Tempesta Technologies
  • Home
  • Tempesta FW
    • Features
      • Web acceleration
      • Load balancing
      • Application performance monitoring
    • Performance
    • How it works
    • Deployment
    • Support
    • Knowledge base
  • Services
    • Software development
      • High performance
      • Networking
      • Databases
      • Linux kernel
      • Machine learning
      • How we work
      • Case studies
    • Performance analysis
    • Network security
      • DDoS protection
      • Application security
      • Cryptography
      • Security assessment
      • How we work
      • Case Studies
  • Solutions
    • DDoS Protection
    • Web Acceleration
  • Blog
  • Company
    • Research
    • Careers
    • Contact
Tempesta Technologies

Web Content Delivery and Security

Fork me on GitHub

High-performance and secure web content delivery

Fully in-house managed solutions for CDNs. No vendor locks. No third party dependencies.

For fast growing and innovative CDNs that want to deliver the best performance and security, Tempesta Technologies provides customizable solutions using the open source for secure low-latency and high throughput content delivery. This allows Internet companies to deliver the best user experience and not depend on vendor’s proprietary products or third party services.

High throughput and low latency

Improve throughput of a CDN edge node and reduce its latency with:

arrow1

Ready to use components, such as high-performance web cache and TLS

arrow2

Deep system analysis revealing sophisticated performance issues

arrow1

Performance optimizations of an open source or in-house proprietary software

icon_storage

Content storage

We contributed to the most sophisticated parts of the MariaDB and Percona XtraDB Cluster engines, so we know everything about efficient disk I/O. Old-fashion web proxies handle the web cache in filesystem (e.g. Nginx) or mmap() (e.g. Varnish) barely handle terabyte caches with millions of objects.
Tempesta FW’s cache is built on top of an in-memory database, which uses a cache-conscious lock-free data structure to service millions requests per second.
We develop optimized database-like storages for web content with:

arrow2

Machine learning for the best cache eviction strategy

arrow1

Compact lock-free indexes to reduce RAM overhead and improve concurrency

arrow2

Secondary per-upstream index for efficient Vary headers handling

arrow1

Optimized multi-disk IO for large HDD arrays or modern NVMe SSDs

icon_edge

Edge computing

Tempesta FW can map processed HTTP messages to the users space, where they can be processed in zero-copy fashion using any programming language with C binding, e.g. Rust, C++, JavaScript, Python etc. This allows serverless computations to run and finish with lowest latencies.
Besides the client serverless code, the Tempesta FW zero-copy HTTP message mapping is efficiently used to implement high-performance custom web application security logic (WAF).

icons_web_app_firewall

Web Application Firewall

Tempesta FW accelerates WAFs by offloading filtration rules and load balancing between multiple WAF instances. Our SIMD-accelerated HTTP parser performs x10 more security checks and is x2-3 faster than the popular open source HTTP proxies.
Combining Tempesta FW with powerful WAFs, like ModSecurity, builds highly secure and high-throughput web security solutions.

icon_ddos

DDoS mitigation

Tempesta FW provides a rich set of web application level (L7) DDoS mitigation techniques, such as rate limits, challenges and behaviour analysis, which do not break user experience.
We develop custom DPDK and XDP DDoS mitigation systems to protect specific non-web traffic from volumetric L3-L4 attacks

icon_bot

Bots detection

Behavior analysis of weighted graphs of client transitions, dynamic requests validation using advanced machine learning techniques, challenges with no or minimal impact to a user experience and JavaScript/markup honeypots in combination with reach rules engine provide multi-layer protection against application (L7) bot attacks. Efficient data compression, probabilistic algorithms and advanced performance optimizations make the computations fast enough to perform the clients classification even on entry level server hardware.

icon_opensource

Open source

arrow1

Build a feature full edge node with open source to avoid any vendor locks.

arrow2

Our team prepares ready to use CI/CD pipelines to deploy well-tuned open source software, such as Nginx, Varnish, HAproxy, ModSecurity, Curiefence and many others, to build a feature-full CDN edge node.

arrow1

Tempesta FW, our open source high-performance hybrid of HTTPS accelerator and firewall, provides a platform to build high-throughput low-latency secure edge nodes.

icon_machine_learning

Custom modules

Most businesses have unique workloads and client needs, e.g. a CDN specializing in gaming or online education traffic provides more client value if it uses specific solutions dplust to the traditional web acceleration. We develop custom software modules for:

arrow2

Advanced security solutions (e.g. machine learning driven bots detection)

arrow1

DDoS mitigation (e.g. our team developed the regular expressions running in XDP on 400Gbps by request of G-Core)

arrow2

Data storages capable to transfer hundreds thousand gigabits per second per node

arrow1

Flexible management software to dynamically configure and monitor thousands edge nodes

Case Studies

Kinescope
18 October 2022

Kinescope

We provided consulting services to improve performance of the video on demand and live video CDN edge nodes. We collected the time series data on the CDN operation statistics and developed a C++ data crunching program, which computes various web cache metrics. The metrics can be directly used to estimate the hardware configuration for a CDN edge node, which is the most optimal in terms of performance and cost. Read the full client review.
NetActuate
2 October 2023

NetActuate

A full CDN PoC, including a the control plane onboarding new clients and managing the proxy nodes, and the data plane with proxy nodes built on top of Tempesta FW was developed and launched by our team. Tempesta FW and other software for anycast operating nodes is deployed in fully automated CI/CD pipeline.
G-Core Labs
26 October 2022

G-Core Labs

We analyzed performance of a production CDN edge node running in one of the largest European Internet exchange. The Linux scheduler issue was revealed using advanced eBPF and perf scripts. That was a very exciting assignment and you can enjoy reading all the technical details about it in our blog post.

Powered by Tempesta FW

Stay up to date with our latest developments

Useful Links

Home
Blog

Tempesta® FW

Features
Performance
Deployment
Support
Knowledge Base

Services

Software Development
Performance analysis
Network Security

Solutions

DDoS Protection

Web Acceleration

Company

Research
Careers
Contact