Overview

<p>The Web Application Firewall (WAF) is a web application firewall for enterprises to monitor and block common attacks on websites. It supports detection of SQL injection, XSS cross-station and other common OWASP attacks, helps users lower the risk of downtime and data tampering and theft, and hide the source station to prevent direct attacks.</p>

Advantages

<p><strong>Rapid configuration</strong></p> <p>Directly configuration on the cloud, no extra device increment needed.</p> <p><strong>Powerful protection</strong></p> <p>Rapid update on vulnerabilities and respective attacks. By analyzing the high-volume attack on the cloud, WAF can collect the attack indicators and malicious IP addresses, then block the source of attack directly.</p> <p><strong>Professional security consultants</strong></p> <p>Consultants with more than ten years of security practice can refine and optimize protection rules and repair 0 day vulnerability within 24 hours to constantly improve the security and availability of WAF.</p> <p><strong>Rules be effective immediately</strong></p> <p>Users can define the protection rules based on their own needs and situation, and the rules are synchronized all through the network within seconds.</p>

Functions

<p><strong>Common Web attack protection</strong></p> <p>&bull; Support comprehensive detection of SQL injection, XSS cross-site scripting, file inclusion, command execution and other common OWASP threats.</p> <p><strong>Relieve CC attacks</strong></p> <p>&bull; Control the frequency of access to a single source IP, redirect jump verification etc.; identify abnormal response code, IP access, URL anomaly distribution in massive slow request attacks; filter the requests of abnormal referer and User-agent with access control.</p> <p><strong>0day patches are updated regularly in a timely manner</strong></p> <p>&bull; Update the latest vulnerability patches within 24 hours and the protection rules in time.</p> <p><strong>Custom rules</strong></p> <p>&bull; Support independent definition of protection rules according to their own business conditions, accurately blocking malicious traffic or releasing legitimate requests.</p>

Application Scenarios

<p><strong>Prevent data leakage</strong></p> <p>Hackers scan the website and find an injection risk in the page. Through manual construction of SQL injection statements, hackers infiltrate your database and get the relevant core data of the website.</p> <p><strong>Defense against malicious CC attacks</strong></p> <p>A website is attacked by competitors or blackmailed by hackers. They issued a large number of malicious CC requests and consumed the server&#39;s core resources for a long time, which damaged the server&#39;s performance and resulted in slow website business response and service failure.</p> <p><strong>Virtual patches repair vulnerabilities</strong></p> <p>After the web security vulnerabilities were exposed by a public platform, codes cannot be fixed quickly, so virtual patches are required to defense against vulnerability attacks.</p>
Did the above content solve your problem? Yes No
Please complete information!

Call us

400-151-8800

Email us

cloud@pingan.com

Online customer service

Instant reply

Technical Support

cloud products