Enterprise-Grade Website Security

Protecting Websites and Web Apps

Protecting your websites and web applications with an enterprise-class web application firewall (WAF), enhanced by advanced bot protection and backdoor shell detection services. Application access control is supported by two factor authentication (2FA) and ingress traffic management.

  • Best-in-class, PCI-certified web application firewall.
  • In-Depth Threat Reporting and Analysis.
  • Cloud-Based, Big Data Security Approach.

Features

Web Application Firewall (WAF)

  • Maintained and updated by a dedicated security team
  • Web Application Firewall is PCI certified
  • Ability to configure custom rules
  • Protection from all application security threats

Bad Bot Mitigation

  • Database containing millions of bot signature variants
  • Your website's load speed will not be affected
  • Avoids the routine use of CAPTCHA
  • Offering a live view of all incoming traffic

Backdoor Shell Protection

  • Intercepting all malicious incoming requests
  • Accurately locating and quarantining backdoor files
  • Transparently integrated into Web Application Firewall
  • Protection from newly discovered malware variants

Advanced Persistent Threat (APT)

  • Industry-leading web application firewall (WAF)
  • Comprehensive suite of DDoS protection services
  • Flexible two factor authentication (2FA)
  • Backdoor shell detection and removal

Questions and Answers

Often people refer to Cross Site Scripting as CSS. There has been a lot of confusion with Cascading Style Sheets (CSS) and cross site scripting. Some security people refer to Cross Site Scripting as XSS.
SSI Injection (Server-side Include) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection exploits a web application's failure to sanitize user-supplied data before they are inserted into a server-side interpreted HTML file
Cross Site Request Forgery (also known as XSRF) works by exploiting the trust of a users intentions. Site tasks are usually linked to specific urls (Example: http://site/stocks?buy=100&stock=ebay) allowing a certain action to happen when visited by the user.
SQL Injection happens when a developer accepts user input that is directly placed into a SQL Statement and doesn't properly filter out dangerous characters. This can allow an attacker to not only steal data from your database, but also modify and delete it.