|
Profense
Web Application Firewall |
|
What is a web application firewall? Basically this is a device sitting between the web client and web server, which is designed to protect the web server from attack. While most
organizations have a firewall to protect their network, they block or restrict access to certain ports. Traditional firewalls
must allow traffic to reach the web applications that an organization
exposes to internet, and therefore cannot inspect or evaluate messages
received via the web application.
Research has shown that web applications
are frequently the initial point of attack. In fact the PCI
DSS requirement 6.6 requires applications exposed to the public
internet be protected against the most common types of malicious input
or attacks. The web application firewall will look at every request and response to ensure that they are legitmate requests.
Profense
Web Application Firewall, by Armorlogic ApS, not only proactively protects
web applications and servers against attacks from malicious hackers
and worms but improves performance and reduces traffic cost.
Profense
is a software appliance that can be downloaded for a 60 day trial prior to
purchase. Download the product sheet
Profense
Features (Download Profense feature sheet)
| Features |
Profense Base |
Profense
Professional |
|
| Web Application Firewall - More Information - > |
| Positive
Filtering |
|
|
| Negative
Filtering |
|
|
| HTTPS (SSL) Supported |
|
|
| Attack Alert- Email |
|
|
| Automated Policy Generation |
|
|
| Automode - Adaptive Learning |
|
|
| DoS mitigation |
|
|
| Output Filtering and rewriting |
|
|
| XML web services support |
|
|
| Access log |
|
|
| Attack alert - external Syslog |
|
|
| Session protection |
|
|
| CSRF protection |
|
|
| Log data masking |
|
|
| Web acceleration |
| Traffic
Compression |
|
|
| TCP
connection off-loading |
|
|
| Static
content caching |
|
|
| Dynamic
content caching |
|
|
| Load
Balancing |
| HTTP
Load balancing |
|
|
| HTTPS
Load balancing |
|
|
| Session
persistence |
|
|
| Performance
scaling and availability |
| Active/passive |
|
|
| Active/Active
(clustering) |
|
|
| Automated
cluster synchronization |
|
|
| Management |
| Automated
update system |
|
|
| Audit Log |
|
|
| Logging to external host |
|
|
| Automatic
(push) backup |
|
|
| Compliance Requirements |
| PCI DSS Section 6.6 |
|
|
OWASP Top Ten defenses
Download OWASP Top Ten Defenses in Profense
|
|
|
Contact
us
for more information. To download your 60-day trial, click here: DOWNLOAD NOW.