AWF – WEB APPLICATION FIREWALL

1. AWF

Array’s AWF Series Web application firewalls extend beyond traditional firewalls and intrusion detection systems (IDSs) to provide comprehensive protection for business-critical Web applications. The AWF Series not only detects the complex Web application attacks of today, but also blocks the attack traffic in real time without affecting the normal flow of business data traffic. In addition, the AWF Series provides extremely fine-grained attack detection and analysis capabilities while protecting against the most common Web application threats including SQL injection attacks, Web page tampering, Web site malicious code, and disclosure of sensitive information.

2. Features

• Next-generation Web application firewall operates in multiple layers to protect vital Web servers and applications

• Continuous scanning for Web application vulnerabilities and for SQL injection or cross-site scripting and other threats within applications

• Active incident response including detection, blocking and prevention of intrusion and other attacks, including zero-day detection by abnormal behavior analysis techniques

• Post-incident diagnosis and analysis of security issues to reduce overall security risk and maintain Web site credibility

• Highly refined signature library includes sophisticated protections against SQL injection, cross-site scripting, scanning, information leakage, crawlers, protocol attacks and more

• Synchronizes IP reputation data with Array’s online security intelligence center (at no cost) and with third-party intelligence service subscriptions

• Comprehensive Layer 1 through 7 protection for Web servers, including packet-filtering, URL-based access control, blacklist/whitelist and other protection functions

• Brute force attacks can be mitigated using DDoS protection for rate-limiting

• Web page tamper-proofing through centralized management and control of all Web tamper-proofing endpoints, with content monitoring, synchronization and publish functions

• Customizable attack signatures and flexible deployment/defense modes to meet the needs of complex Web applications

• Guided configuration with exception rules to reduce installation complexity and errors

• Comprehensive management portal provides visualized monitoring at the system, hardware, attack and tamper-proofing levels

• Auto-learning of hosts in the network allows administrators to automatically assign protection policies

• Role-based authentication at the administrator level to secure configuration and data and allow for auditing

• Logging and log analysis with graphical representation and easy export

Leave a comment

Hey, so you decided to leave a comment! That's great. Just fill in the required fields and hit submit. Note that your comment will need to be reviewed before its published.