View
Sorting
Products found: 36
6Scan
What Does 6Scan Do?
- Find. The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.
- Fix. Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.
- Protect. 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.
Adnovum nevisProxy
nevisProxy is a secure reverse proxy with integrated web application firewall (WAF). It acts as a central upstream entry point for web traffic to integrated online applications. nevisProxy controls user access and protects sensitive data, applications, services, and systems from internal and external threats.
Features and Tasks:
- Protection against denial-of-service attacks
- SSL termination (encryption and acceleration)
- Session and timeout handling (single session)
- SSO (single signon)
- Initialization of multi-step authentication
- Authentication in cooperation with nevisAuth
- Propagation of user identities incl. additional information (roles) in secure token (SAML, JWT, Nevis SecToken, HTTP Header etc.)
- Role-based authorization
- Cookie caching
- Renegotiation of client session association
- Caching and data compression
- Content inspection and validation (HTML, XML, JSON etc.)
- Input validation (black- and whitelists with self-learning)
- Virtual patching enables rapid reaction in case of serious security threats
- URL signing and encryption
Airlock Web Application Firewall
- Secure Reverse Proxy
- Central Checkpoint
- Filtering
- API Security
- Dynamic Whitelisting
- Central Security Hub
- High Availability and Performance
Akamai Kona Web Application Firewall
With Kona WAF you can:
- Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.
- Ensure high performance even during attacks thanks to Akamai’s globally architecture.
- Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.
- Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.
- Kona WAF provides comprehensive capabilities to protect against application-layer attacks.
- Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.
- Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.
- Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.
- Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.
- Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.
AWS WAF - Web Application Firewall
Barracuda WAF-as-a-Service
- Application security is complicated to deploy and manage without specialized resources.
- Continuous updates to applications can lead to new vulnerabilities.
- Legacy applications were developed without secure coding practices.
- Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.
- Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.
- Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.
- Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.
- Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.
- Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.
Barracuda Web Application Firewall
Carbon Black (CB) Protection
CB Protection combines application whitelisting, file integrity monitoring, full-featured device control and memory/tamper protection into a single agent. CB Protection watches for behavioral indicators of malicious activity and conducts continuous recording of attack details to provide rich visibility into everything suspicious that attackers attempt to do. With the addition of the File Delete feature, CB Protection is now a direct control for requirement 5 of PCI DSS, enabling customers to remove traditional antivirus without the need for undergoing the compensating control process.
Security teams can harden their new and legacy systems against all unwanted change, simplify the compliance process, and provide the best possible protection for corporate systems at enterprise scale. CB Protection is available through MSSPs or directly through on-premise.
Key Capabilities
CB Protection is a powerful positive security solution for data centers and critical systems that allows server admins to control change while consolidating agents. Using a ‘Default Deny’ approach, CB Protection reduces your attack surface and downtime by automating approval of trusted software and eliminating the burden of whitelist management.
Lock Down Critical Systems
Stop malware and non-malware attacks by preventing unwanted changes to your applications and files, providing you with the control over your environment that you need.
Ensure Continuous Compliance
Accelerate compliance by meeting many of the requirements in regulatory standards and frameworks, such as PCI-DSS, HIPAA/HITECH, SOX, NERC CIP, GDPR and NIST 800-53.
High Performance and Low Touch Application Control
Be confident that your solution is blocking the “bad” and allowing the “good” without interrupting daily operations.
Citrix ADC (Application Delivery Controller)
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Application delivery controllers are purpose-built networking appliances whose function is to improve the performance, security and resiliency of applications delivered over the web.
Citrix ADC is an application delivery and load balancing solution that provides a high-quality user experience for your web, traditional, and cloud-native applications regardless of where they are hosted. It comes in a wide variety of form factors and deployment options without locking you into a single cloud. Pooled capacity licensing enables the movement of capacity among cloud deployments.
The main features of Citrix ADC:
- Provides industry-leading app delivery and load balancing
- Fully integrates with Cisco ACI; endorsed as a Cisco ACE replacement
- Offers the most comprehensive set of ADC features in the ACI ecosystem
- Enables automation and orchestration of network-critical services to boost agility
Citrix NetScaler
Cloudflare web application firewall WAF
- Injection
- Broken Authentication and Session Management
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging & Monitoring
- Collective intelligence to identify new threats
- Reputation-based threat protection
- Comment spam protection
- Block or challenge visitors by IP address
- Block or challenge visitors by AS number
- Block or challenge visitors by country code
- User agent blocking
- Zone lockdown
- Security level configuration
CORE Security
Introducing CORE Security
When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.CORE Base
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Quarterly
- System hardening
- Next-generation firewall
- Advanced DDoS mitigation: Standard (20 Gbps)
CORE Enterprise
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation: Enhanced (250 Gbps)
- 24/7 SIEM services
CORE Platinum
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Managed Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation
- Pro (Terabit+)
- 24/7 SIEM services
- Intrusion Prevention System (IPS)
Bolt-on CORE Security™ Services
In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:- Data loss prevention (DLP)
- Web application firewalls (WAF)
- Penetration testing
- URL filtering (Virtual Desktops only)
- Email spam filtering and antivirus (Exchange only)
- Compliance consultancy
DBAPPSecurity DAS-WAF
DBAPPSecurity Web Application Firewall (DAS-WAF), which is the innovative product with our intellectual property, protects Web Application from cyber attacks and control the critical data. It is designed to easily fit into any existing data center environment, rapidly secure and accelerate new and existing Web Applications out of the box. Deployment options include inline as well as offline modes.
DAS-WAF is placed between Web server and internet-facing firewall. All client connection requests received are accepted.
On the Incoming Path
- Terminates application layer protocols for maximum visibility, security and control
- Decrypts SSL traffic
- Normalizes the data to handle multiple encoding format and to detect malicious attacks
- Applies Website user access control check
- In-depth inspects the application layer traffic for any vulnerabilities
- Denies malicious traffic
Data Protection
- Outbound data is inspected for data leak prevention, such as sensitive information, social security number, bank account numbers, and credit card number, etc.
- The data is cloaked to hide server specific information to prevent hackers exploring Web server resources
- Data can be optionally compressed to accelerate the application delivery
- The data is encrypted and sent to the clients of the Web Application
System
- Logs all the data and actions were taken
- Provides a rich set of real-time reporting and alerting features based on the logs, actions and system status.
- Online update can be downloaded automatically from DBAPPSecurity update server.
Features
- Protection against more than 30 common attacks in Web application: After deploying DAS-WAF, the system enables automatic protection against all SQL injections, command injections, configuration injections, LDAP injection, cross-site scripting.
- PCI Compliance: DAS-WAF protect Web application from the OWASP Top 10 threats
- HTTP, HTTPS and FTP protocol compliance: DAS-WAF ensures that all inbound requests comply with the HTTP, HTTPS and FTP specifications respectively
- Outbound data theft protection: DAS-WAF in-depth inspects all server responses for sensitive information leakage. Users can configure custom patterns for data leak prevention.
- Protection against CC (Challenge Collapsar) attack and brute force attack: DAS-WAF can detect where to launch malicious attacks by learning user behavior of URL-based access, and intelligently block such CC attack, Brute Force attack.
- Protection against intellectual property theft: DAS-WAF can detect the intellectual property theft based on the signatures, and available for single theft mode and distributed theft mode.
- Virtual Patches: DAS-WAS enables WEB Application Vulnerability Scanner integration as virtual patches, to remediate the system in more timely fashion.
- Whitelist: It is a positive security model for neutralizing “Zero Day Attacks” which is not anticipated in advance. By Automated Learning, the system generates a positive profile for your application over time. Multiple configurable heuristics determine that anomalous traffic is not used for generation the profile.
- Failed Info Tracking: DAS-WAF can automatically identify failed server responses and classify the information whether it is WEB application error, or a database error, and makes the system remediation easier.
- Anti-tamper: It allows user to detect tampered webpage and prevent attack to publish tampered Webpage on client's server. Anti-tamper function uses G2 digital watermarking technology to detect and deny any tampering in real time.
- Web Application Acceleration: The system can accelerate the application delivery by caching static outgoing content, or compressing outgoing content which can significantly reduce the transmission times.
- Load Balancing (Only in Gateway): DAS-WAF provides the load balancing function to allow adding or removing servers for a protected website, without interrupting the existing traffic.
- Audit Logs: For audit purpose, you can use Audit Logs function to capture all administration and configuration activities of administrator.
DenyAll Web Application Firewall (LTS)
- Web Application Firewall (WAF): to protect the web applications vital to every business against external threats and to assure continuous service.
- Web Services Firewall (WSF): to protect the infrastructure, information networks and application servers against attacks while preventing denial of service and anticipating traffic overload.
- Web Access Management (WAM): to simplify Web access authentication while maintaining a high level of security, without agent deployment on the application server.
F5 Big-IP Application Security Manager
- Automated attacks and bots that overwhelm existing security solutions.
- Web attacks that steal credentials and gain unauthorized access across user accounts.
- Application layer attacks that evade static security based on reputation and manual signatures.
- New attack surfaces and threats due to the rapid adoption of APIs.
- Protect web and mobile applications from malicious bots;
- Safeguard credentials and sensitive data from theft and abuse;
- Defend against sophisticated application denial-of-service (DoS);
- Mitigate sophisticated threat campaigns;
- Protect APIs;
- Ensure application security and compliance;
- Turn on protection immediately;
- Patch vulnerabilities fast;
- Deploy flexibly;
- Defend with proven advanced protections;
- Magnify threat knowledge.
F5 Silverline Web Application Firewall
- Ensure application security and compliance
- Get comprehensive protection from advanced layer 7 attacks, OWASP Top Ten application security risks, and zero-day attacks—and enable compliance with key regulatory mandates.
- Get 24x7x365 expert service
- Receive 24x7x365 access to web application firewall (WAF) experts who build, proactively monitor, and fine-tune WAF policies against known and emerging threats.
- Deploy flexibly across hybrid environments
- Ensure consistent web application security, availability, and user experiences across traditional and cloud data centers.
- Defend with proven security effectiveness
- Leverage security efficacy with technology built on the NSS Labs–recommended F5 BIG-IP® Application Security Manager™ (ASM), based on tests that demonstrate 99.89 percent overall security effectiveness.
- Drive operational and cost efficiencies
- Remove the complexity of WAF management,
- increase the speed to deploy new policies, and
- decrease operational expenses.
- Gain attack insights and intelligence
- Access reports through the cloud-based customer portal and incorporate external intelligence for securing apps against identified threats.
- Drive Efficiencies with a Comprehensive Web Application Firewall Service
- Receive Expert Policy Building and Monitoring
- Hybrid Policy Management and Deployment
- Defend with Proven Security Effectiveness
- Comprehensive Attack Protection
- Built-In Compliance and Reporting Capabilities
- Gain Attack Insights and Intelligence
- Comprehensive Managed Service App Protection
- Streamlined Self-Service App Protection
- The Silverline Cloud-Based Platform
- Flexible Licensing
- Add-On Threat Intelligence Services
- F5 Security Operations Center
Fortinet FortiWeb: Web Application Firewall (WAF)
- Proven Web Application Protection. FortiWeb protects against all the OWASP Top-10 threats, DDoS attacks and many others to defend your mission critical web-based applications
- AI-based Threat Detection. In addition to regular signature updates and many other layers of defenses, FortiWeb’s AI-based, dual-layer machine learning engines protect against zero-day attacks
- Security Fabric Integration. Integration with FortiGate firewalls and FortiSandbox deliver protection from advanced persistent threats
- Advanced Visual Analytics. FortiWeb’s visual reporting tools provide detailed analyses of attack sources, types and other elements that provide insights not available with other WAF solutions
- False Positive Mitigation Tools. Advanced tools that minimize the day-to-day management of policies and exception lists to ensure only unwanted traffic is blocked
- Hardware-based Acceleration. FortiWeb delivers industry-leading protected WAF throughputs and blazing fast secure traffic encryption/decryption
Imperva Incapsula
- TCP SYN+ACK
- TCP FIN
- TCP RESET
- TCP ACK
- TCP ACK+PSH
- TCP Fragment
- UDP
- Slowloris
- Spoofing
- ICMP
- IGMP
- HTTP Flood
- Brute Force
- Connection Flood
- DNS Flood
- NXDomain
- Mixed SYN + UDP or ICMP + UDP Flood
- Ping of Death
- Smurf
- Reflected ICMP & UDP
- As well as other attacks
Imperva Web Application Firewall
Indusface IndusGuard
- IndusGuard WAF ensures continuous protection against attacks from hackers that exploit OWASP Top 10 vulnerabilities as well as enhanced application layer DDoS mitigation for bots, http connection abuse, clickjacking, Slowloris, and bandwidth theft.
- Zero False Positives & PCI 6.6 Compliance: Our WAF rules for known vulnerabilities never block legitimate traffic when tuned with IndusGuard Web application scanner. It also facilitates PCI compliance by fulfilling requirement 6.6.
- Continuous expert monitoring to validate efficiency of custom rules, ensure zero false positives, instant mitigation support for application exploitation incidences and detailed inspection of application traffic to analyze and block App DDoS attacks.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.