New

Security at Artifakt

Keep your website secure and reliable with better operational control and granular access roles. Not only do you benefit from AWS secure data servers, but we also added extra layers of security to safeguard your application from unwarranted connections, leveraging IP address management tools and audit trail monitoring.

Online Critical Production WAF 1000 400 600 Total Blocked Challenge Deny list & Allow list IP Addresses Office Aymeric Home Joachim Work Laura Office ON Allow list ADD IP GROUP
New

Protect your website against external threats

The Artifakt platform is secured by Cloudflare, the global security network leader. We provide your web apps with a Web Application Firewall (WAF) that is enabled by default in all your environments. It prevents attacks caused by DDOS, OWASP-identified attacks, and most common application threats.

Online Critical Production WAF Filter by country Action Taken 1000 400 600 Total Blocked Challenge Australia Austria France Russia United Kingdom United States
New

Control your website access

We give you control over who can and cannot visit your applications. We added different features to make sure you get the security that best suits your business and your team’s workflows. Create and manage allow/deny listing IP addresses, add a password to sensitive environments or give access to your developers by creating SSH and SFTP accesses.

Front IP Groups Server IP Groups Allow list Deny list Deny list & Allow list IP Addresses OFF OFF ADD IP GROUP ON Office Aymeric Home Joachim Work Laura Office
New

Free SSL certificates

Artifakt natively offers HTTPS mode for all applications. We provide free SSL certificates so you never have to compromise on security. It automatically gets renewed before its expiration date. We make sure your application stays fully secure with an auto-redirect from HTTP to HTTPS, HSTS policy, and the last version of TLS.

https://example.com
More about security?
  • How does Artifakt protect me effectively from attacks?

    A Web Application Firewall is enabled by default on all your environments. It allows you to monitor activity on your web application and block malicious attacks.

    In order to determine the behavior that is applied to the traffic, a score is automatically applied to each request according to their nature, origin, and type of traffic.

    When this score exceeds the vigilance threshold, it trigger three different types of actions at the WAF level.

    • Block: The request has triggered a Firewall rule or we know for sure the request is a malicious attack—Artifakt WAF blocks this request.
    • Challenge: The request demonstrated previous suspicious activity online or we don’t know for sure the request is malicious—Artifakt WAF displays a CAPTCHA.
    • Log: The request is not suspicious enough to trigger a verification mechanism but potentially deserves your attention—Artifakt WAF logs the request. 

Also on our blog

Coding and testing Kubernetes controllers
When implementing Kubernetes, controllers are becoming increasingly present in the design system ecosystem. While I’m not saying you should throw away your Terraform or Ansible processes, it’s important to understand...
Etienne Coutaud
06 January
3 min. read
DevOps is not a free lunch: How DevOps can cost you more than you think
Remember Waterfall project management? When DevOps/Agile were the new kids on the block, software saw the light and all was going to be fixed (including the holy cows of specifications...
Djalal Elbe
16 December
4 min. read
Docker images are very different in local and production, they should not be
As anyone reading the 12factor manifesto, we want our projects to run in production the same way they’re running on our laptop, and we only accept minimal changes between environments:...
Djalal Elbe
25 November
7 min. read
Advantages of cloud hosting
Cloud hosting has a lot of advantages to offer—I could write an entire book about it! In this article, I'll limit myself to the 6 main advantages of cloud hosting and what they mean for your business. 
Eden Laboda
29 October
3 min. read
The phases of cloud migration
Migrating to the cloud is a fundamental shift for your business and it involves careful planning and execution throughout the journey to full cloud adoption.
Aymeric Aitamer
22 October
4 min. read