escudo logo

WAF – Web Application Firewall

Protect your site against hackers and the most critical web vulnerabilities, such as SQL Injection, Cross-Site Scripting (XSS) and Brute-Force.

What is WAF? (Web Application Firewall)

A WAF, or Web Application Firewall, is a system that lies in between a website or mobile app and the rest of the internet, working as a barrier that blocks and protects your server against Hackers, Spammers, DDoS, SQL Injections and many other types of cyber attacks.

The WAF has been widely utilized in order to protect sites, Blogs, E-commerce, mobile apps and other online applications such as public APIs.

Understant quickly, with the video below, how a CDN with WAF can bring better security and speed to your system.

[youtube https://www.youtube.com/watch?v=WKxS_spzMOE&w=640&h=360]

In a more technical explanation:

While proxies generaly protect the user, the WAF protects the servers. A WAF is set up in order to protect a specific Web Application, or a group of Web Applications, and may be considered a reverse proxy.

The web application firewall is a highly scalable filter, where you apply a set of rules for an HTTP conversation, with the goal of protecting the application from common attacks, such as Cross-Site Scripting (XSS) and SQL Injection, before they reach the hosting servers.

error&money

Easy to configure and highly efficient protection

Use our Control Panel to set up the necessary rules to avoid downtime, data-theft and financial losses caused by ill-intended users.

Protection against OWASP’s Top 10 threats 

Protect against the most critical threats explited in web applications, such as SQL Injection, Cross Site Scripting (XSS), Brute Force e Remote File Inclusion.

firewall
event log

Event Log

In the event log you can check the details of each access and decide what should, or should not, be blocked.

Simulation Mode

It is possible to use the tool in simulation mode, in order to avoid blocking legitimate visits until you understand in details what types of access you wish to deny.

simular
opcoes

Firewall Rules

Configuration options to block by IP/IP range, Country or Continent, User Agent, Referer Host and URI. A complete tool that allows for  high level of customization.

Save traffic and infrastructure

Reduce traffic provenient from attacks and its related costs, like internet bandwidth, infrastructure and operational resources.

pig