in the request path. This software-defined approach provides the following advantages:

In-Process Execution

Execute WAF, token validation, and rate limits in the HTTP flow at cache speeds.

Policy-as-Code

Use sophisticated logic to challenge suspicious bots while serving content to verified users.

Total Data Residency

Maintain total ownership of SSL keys, security logic, and telemetry to ensure global compliance.

Architectural Agility

The same engine for the edge, the origin shield, inside Kubernetes clusters and CI/CD workflows.

Speed2

Security Tiers & Plans

Essential Security

Standard Protection

Best for DevOps teams. Stabilize origins and reduce backend CPU cycles with native, in-path defaults that filter common bot noise.
  • Security foundations for Varnish Enterprise:
  • ✔ TLS Client & Backend
  • ✔ ACLs & Allowlisting
  • ✔ JWT/HMAC Validation
  • ✔ Basic Rate Limiting
  • ✔ Static GeoIP Policy
  • ✔ Lightweight Bot Filtering

Application Security

API & App Protection

Built for AppSec. Neutralize OWASP threats and scrub malicious parameters directly in-path without SaaS latency.
  • Includes Essential plus:
  • ✔ WAF (OWASP Core Rule Set)
  • ✔ Advanced Bot Mitigation
  • ✔ CAT/CBOR Serialization
  • ✔ Detailed TLS Statistics
  • ✔ Advanced Rule Definitions

Platform Security

Global Coordination

For Architects. Synchronize rate limits and security flags across global clusters in real-time via distributed KV store.
  • Includes Application plus:
  • ✔ Global Rate Limiting
  • ✔ Distributed KV Logic Store
  • ✔ Behavioral Anomaly Detection
  • ✔ Cross-Region Session Tracking
  • ✔ Compliance Dashboards
Integrated Intelligence Add-ons
DataDome Bot Detection
Atomicorp Advanced Ruleset
MaxMind GeoIP Intelligence

From the first packet to the global state

Varnish Defense in Depth

01. At the Edge
Conserve Compute Resources

Essential Security acts as your first line of defense. Neutralize automated port scans, known malicious bots, and noise at the entry point so your core infrastructure remains available for meaningful traffic.

02. In the Path
Harden Application Logic

Application Security offloads identity verification and input validation to the Varnish runtime. Enforce JWT authentication and WAF policies in-process before requests ever reach your backend application servers.

03. Global State
Universal State Synchronization

Platform Security ensures a unified perimeter. Use the distributed KV store to propagate security flags and rate limits across your entire footprint, so threats detected at one node are mitigated everywhere instantly.

Layers

Strategic outcomes

Sovereign Protection and Predictable Operations

Performance-First Security

Execute security logic in-process and sync global blocklists in milliseconds, for protection at speed.

Operational Agility

Deploy custom rules and mitigations that adapt to emerging threats in real-time.

Infrastructure Hardening

Offload security to the edge to neutralize volumetric attacks and preserve uptime for real users.

Predictable Financials

License-based model replaces unpredictable per-request costs, ensuring budget stability at scale.

Checklist

The autonomous security cycle

Programmable Defense Across Every Layer

Varnish is a versatile security runtime that closes the loop between visibility and enforcement. The packet is the trigger. Your defense reacts in milliseconds, autonomous from human intervention.

  • Sense (Real-Time Observability): Capture 100+ request fields in real-time. Stream rich telemetry via OpenTelemetry for an instant audit trail and deep forensic analysis.
  • Policy (Distributed Governance): Govern the perimeter using a distributed Key-Value Store. Synchronize security flags, rate-limit counters, and dynamic blocklists globally in milliseconds.
  • Act (Programmable Enforcement): Execute policy directly in the request path. Operating at the speed of the network ensures your infrastructure is protected without adding latency.
Security Fabric2

Use cases

Practical Applications

Pre-Origin Mitigation
Automated Pattern Blocking

Drop requests based on malicious paths, query parameters, or illegal headers at the first point of contact.

In-Path Request Sanitization

Strip malformed URLs and non-standard headers to prevent cache poisoning and unintended origin execution.

Global Orchestration & Response
Global Context Sharing

Neutralize a threat in one region and propagate the mitigation across your global footprint in milliseconds.

Active Adversary Frustration

Serve mock responses or tar-pit suspicious connections to exhaust attacker resources without impacting origin capacity.

Resource Offloading
Edge Token Validation

Reject malformed tokens at the edge to protect identity providers and keep app logic focused on validated users.

Compute Origin Shielding

Offload CPU-intensive WAF inspections to Varnish. Prevent backend exhaustion and maintain uptime during traffic spikes.

Sovereignty & Compliance
Geofencing & Residency

Enforce strict access and residency requirements at the edge to keep traffic logic within your sovereign perimeter.

Real-Time Audit Visibility

Stream high-fidelity telemetry via OpenTelemetry to your SIEM for instant forensics without origin involvement.

Next steps

Scale Security. Simplify Your Stack.

Varnish Layered Security replaces unpredictable volumetric billing with a transparent, license-based model designed for unlimited global scale.

 

Standard
Essential Security

Foundational tier. Stabilize origins and reduce backend CPU cycles with native security defaults.

API & App Protection
Application Security

Fixed-fee add-on. Harden APIs and application logic with advanced in-path protection.

Global Coordination
Platform Security

Fixed-fee add-on. Orchestrate global defense with real-time state synchronization.

 

Join the world’s largest CDNs, technology enterprises and streaming services using Varnish to accelerate and protect their data. For detailed pricing or to start a technical proof-of-concept, connect with our engineering team.

Mit einem Experten sprechen

Handshake2

Request a free trial