Positive protection model in the form of Intended Use Guidelines protects you against known and unknown attacks. Gives you peace of mind.
Effectively mitigates a long list of application-manipulation attacks including SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Keeps your data safe and you compliant.
Shields your Web server against attempts to exploit over 14,000 common server misconfigurations, as well as an ever-expanding universe of known 3rd-party software vulnerabilities. Minimizes your risk by keeping you one step ahead of attackers.
Saves you time and money during implementation. Just boot up and run through the 5-step Quick Start process. All this from an ISO image under 7 megabytes!
Keeps you informed of attacks as they occur using 2 convenient delivery methods:
The "POST" option enables enhanced logging to SQL databases and/or triggering other alert mechanisms.
Extensive HTTP request and response data can be captured in a plain text log file giving you profound insight into your Web activity.
Compatible with a wide variety of analytical tools.
Familiar, cross-platform, standards-based thin-client user interface.
Inspects both encrypted (https) and unencrypted (http) traffic.
Ready for high-volume environments that utilize stateful load-balancing technologies.
Minimizes implementation and on-going administration. Saves you time and money.* 1 megabyte file size limitation.