Positive protection model in the form of Intended Use Guidelines protects you against known and unknown attacks. Gives you peace of mind.
Shields your Web server against attempts to exploit over 14,000 common server misconfigurations, as well as an ever-expanding universe of known 3rd-party software vulnerabilities. Minimizes your risk by keeping you one step ahead of attackers.
Keeps you informed of attacks as they occur using 3 convenient delivery methods:
The "POST" option enables enhanced logging to SQL databases and/or triggering other alert mechanisms.
Leverages your existing logging strategies and tools.
Extensive HTTP request and response data can be captured in a plain text log file giving you profound insight into your Web activity.
Compatible with a wide variety of analytical tools.
Familiar, cross-platform, standards-based thin-client user interface.
Saves you time and money during implementation.
Inspects both encrypted (https) and unencrypted (http) traffic.
Ready for high-volume environments that utilize stateful load-balancing technologies.
Minimizes implementation and on-going administration. Saves you time and money.