New

Security at Artifakt

Keep your website secure and reliable with better operational control and granular access roles. Safeguard your application from unwarranted connections, leveraging IP address management tools and audit trail monitoring.

Online Critical Production WAF 1000 400 600 Total Blocked Challenge Deny list & Allow list IP Addresses Office Aymeric Home Joachim Work Laura Office ON Allow list ADD IP GROUP
New

Protect your website against external threats

Artifakt provides your website with a Web Application Firewall. It is enabled by default on all your environments and cannot be disabled. Prevent attacks caused by DDOS, OWASP identified attacks and most common application threats.

Online Critical Production WAF Filter by country Action Taken 1000 400 600 Total Blocked Challenge Australia Austria France Russia United Kingdom United States
New

Control your website access

Take control of who can and (more importantly) can’t visit your website with our granular IP address controls like allow/deny listing addresses. Manage your website access by adding a password to sensitive environments or create SSH and SFTP accesses to your Developers. Your website is airtight.

Front IP Groups Server IP Groups Allow list Deny list Deny list & Allow list IP Addresses OFF OFF ADD IP GROUP ON Office Aymeric Home Joachim Work Laura Office
New

Free SSL certificates

Keeping customer data safe is critical. Artifakt natively offers HTTPS mode for all applications. We provide free SSL certificates so you never have to compromise on security. It automatically gets renewed when needed. We make sure it stays fully secure with an auto-redirect from HTTP to HTTPS, HSTS policy and the last version TLS 1.3.

https://example.com
More about security?
  • How does Artifakt protect me effectively from attacks?

    A Web Application Firewall is enabled by default on all your environments. It allows you to monitor activity on your web application and block malicious attacks.

    In order to determine the behavior that is applied to the traffic, a score is automatically applied to each request according to their nature, origin, and type of traffic.

    When this score exceeds the vigilance threshold, it trigger three different types of actions at the WAF level.

    • Block: The request has triggered a Firewall rule or we know for sure the request is a malicious attack—Artifakt WAF blocks this request.
    • Challenge: The request demonstrated previous suspicious activity online or we don’t know for sure the request is malicious—Artifakt WAF displays a CAPTCHA.
    • Log: The request is not suspicious enough to trigger a verification mechanism but potentially deserves your attention—Artifakt WAF logs the request. 

Also on our blog

Artifakt loves Git—deploy directly from your favorite Git platform with our new integration
Our Product and Engineering Teams worked have been working hard and we are happy to present our new and efficient Git integration for the Artifakt Platform.
5 min. read
10 June, by Aymeric
Announcing the Artifakt Partner Program—let’s build your customers’ success together
Web agencies are facing the pressure to deliver an infrastructure that combines robustness, resilience, and scalability. The Artifakt Partner program is here to help!
3 min. read
03 June, by Romain
Cloud hosting management: the black sheep of eCommerce websites
In this post, I’ll explore and explain the most common issues resulting from a poorly chosen hosting solution, as well as how managing your web projects in the cloud can help solve most, if not all of your problems.
5 min. read
06 May, by Aymeric
What is PaaS—advantages, disadvantages, and cost
In this post, we'll go over what PaaS is, its advantages & disadvantages, what makes it different from other cloud computing models, and more.
6 min. read
29 April, by Djalal
Industrial cloud automation is key to safely deploy web apps
A recent data center accident raised questions and concerns around cloud automation and, what is known as the shared responsibility model.
5 min. read
15 April, by Sebastien
Visit our blog