A Positive Protection Model in the form of Intended Use Guidelines (IUG) protects you against known and unknown attacks - no signatures required! Gives you peace of mind.
Effectively mitigates a long list of application-manipulation attacks including SQL injection (SQLI), cross-site scripting (XSS), and cross-site request forgery (CSRF) - just to name a few. Keeps your data safe and you compliant.
Shields your Web server against attempts to exploit over 14,000 common server misconfigurations, as well as an ever-expanding universe of known 3rd-party software vulnerabilities. Minimizes your risk by keeping you one step ahead of attackers.
Keeps you informed of attacks as they occur using 3 convenient delivery methods:
The "POST" option enables enhanced logging to SQL databases and/or triggering other alert mechanisms.
Leverages your existing logging strategies and tools.
Extensive HTTP request and response data can be captured in a plain text log file giving you profound insight into your Web activity.
Compatible with a wide variety of analytical tools.
Familiar, cross-platform, standards-based thin-client user interface.
Saves you time and money during implementation.
Inspects both encrypted (https) and unencrypted (http) traffic.
Ready for high-volume environments that utilize stateful load-balancing technologies.
Minimizes implementation and on-going administration. Saves you time and money.