WAF - Web Application Firewall | ||||||||||||||||||||
SSL Transactions/Second | N/A | N/A | N/A | N/A | 2500 | 1500 | N/A | N/A | N/A | N/A | 2000 | N/A | 2230 | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Platform Throughput | N/A | N/A | N/A | N/A | 25 Mbps | 5000 Mbps | N/A | N/A | N/A | N/A | 5000 Mbps | 25 Mbps | 500 Mbps | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Ports | N/A | N/A | N/A | N/A |
|
| N/A | N/A | N/A | N/A |
|
|
| N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Height | N/A | N/A | N/A | N/A | 1U (mini) | 1U | N/A | N/A | N/A | N/A | 1U | 1U (desktop) | 1U | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
SQL Injection Attacks | N/A | N/A | N/A | N/A | N/A | |||||||||||||||
Cross-Site Scripting Attacks | N/A | N/A | N/A | N/A | ||||||||||||||||
Cookie Tampering | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
Form Validation and Protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
HTTP and XML Reply and Request format validation | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
JSON payload inspection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Signature and Behavior based protections | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Data Loss Prevention (DLP) support | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
XML Denial of Service protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Authentication, authorization and auditing support | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||
Support for SSL offloading | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||
Reporting and Policy tools that provide for easier PCI-DSS compliance verification | N/A | N/A | N/A | N/A | N/A | |||||||||||||||
IP Reputation Database | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Support for LDAP, RADIUS, Local, SAML 2.0 | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
HIPPA compliance verification | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Layer 7 Denial of Service protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Layer 4 Denial of Service protection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Session Hijacking | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
SOX or BASEL II compliance verification | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Virtual Patching | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Integration with Sandbox | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
Authentication support NTLM and Kerberos | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Additional Protection for SMTP and FTP attacks (SPAM, Antivirus, Harvesting, Fraud) | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
DoS/DDoS protection/Botnet Protection | N/A | N/A | N/A | N/A | N/A | |||||||||||||||
Stateful Firewall | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
SOAP, HTML5 sockets, Web 2.0 Protections | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
3rd Party Vulnerability Integrations | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
NSS Labs Recommended | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
WAF - Web Application Firewall |
SSL Transactions/Second |
Platform Throughput |
Ports |
Height |
SQL Injection Attacks |
Cross-Site Scripting Attacks |
Cookie Tampering |
Form Validation and Protection |
HTTP and XML Reply and Request format validation |
JSON payload inspection |
Signature and Behavior based protections |
Data Loss Prevention (DLP) support |
XML Denial of Service protection |
Authentication, authorization and auditing support |
Support for SSL offloading |
Reporting and Policy tools that provide for easier PCI-DSS compliance verification |
IP Reputation Database |
Support for LDAP, RADIUS, Local, SAML 2.0 |
HIPPA compliance verification |
Layer 7 Denial of Service protection |
Layer 4 Denial of Service protection |
Session Hijacking |
SOX or BASEL II compliance verification |
Virtual Patching |
Integration with Sandbox |
Authentication support NTLM and Kerberos |
Additional Protection for SMTP and FTP attacks (SPAM, Antivirus, Harvesting, Fraud) |
DoS/DDoS protection/Botnet Protection |
Stateful Firewall |
SOAP, HTML5 sockets, Web 2.0 Protections |
3rd Party Vulnerability Integrations |
NSS Labs Recommended |