Zero Touch WAF
Web Application Firewall
Zero Touch WAF in a more
The Zero Touch WAF (Web Application Firewall) is a service for detecting application attacks on the Origin server protected by the Link11 Web Security Suite. The system detects and blocks typical indicators of OWASP Top 10 vulnerabilities.
All incoming HTTP requests are accepted by the Web DDoS system and forwarded to Zero Touch WAF module if valid. The Zero Touch WAF module checks the request using regular expressions for anomalies according to the OWASP classification. Typical attack types are: Reflected XSS, Stored XSS, DOM XSS, XXE, SQL injection, OS command injection and known application vulnerabilities. If an anomaly is detected in the HTTP request, the system responds to the request with a configurable error page and the request is not forwarded to the Origin server.
Zero Touch WAF: Low effort, high return
Why combine DDoS Protection with a WAF?
One reason is that cyber criminals can use DDoS attacks as a diversionary tactic to access personal data. Link11 Zero Touch WAF reliably detects web application attacks such as SQLinjection, XSS, and CSRF if they’re part of OWASP Top 10, and blocks the malicious requests to ensure 24/7 availability of web resources. When WAF is deployed as an add-on to Link11 DDoS Protection, its performance is maximized and DDoS protection is extended by additional security.
- Part of the Link11 Web Security Suite
- Integrated, and scalable solution
- Protects against OWASP Top 10 threats
- Zero-touch means little configuration and maintenance work
- Enables centralized management of all applications (on-premises and cloud)
Why companies should
implement a WAF
Companies in all industries increasingly rely on digital infrastructure to manage core business functions and even deploy their own web applications. To secure these services and data, a WAF is the central component of IT security. A WAF monitors and filters all traffic from web, mobile, and API applications.
WAF protection should include a variety of attacks such as OWASP Top 10, Layer 7 attacks, and zero-day threats to prevent compromises and data breaches.
Latest DDoS Warnings, News, Background Articles
New Security Blog Articles
Over the weekend, a critical security vulnerability was found in a server software that is widely used around the world and could …
Companies were faced with a flood of DDoS attacks, which have now exceeded the terabit barrier The Black Friday weekend didn’t only …