Web Application Firewall

WAF protects your websites and web servers with the intelligent computing capabilities of eSurfing Cloud Security. Through the multi-dimensional protection mechanism, it intercepts malicious attacks such as SQL injection, XSS cross-site scripting, command code injection, sensitive file access, and crawlers, ensuring safe and stable service operations.

  • Product Advantages
  • Features
  • Scenarios

Product Advantages

Easy Access

Cloud deployment reduces access costs, and saves the hassle of installing plug-ins or making web framework adaptations. Increase in service traffic will not require re-deployment, and access can be started or stopped by one click.

Professional Stability

Boasts exclusive eSurfing Cloud big data and AI technology, supporting web threat detection, restoration of seven code types, IP reputation database detection, and more security capabilities.

Fast Response

For 0 day vulnerability outbreak events, provides 24-hour rule update, real-time vulnerability detection, rapid emergency response, and multi-dimensional protection, reducing business security risks.

Intelligent Learning

Collects website attack techniques, latest vulnerabilities, and security information on a daily basis, in order to detect security threats in advance.

Features
Web Attack Prevention Supports various built-in defense measures, including those against SQL injection, XSS attack, command injection, illegal HTTP requests, common web server vulnerability attacks, and scanning behavior. The unique dual-engine technology, which includes the regular engine and semantic analysis engine, achieves more accurate detection.
Web Vulnerability Protection Discovers potential vulnerabilities and system defense weaknesses, and provides virtual patches for emergency vulnerability outbreak, through the automatic vulnerability detection mechanism, which simulates attacks, determines defects, and automatically configures corresponding rules.
IP/URL Access Control Supports trustlisting specified IP addresses and blocking of malicious IP addresses, and control of specified access sources, including IP addresses, URLs, user agent, and referer.
Injection Attack Prevention Dual-engine detection improves detection rate while reducing false positive rate, and blocks hacker attacks more accurately, including SQL injection defense, LDAP injection defense, command injection defense (such as OS command and webshell), XPath injection defense, XML/JSON injection defense, and more.
Crawler Prevention Determines the number of visits based on the source IP period, takes necessary measures such as traffic interception, human-machine identification, traffic limiting and deception to prevent malicious access and avoid information leakage caused by crawler collection and release of data, protecting enterprise data security.
Privacy Protection Performs personalized privacy information masking, such as for sensitive information in event logs, and provides event management functions, including viewing attack event logs on the web portal and adding event notification settings. Built-in detection and masking rules can also be configured to handle false alarms.

Scenarios

< >
  • Governments, Enterprises, and Education Industry
  • Financial Industry
  • E-commerce Industry
  • Travel and Ticketing Industry
Applicable Scenario
  • As an important channel to provide Internet users with information services, the government, enterprises, education, and medical and health industries are often faced with security threats such as web page tampering, mounting, cross-site attacks, and SQL injection attacks. They also face regulatory pressure from supervision institutions, so a security incident can seriously affect their image and credibility.
Issues to Address
  • Attack Detection
  • Detects various application-layer attacks, such as SQL injection, XSS attacks, remote overflow attacks, command injection, and illegal scanning attacks.
  • Trustlist and Blocklist
  • Formulates direct ban on designated areas and blocks all access requests from risky areas.