Link11 Features
Content (3)
Static Content Caching
Caching of static content at distributed PoPs for faster load times.
Dynamic Content Routing
Routing of dynamic content for faster load time of dynamic pages.
Cache purging
The ability to purge the cache from different edge location PoPs.
Security (2)
SSL
Shared SSL certificate.
Custom SSL
SSL certificate that you provide to the CDN software, or is provided for you and is not shared.
Management (7)
Dashboard
An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization's Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance.
Reports
Access pre-built and custom reports.
Logs
Record of data changes taking place in the software.
IT Alerting
Send summary, update, or actionable alerts to administrators to detail activity.
Network Capacity
Provide control over traffic. Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.
Logging
Information on each incident is stored in databases for user reference and analytics.
API / Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Integration (2)
API
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
CMS Integration
Standard integrations for common CMS tools.
Analysis (3)
Logging and Reporting
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
Issue Tracking
Track issues and manage resolutions.
Security Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Controls (3)
Application-Layer Controls
Gives user configurable rules to control requests, protocols and policies.
Traffic Controls
Limits access to suspicious visitors and monitors for traffic spikes to prevent overloads like DDoS attacks.
Network Controls
Lets users provision networks, deliver content, balance loads, and manage traffic.
Functionality (6)
API / Integrations
API / Integrations
Extensibility
Provides the ability to extend the platform to include additional features and functionalities
Bot Traffic
Control and filter bot traffic.
DNS Lookups
Associate information from various domains to identify associated parties and threats.
Threat Intelligence
Develops domain reputation by gathering contextual information related to web-based threats.
Advanced Traffic Filtering
Allows DNS routing to resolve requests across HTTP or HTTPs requests and/or covers IPv4 and IPv6 protocols.
Protection (9)
DNS Protection
Detect and protect against attacks targeting domain name servers.
Website Protection
Detect and protect against attacks targeting websites.
Infrastructure Protection
Detect and protect against attacks targeting on-premise or locally controlled infrastructure.
Quarantine
Blocks malicious website or destination, redirecting the user to a secure page
Continuous Monitoring
Monitors 24/7 to detect anomalies in functionality, user accessibility, traffic flows, and tampering.
Off-Network Protection
Supports agent-based DNS protection with individual endpoint devices on any network.
Guest Network Protection
Allows DNS filtering and protection for guest WiFi networks.
BYOD Protection
Supports bring-your-own-device (BYOD) users, supporting DNS protection across any device connected to a network or equipped with an agent.
Native DNS over HTTPS (DoH)
“DoH” is a protocol that facilitates DNS resolution via HTTPS. Native DoH functionality facilitates DNS over DoH using local agents to manage DNS requests, extending DoH beyond a single browser or network.
Resolution (5)
Attack Mitigation
Monitors for and rids systems of bots, or other threats suspected of committing unauthorized actions.
Network Monitoring
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Security Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Resolution Automation
Diagnoses and resolves incidents without the need for human interaction.
Administration (5)
Whitelisting
The ability to green light a specific Domain or system to bypass the scanning process.
Policy Enforcement
Abilities to set DNS protection policy control standards including whitelisting, blacklisting, and application access.
Incident Reports
Produces reports detailing suspicious activity and anomalies related to networks and endpoints.
Domain Categorization
Allows administrators to group users and devices based on IP, Endpoint, or role.
Multi-Network Management
Allows centralized administration and control of DNS protection and policies across multiple networks.
Generative AI (1)
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Content Delivery Network (CDN) (1)
Proactive Assistance
Anticipates needs and offers suggestions without prompting



