Zero Touch WAF
Uncomplicated
Implementation
Constantly
Updating rules
DDoS
Behavior scores

Web Application Firewall
Zero Touch WAF in a more
intelligent way
The Zero Touch WAF (Web Application Firewall) is a service for detecting application attacks on the Origin server protected by the Link11 Web Security Suite. The system detects and blocks typical indicators of OWASP Top 10 vulnerabilities.
All incoming HTTP requests are accepted by the Web DDoS system and forwarded to Zero Touch WAF module if valid. The Zero Touch WAF module checks the request using regular expressions for anomalies according to the OWASP classification. Typical attack types are: Reflected XSS, Stored XSS, DOM XSS, XXE, SQL injection, OS command injection and known application vulnerabilities. If an anomaly is detected in the HTTP request, the system responds to the request with a configurable error page and the request is not forwarded to the Origin server.
Zero Touch WAF: Low effort, high return
Cost savings through the “zero touch” approach, which requires no human interaction and eliminates manual errors.
Say goodbye to resource-intensive, error-prone, and complex WAF configurations for application updates or scaling.
When used in combination with Link11’s DDoS Protection, Zero Touch WAF’s resilience to potential overload attacks is significantly increased.
Why combine DDoS Protection with a WAF?
One reason is that cyber criminals can use DDoS attacks as a diversionary tactic to access personal data. Link11 Zero Touch WAF reliably detects web application attacks such as SQLinjection, XSS, and CSRF if they’re part of OWASP Top 10, and blocks the malicious requests to ensure 24/7 availability of web resources. When WAF is deployed as an add-on to Link11 DDoS Protection, its performance is maximized and DDoS protection is extended by additional security.
- Part of the Link11 Web Security Suite
- Integrated, and scalable solution
- Protects against OWASP Top 10 threats
- DDoS-protected
- Zero Touch means little configuration and maintenance work
- Enables centralized management of all applications (on-premises and cloud)
- Enterprise-ready
Why companies should
implement a WAF
Companies in all industries increasingly rely on digital infrastructure to manage core business functions and even deploy their own web applications. To secure these services and data, a WAF is the central component of IT security. A WAF monitors and filters all traffic from web, mobile, and API applications.
WAF protection should include a variety of attacks such as OWASP Top 10, Layer 7 attacks, and zero-day threats to prevent compromises and data breaches.


Got curious about our Zero Touch WAF?
We are happy to advise you on an individual
WAF solution for your company.
Latest DDoS Warnings, News, Background Articles
New Security Blog Articles
What is Ransom DDoS?
When cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in …
HTTP and HTTPS: What is the difference?
The HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. …
What is Captcha and how does it work?
CAPTCHA is a popular security mechanism that is often used to protect against spam on websites. Almost everyone has had to deal …