Zero Touch WAF
Web Application Firewall
Zero Touch WAF in a more
The Zero Touch WAF (Web Application Firewall) is a service for detecting application attacks on the Origin server protected by the Link11 Web Security Suite. The system detects and blocks typical indicators of OWASP Top 10 vulnerabilities.
All incoming HTTP requests are accepted by the Web DDoS system and forwarded to Zero Touch WAF module if valid. The Zero Touch WAF module checks the request using regular expressions for anomalies according to the OWASP classification. Typical attack types are: Reflected XSS, Stored XSS, DOM XSS, XXE, SQL injection, OS command injection and known application vulnerabilities. If an anomaly is detected in the HTTP request, the system responds to the request with a configurable error page and the request is not forwarded to the Origin server.
Zero Touch WAF: Low effort, high return
Why combine DDoS Protection with a WAF?
One reason is that cyber criminals can use DDoS attacks as a diversionary tactic to access personal data. Link11 Zero Touch WAF reliably detects web application attacks such as SQLinjection, XSS, and CSRF if they’re part of OWASP Top 10, and blocks the malicious requests to ensure 24/7 availability of web resources. When WAF is deployed as an add-on to Link11 DDoS Protection, its performance is maximized and DDoS protection is extended by additional security.
- Part of the Link11 Web Security Suite
- Integrated, and scalable solution
- Protects against OWASP Top 10 threats
- Zero Touch means little configuration and maintenance work
- Enables centralized management of all applications (on-premises and cloud)
Why companies should
implement a WAF
Companies in all industries increasingly rely on digital infrastructure to manage core business functions and even deploy their own web applications. To secure these services and data, a WAF is the central component of IT security. A WAF monitors and filters all traffic from web, mobile, and API applications.
WAF protection should include a variety of attacks such as OWASP Top 10, Layer 7 attacks, and zero-day threats to prevent compromises and data breaches.
Latest DDoS Warnings, News, Background Articles
New Security Blog Articles
When cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in …
The HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. …