Web Application Firewall (WAF)

Web Application Firewall (WAF) learns the structure and parameters of the protected Web application and uses these insights to restrict application input to legitimate data only. This allows WAF to: Protect Web applications against specific attacks, such as SQL injection and cross-site scripting, not detected by other security measures such as IPS, etc. Prevent Websites from being compromised with malicious code that attacks Website visitors (Watering Hole). Effectively secure Web applications against application-level DoS attacks (such as flooding with HTTP GET and HTTP POST requests). Imperva WAF is a key component of a comprehensive Web Application and API Protection (WAAP) stack that secures at the edge to databases, ensuring that the traffic you receive is only the traffic you want. It provides the best automated protection in the industry - PCI compliant, which integrates analytics beyond the OWASP Top 10 and reduces the risk posed by third-party code.
Web Application Firewall
No image
Settings
web-application-firewall-waf
Sadržaj
Cloud WAF

This is a 100% SaaS-based solution for protecting websites (including APIs) from external threats. It is based on a network of secure reverse proxy servers deployed in a globally distributed Content Delivery Network (CDN). Internet traffic directed through the Imperva network is terminated by the proxy, allowing Imperva to inspect every request to the site and identify and block any malicious activities.

API Security

To adequately protect APIs, it is necessary to combine typical WAF protection with specialized API Security mechanisms. Only such an approach can guarantee full protection (comprehensive WAAP protection). The API Security product is an additional tool that complements the Cloud WAF platform. The product can analyze both endpoints that are public (via Cloud WAF) and those not visible from the Internet. The latter can be monitored through integration with API gateways or through direct monitoring of network traffic.

DDoS Protection for Websites and APIs

Websites using Imperva DDoS Protection are protected from all types of DDoS attacks, including network (layers 3 and 4) and application (layer 7) attacks. The secure HTTP proxy server terminates TCP connections, acting as a buffer between the Internet and the origin server, filtering all kinds of DDoS attacks such as SYN Floods and UDP Floods. Only legitimate TCP sessions are forwarded to the origin server.

WAF Gateway (on-prem WAF)

This product allows comprehensive application protection through a local component (physical device or virtual machine). It enables a very wide range of customization options and provides full flexibility in how it integrates with the application. It is an excellent solution for larger clients with a SOC who require flexibility in configuring the solution. The product is also ideal for organizations where SaaS-based protection is unacceptable due to regulatory requirements.

Advanced Bot Protection

This advanced tool is designed to counter the most motivated actors who cause significant business damage to the organization. This product is often combined with API Security to enhance protection against bots that use APIs to conduct business logic attacks such as data extraction from websites, credential stuffing, and credit card theft.

Attack Analytics

This tool helps speed up the investigation of WAF security alerts. It provides a comprehensive view of attacks and adversaries targeting resources. The Attack Analytics service aggregates and analyzes security alerts, identifying common characteristics and grouping them into meaningful security incidents.

Account Takeover Protection

Imperva Account Takeover Protection is part of the Imperva Cloud Application Security suite. It detects and mitigates account takeover attempts, protecting web applications from volumetric and slow ATO attacks. The product focuses on protecting the authentication page of the protected application.

Client-Side Protection

Similar to ATO, it is part of the Imperva Cloud Application Security suite. This functionality protects data from theft through client-side attacks such as Digital Skimming, Formjacking, Supply Chain Attacks, and Magecart. These attacks are used to compromise the security of applications, but instead of stealing from the database, data is stolen directly from clients. All attacks occur outside the company's boundaries, making it significantly more difficult for the company to detect such attacks.

Runtime Application Self Protection (RASP)

This is a lightweight plugin that protects applications from the inside using LangSec methodology. It embeds during application runtime to monitor and protect the application without requiring any additional infrastructure. RASP is completely autonomous, requires no network connections, and operates in any deployment architecture, whether on-premises, in the cloud, or in containers. It integrates security into the application development and lifecycle process, extending traditional AppSec vulnerability management approaches.