{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"ru":"Особенности продукта","_type":"localeString","en":"Product features"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"en":" Problems that solves","ru":"Проблемы которые решает","_type":"localeString"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"_type":"localeString","en":"Comparison matrix","ru":"Матрица сравнения"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"en":"Average deal size","ru":"Средний размер сделки","_type":"localeString"},"average-time":{"en":"Average deal closing time","ru":"Средний срок закрытия сделки","_type":"localeString"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"_type":"localeString","en":" Scheme of work","ru":"Схема работы"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"en":"Deployments with this product","ru":"Внедрения с этим продуктом","_type":"localeString"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"en":" Selling stories","ru":"Продающие истории","_type":"localeString"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"en":"Program Sends Data","_type":"localeString"},"calculate-roi":{"en":"Calculate Product ROI","ru":"Рассчитать ROI продукта","_type":"localeString"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"configurator-content":{"ru":"Рассчитайте стоимость продукта","_type":"localeString","en":"Calculate price for this product here"},"configurator-link":{"en":"here","ru":"тут","_type":"localeString"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта","_type":"localeString"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"_type":"localeString","en":"Videos","ru":"Видео"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Подтверждено производителем"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event."},"register-to-schedule":{"_type":"localeString","en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт."},"comparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнений","_type":"localeString"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"en":" Go to comparison table","ru":"Перейти к таблице сравнения","_type":"localeString"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My Profile","ru":"Мои Данные","_type":"localeString"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"translations":{"ru":"Продукт","_type":"localeString","en":"Product"},"name":"title"},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"en":"Product keywords","ru":"Ключевые слова продукта","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"citrix-netscaler":{"id":135,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Citrix_NetScaler.jpg","logo":true,"scheme":false,"title":"Citrix NetScaler","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":9,"alias":"citrix-netscaler","companyTitle":"Citrix","companyTypes":["vendor"],"companyId":182,"companyAlias":"citrix","description":"Ensure 100% uptime and flawless performance with NetScaler.\r\nToday’s enterprises face more demands than ever, from cloud computing to 24/7 availability to increasing security threats. NetScaler, an advanced software-defined application delivery controller, is your networking power player. It provides outstanding delivery of business applications—to any device and any location—with unmatched security, superior L4-7 load balancing, reliable GSLB, and 100 percent uptime. In fact, NetScaler offers up to five times the performance of our closest competitor. Plus our TriScale technology saves you money by allowing your network to scale up or down without additional hardware costs.\r\n","shortDescription":"Citrix NetScaler is an award-winning offering a software-first approach for hybrid, multi-cloud architectures with deep visibility to deliver an exceptional application experience.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Citrix NetScaler","keywords":"NetScaler, security, delivery, performance, uptime, your, offers, times","description":"Ensure 100% uptime and flawless performance with NetScaler.\rToday’s enterprises face more demands than ever, from cloud computing to 24/7 availability to","og:title":"Citrix NetScaler","og:description":"Ensure 100% uptime and flawless performance with NetScaler.\rToday’s enterprises face more demands than ever, from cloud computing to 24/7 availability to","og:image":"https://old.b4r.io/fileadmin/user_upload/Citrix_NetScaler.jpg"},"eventUrl":"","translationId":136,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[{"id":199,"title":"SSL Transactions/Second","required":0,"type":"select","templateId":19,"value":"1500","options":["2000","1500","2230","2500"]},{"id":201,"title":"Platform Throughput","required":0,"type":"select","templateId":19,"value":"500 Mbps","options":["5000 Mbps","25 Mbps","500 Mbps"]},{"id":203,"title":"Ports","required":0,"type":"multiselect","templateId":19,"value":"6xGE (Copper)","options":["8-GE (Copper)","Optional SFP","2-10GE SR or LR","4-GE(Copper)","6xGE (Copper)","4-1GE (Copper)","2x100FE Copper w/Bypass"]},{"id":205,"title":"Height","required":0,"type":"select","templateId":19,"value":"1U","options":["1U","1U (desktop)","1U (mini)"]},{"id":207,"title":"SQL Injection Attacks","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":209,"title":"Cross-Site Scripting Attacks","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":211,"title":"Cookie Tampering","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":212,"title":"Form Validation and Protection","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":215,"title":"HTTP and XML Reply and Request format validation","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":217,"title":"JSON payload inspection","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":219,"title":"Signature and Behavior based protections","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":221,"title":"Data Loss Prevention (DLP) support","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":223,"title":"XML Denial of Service protection","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":225,"title":"Authentication, authorization and auditing support","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":227,"title":"Support for SSL offloading","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":229,"title":"Reporting and Policy tools that provide for easier PCI-DSS compliance verification","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":231,"title":"IP Reputation Database","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":233,"title":"Support for LDAP, RADIUS, Local, SAML 2.0","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":235,"title":"HIPPA compliance verification","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":237,"title":"Layer 7 Denial of Service protection","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":239,"title":"Layer 4 Denial of Service protection","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":241,"title":"Session Hijacking","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":243,"title":"SOX or BASEL II compliance verification","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":245,"title":"Virtual Patching","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":247,"title":"Integration with Sandbox","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":249,"title":"Authentication support NTLM and Kerberos","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":251,"title":"Additional Protection for SMTP and FTP attacks (SPAM, Antivirus, Harvesting, Fraud)","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":253,"title":"DoS/DDoS protection/Botnet Protection","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":255,"title":"Stateful Firewall","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":257,"title":"SOAP, HTML5 sockets, Web 2.0 Protections","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}},{"id":259,"title":"3rd Party Vulnerability Integrations","required":0,"type":"binary","templateId":19,"value":true,"options":{"values":null,"defaults":null}},{"id":261,"title":"NSS Labs Recommended","required":0,"type":"binary","templateId":19,"value":"N/A","options":{"values":null,"defaults":null}}],"concurentProducts":[{"id":1602,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png","logo":true,"scheme":false,"title":"Akamai Kona Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"akamai-kona-web-application-firewall","companyTitle":"Akamai Technologies","companyTypes":["supplier","vendor"],"companyId":4283,"companyAlias":"akamai-technologies","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application attacks. Globally-distributed across the Akamai Intelligent Platform™, Kona WAF can easily scale to defend against massive application attacks. Deployed at the edge of your network rather than in a data center, Kona WAF can identify and mitigate suspicious traffic without affecting performance or availability of the origin server. Security rules for Kona WAF are continuously refined by Akamai’s Threat Intelligence Team to protect against known attacks and respond to emerging threats. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">With Kona WAF you can: </span>\r\n<ul>\r\n<li>Reduce the risk of downtime, data theft and security breaches with a WAF that can scale to protect against the largest DoS and DDoS attacks.</li>\r\n<li>Ensure high performance even during attacks thanks to Akamai’s globally architecture.</li>\r\n<li>Defending against new and emerging threats with help from Akamai’s Threat Intelligence Team.</li>\r\n<li>Minimize costs of cloud security by avoiding the need for expensive dedicated hardware.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Key capabilities of Kona WAF</span>\r\n<ul>\r\n<li>Kona WAF provides comprehensive capabilities to protect against application-layer attacks. </li>\r\n<li>Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.</li>\r\n<li>Application-layer controls offer pre-defined, configurable WAF rules that govern Request Limit Violations, Protocol Violations, HTTP Policy Violations and more.</li>\r\n<li>Network-layer controls automatically deflect network-layer DDoS attacks at the network edge and define and enforce IP whitelists and blacklists to restrict requests from certain IP addresses or geographical regions.</li>\r\n<li>Security monitor provides real-time visibility into security events and enables administrators to drill down into attack alerts.</li>\r\n<li>Logging features enable you to integrate WAF and event logs with security information and event management to increase your threat posture awareness.</li>\r\n</ul>\r\n","shortDescription":"Kona Web Application Firewall from Akamai provides an highly scalable application firewall that defends against emerging threats to web security while keeping application performance high.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Akamai Kona Web Application Firewall","keywords":"attacks, against, Kona, with, security, Akamais, protect, controls","description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:title":"Akamai Kona Web Application Firewall","og:description":"Ensure web application performance with Akamai’s WAF. Kona Web Application Firewall from Akamai offers effective protection against web application","og:image":"https://old.b4r.io/fileadmin/user_upload/Akamai_Technologies.png"},"eventUrl":"","translationId":1603,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1608,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png","logo":true,"scheme":false,"title":"Cloudflare web application firewall WAF","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cloudflare-web-application-firewall-waf","companyTitle":"Cloudflare","companyTypes":["supplier","vendor"],"companyId":4284,"companyAlias":"cloudflare","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting, and cross-site forgery requests with no changes to your existing infrastructure.\r\nCloudflare sees roughly 2.9 million requests every second and our WAF is continually identifying and blocking new potential threats.\r\n<span style=\"font-weight: bold;\">Automatic WAF Updates</span>\r\nCloudflare security engineers constantly monitor the Internet for new vulnerabilities. When we find threats that apply to a large portion of our users, we automatically apply WAF rules to protect their Internet properties. Let us take care of tracking state-of-the-art hacking techniques so you can focus on creating useful features instead of protecting them from would-be attackers.\r\nOn-premise firewalls quickly become outdated and require professional service hours to regularly update rules to protect against new threats. Cloudflare’s WAF helps you stay ahead of threats by automatically updating when new security vulnerabilities are released. Rules created by Cloudflare in response to new threats are responsible for mitigating the vast majority of threats on our network. While traditional OWASP rules and customer specific rules are important, they are not enough without Cloudflare's automatic WAF updates.\r\n<span style=\"font-weight: bold;\">Collective Intelligence</span>\r\nCloudflare sees roughly 2.9 million requests every second, and our WAF is continually identifying and blocking new potential threats. If you’re using a web application firewall that doesn’t leverage the collective intelligence of other web properties, you need to supply all your own WAF rules from scratch, which means you need to monitor the entire Internet security landscape on your own.\r\n<span style=\"font-weight: bold;\">Intelligent WAF</span>\r\nWhen one customer requests a new custom WAF rule, we analyze whether it applies to all 7 million domains on our network. If it does, we automatically apply that rule to everybody on our network. The more web properties on our network, the stronger our WAF gets, and the safer the Cloudflare community becomes.\r\n<span style=\"font-weight: bold;\">Multi-Cloud Holistic Security Framework</span>\r\nCloudflare offers a single source of control for the security of websites, applications, and APIs, hosted across multiple cloud environments. Multi-cloud security provides visibility into security events, while allowing for consistent security controls, across all clouds in which Internet assets are deployed. Any attack traffic seen by Cloudflare is recorded and analyzed. Cloudflare’s network then shields Internet assets across all cloud providers.\r\n<span style=\"font-weight: bold;\">PCI Compliance</span>\r\nUtilizing Cloudflare’s WAF helps you cost effectively fulfill PCI compliance. If you’re a merchant who handles consumer credit card information, PCI DSS 2.0 and 3.0 Requirement 6.6 allows for two options to meet this requirement:\r\n<span style=\"font-weight: bold;\">Deploy a WAF in front of your website</span>\r\nOr, conduct application vulnerability security reviews of all of your in-scope web applications\r\n<span style=\"font-weight: bold;\">OWASP, Application-Specific, and Custom Rules</span>\r\nCloudflare’s WAF protects your web properties from the OWASP top 10 vulnerabilities by default. These OWASP rules are supplemented by 148 built-in WAF rules that you can apply with the click of a button. Business and Enterprise customers can also request custom WAF rules to filter out specific attack traffic.\r\n<span style=\"font-weight: bold;\">OWASP Top 10 Vulnerabilities</span>\r\n<ul><li>Injection</li><li>Broken Authentication and Session Management</li><li>Sensitive Data Exposure</li><li>XML External Entities (XXE)</li><li>Broken Access Control</li><li>Security Misconfiguration</li><li>Cross-Site Scripting (XSS)</li><li>Insecure Deserialization</li><li>Using Components with Known Vulnerabilities</li><li>Insufficient Logging & Monitoring</li></ul>\r\n<span style=\"font-weight: bold;\">Protecting Against Zero-Day Vulnerabilities</span>\r\nCloudflare security engineers have dealt with a lot of zero-day vulnerabilities over the years. Read our developer blog to learn how every website on our network benefits from their virtual patches.\r\n<span style=\"font-weight: bold;\">A Look at the New WP Brute Force Amplification Attack</span>\r\nA vulnerability in the XML remote procedure protocol allowed potentially thousands of brute force password attempts in a single HTTP request.\r\n<span style=\"font-weight: bold;\">The Joomla Unserialize Vulnerability</span>\r\nThe Joomla Unserialize Vulnerability allowed remote code execution via a poorly sanitized User-Agent and X-Forwarded-For headers.\r\n<span style=\"font-weight: bold;\">Protection Against Critical Windows Vulnerability (CVE-2015-1635)</span>\r\nCloudflare WAF protected users from a critical bug that allowed unpriviledeged users to hang a Windows web server.\r\n<span style=\"font-weight: bold;\">Threat Blocking & Privacy Features</span>\r\n<ul><li>Collective intelligence to identify new threats</li><li>Reputation-based threat protection</li><li>Comment spam protection</li><li>Block or challenge visitors by IP address</li><li>Block or challenge visitors by AS number</li><li>Block or challenge visitors by country code</li><li>User agent blocking</li><li>Zone lockdown</li><li>Security level configuration</li></ul>","shortDescription":"Cloudflare’s web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site scripting.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cloudflare web application firewall WAF","keywords":"Cloudflare, security, rules, your, threats, network, from, Internet","description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:title":"Cloudflare web application firewall WAF","og:description":"Cloudflare’s enterprise-class web application firewall (WAF) protects your Internet property from common vulnerabilities like SQL injection attacks, cross-site","og:image":"https://old.b4r.io/fileadmin/user_upload/Cloudflare.png"},"eventUrl":"","translationId":1609,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1610,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg","logo":true,"scheme":false,"title":"Radware AppWall - Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"radware-appwall-web-application-firewall-waf","companyTitle":"radware","companyTypes":["vendor"],"companyId":2746,"companyAlias":"radware","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web application attacks, web application attacks behind CDNs, API manipulations, advanced HTTP attacks (slowloris, dynamic floods), brute force attacks on login pages and more.\r\nA core and integrated part of Radware's Attack Mitigation Solution – a complete application and network security suite. AppWall is a web application firewall (WAF) that provides patent-protected technology to create and maintain security policies in real-time for widest security coverage with the lowest false positives and minimal operational effort. Radware’s Web application security technology features a variety of deployment modes – as a stand-alone or integrated on an ADC, on-premise and in the cloud, inline or out-of-band.\r\nWhat Makes AppWall a Better Web Application Firewall (WAF)?\r\n<span style=\"font-weight: bold;\">Protection from Zero-Day Web Attacks </span>\r\nUsing both negative (signature based) and positive security models - AppWall is a web application firewall (WAF) that features not only the lowest false positives and minimal operational effort, but also robust protection against known and unknown (Zero-day) threats.\r\n<span style=\"font-weight: bold;\">Reduced TCO with Lowest False Positives</span>\r\nUnique Auto Policy Generation technology designed to secure a web application as automatically as possible with little or limited user interaction. AppWall is a web application firewall (WAF) that analyzes the protected Web application and derives the potential threats in it. It then generates individual, granular protection rules and sets a policy in blocking mode - thus eliminating the need for human intervention and saving on maintenance and labor resources.\r\n<span style=\"font-weight: bold;\">Continuous Security Delivery</span>\r\nFirst web application firewall (WAF) to provide a real-time security patching solution for Web applications in continuous application deployment environments via a tight integration with Dynamic Application Security Testing (DAST) solutions.\r\n<span style=\"font-weight: bold;\">Device Fingerprinting for Bot Protection</span>\r\nAppWall is an IP agnostic web-application security solution. It disregards IP source address context to protect from dynamic IP attacks. The power of the fingerprint is in the consolidated information extracted from dozens of browser attributes collected on the client side, facilitating accurate bot classification.\r\n<span style=\"font-weight: bold;\">Unique Out-of-Path Deployment with Full Mitigation</span>\r\nAppWall is the only web application firewall (WAF) that can be deployed out-of-path while still providing full mitigation. As part of Radware's integrated Attack Mitigation Solution, AppWall can communicate attack footprint and blocking policies to Radware’s perimeter attack-mitigation device, DefensePro, so the attack is blocked at the perimeter and the rest of the network is protected.\r\n<span style=\"font-weight: bold;\">Full Coverage of OWASP Top-10 Out-of-the-box</span>\r\nIncluding injections, cross-site scripting (XSS), cross-site request forgery (CSRF), broken authentication and session management and security misconfiguration.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention</span>\r\nIdentifying and blocking sensitive information transmission such as credit card numbers (CCN) and social security numbers (SSN).\r\n<span style=\"font-weight: bold;\">Integrated Application Security & Application Delivery</span>\r\nAppWall is an integral part of Radware's Application Delivery Controller (ADC) solution suite, which allows customers to augment their web application security protection with local and global traffic redirection, application acceleration, bandwidth management, and other application-aware services, while benefitting from a single hardware platform.\r\n<span style=\"font-weight: bold;\">Easy Migration From Test Environments to Production</span>\r\nAn AppWall VA can be deployed with the application in the production environment or – if deployed in a lab – policy is easily migrated to the AppWall appliance in production. This approach simplifies the integration and shortens the deployment time of new applications and services in the virtualized and cloud data centers.\r\n<span style=\"font-weight: bold;\">ICSA Labs Certified WAF</span>\r\nRecognized for both the appliance and VM versions, ICSA Labs certifies AppWall for its depth and breadth of vulnerability protection, effectiveness, ease of implementation and low operation overhead.\r\n<span style=\"font-weight: bold;\">Comprehensive PCI Compliance Solution</span>\r\nAppWall enables organizations to fully comply with PCI DSS section 6.6 requirements and includes the most advanced security graphical reports to convey visibility into the application security and detected attacks.","shortDescription":"AppWall - Radware’s Web Application Firewall (WAF), ensures fast, reliable and secure delivery of mission-critical Web applications for corporate networks and in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Radware AppWall - Web Application Firewall (WAF)","keywords":"application, AppWall, security, with, Application, attacks, protection, that","description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:title":"Radware AppWall - Web Application Firewall (WAF)","og:description":"AppWall is an ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web","og:image":"https://old.b4r.io/fileadmin/user_upload/Radware.jpg"},"eventUrl":"","translationId":1611,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1615,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg","logo":true,"scheme":false,"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"instart-logic-visionary-web-application-firewall-and-ddos","companyTitle":"Instart Logic","companyTypes":["supplier","vendor"],"companyId":4285,"companyAlias":"instart-logic","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of attacks including OWASP Top 10 vulnerabilities:\r\n<ul><li>Cross-Site Scripting</li><li>SQL injection</li><li>Slow HTTP DoS</li><li>Cross-Site Request Forgery</li></ul>\r\nInstart Logic also offers comprehensive distributed denial of service (DDOS) attack protection using our globally distributed platform to absorb and mitigate attacks. As an internet-scale service provider, our global-ready infrastructure ensures a best-in-class protection for your online presence.","shortDescription":"Instart Logic’s globally distributed carrier-grade security applications use artificial intelligence and machine learning to protect cloud, web and mobile applications from the threat","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","keywords":"attacks, Instart, distributed, DDOS, Visionary, Logic, service, protection","description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:title":"Instart Logic Visionary WEB APPLICATION FIREWALL AND DDOS","og:description":"Our web app firewall (WAF), which was named a Visionary by Gartner is pre-configured with advanced threat intelligence to protect from a wide variety of","og:image":"https://old.b4r.io/fileadmin/user_upload/Instart_Logic.jpg"},"eventUrl":"","translationId":1616,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1618,"logoURL":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg","logo":true,"scheme":false,"title":"NSFOCUS Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nsfocus-web-application-firewall-waf","companyTitle":"NSFOCUS","companyTypes":["supplier","vendor"],"companyId":4287,"companyAlias":"nsfocus","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web application layer. It also includes up to 1 Gbps of DDoS protection from other volumetric and application layer attacks, including TCP flood and HTTP/S GET/ POST floods. Additionally, if deployed in conjunction with a higher capacity NSFOCUS ADS Series Anti-DDoS appliance, the WAF can direct flows in real-time to the ADS to keep your servers running under the most extreme conditions.\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features and Benefits</span>\r\n<span style=\"font-weight: bold;\">Prevent Theft of Critical Data</span>\r\nData breaches are extremely complex and surprisingly frequent. The NSFOCUS WAF offers powerful protection against web attacks with a complete set of signatures for web vulnerabilities and the ability to detect unauthorized file uploads. WAF enforces access control policy from layer 4 through layer 7, to prevent access to data without proper authorization. In the later phases of an attack, WAF provides outbound data leakage detection, including illegal file download detection, web shell prevention, and filtering of sensitive information (such as credit card numbers and social security numbers).\r\n<span style=\"font-weight: bold;\">Ensure Website Availability</span>\r\nThe NSFOCUS WAF offers a built-in anti-DDoS module to protect against TCP flood attacks, HTTP/S GET/POST flood attacks and slow rate attacks up to 1Gbps. The WAF employs access rate thresholding, IP reputation and algorithm-based protection mechanisms. Coupled with the NSFOCUS ADS anti-DDoS product line, higher rate DDoS attacks can be thwarted.\r\n<span style=\"font-weight: bold;\">Close the PCI DSS Compliance Gap</span>\r\nThe NSFOCUS WAF provides reports for PCI audits as well as suggestions for policy tuning and configuration in order to help ensure compliance with PCI DSS. Protections like the cookie security feature within the WAF protects against cookie tampering and cookie poisoning in compliance with section 6.5.10 in the new PCI 3.2 standard.\r\n","shortDescription":"The WAF serves as an essential part of any defense-in-depth security architecture by providing advanced inspection and specialized security for the web application layer. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSFOCUS Web Application Firewall (WAF)","keywords":"attacks, NSFOCUS, with, security, layer, access, against, rate","description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:title":"NSFOCUS Web Application Firewall (WAF)","og:description":"The WAF serves as an essential part of an intelligent hybrid security architecture by providing advanced inspection and specialized security for the web","og:image":"https://old.b4r.io/fileadmin/user_upload/NSFOCUS.jpeg"},"eventUrl":"","translationId":1619,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1622,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Airlock.png","logo":true,"scheme":false,"title":"Airlock Web Application Firewall","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"airlock-web-application-firewall","companyTitle":"Ergon Informatik AG","companyTypes":["supplier","vendor"],"companyId":4288,"companyAlias":"ergon-informatik-ag","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance, security for online banking or protection for eCommerce: Airlock WAF will upgrade security for your internet applications – a permanent solution with a host of well thought-out functionalities.\r\nThanks to Airlock WAF, businesses can exploit the potential of the internet without jeopardizing the security and availability of their web applications and services. Each access is systematically monitored and filtered at every level. Used in conjunction with an authentication solution such as Airlock Login or IAM, Airlock WAF can force upstream user authentication and authorization. This allows a uniform, central single sign-on infrastructure. All important information is also made available via monitoring and reporting functions. Airlock WAF is the only web application security solution on the market that provides superlative end-to-end protection for complex web environments.\r\n<span style=\"font-weight: bold;\">Airlock WAF - The main features</span>\r\n<ul><li>Secure Reverse Proxy</li><li>Central Checkpoint</li><li>Filtering</li><li>API Security</li><li>Dynamic Whitelisting</li><li>Central Security Hub</li><li>High Availability and Performance</li></ul>\r\n<span style=\"font-weight: bold;\">Airlock WAF is also available as a hardware appliance</span>\r\nWith the Airlock WAF hardware appliance, setup and going live will be even easier than today. Of course, hardware appliances can be connected to build a failover cluster with active session synchronization.","shortDescription":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications, whether your objective is PCI DSS compliance, security for online banking or protection ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Airlock Web Application Firewall","keywords":"Airlock, security, with, solution, applications, hardware, will, also","description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:title":"Airlock Web Application Firewall","og:description":"The Airlock Web Application Firewall offers a unique combination of protective mechanisms for web applications. Whether your objective is PCI DSS compliance,","og:image":"https://old.b4r.io/fileadmin/user_upload/Airlock.png"},"eventUrl":"","translationId":1623,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1624,"logoURL":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg","logo":true,"scheme":false,"title":"Venusense Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"venusense-web-application-firewall-waf","companyTitle":"VenusTech","companyTypes":["supplier","vendor"],"companyId":4289,"companyAlias":"venustech","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly provides HTTP/HTTPS traffic analysis for Web servers, prevents attacks aimed at Web application vulnerabilities, optimizes Web application accesses to improve the availability, performance, and security of Web/network protocol based applications and ensure the quick, secure, and reliable delivery of Web service applications.\r\n<span style=\"font-weight: bold;\">Features:</span>\r\n● Web attack prevention\r\n-SQL injection attack prevention (based on the advanced patented algorithm)\r\n-XSS attack prevention (based on the advanced patented algorithm)\r\n-Malicious Web scanning prevention (supports virtual patching)\r\n-Application layer DoS attack prevention\r\n-HTTPS SSL3.0/TLS1.0/TLS1.1/TLS1.2.\r\n● Unauthorized Web access prevention\r\n-CSRF attack prevention (supports self-learning)\r\n-Cookie tamper prevention (supports self-learning)\r\n-Website hotlink prevention\r\n● Malicious Web code prevention\r\n-Webpage embedded Trojan prevention (based on the patented advanced algorithm)\r\n-WebShell prevention\r\n● Web application compliance\r\n-URL-based access control\r\n-HTTP protocol compliance (supports machine self-learning)\r\n-Sensitive information leakage prevention\r\n-File upload and download control\r\n-Web form keyword filtering\r\n● Web application delivery\r\n-Webpage defacement prevention\r\n-URL-based traffic control\r\n-Web application acceleration\r\n-Server load balancing\r\nValue: Venusense WAF uses a set of HTTP session policies that can protect security from common Web attacks such as SQL injection and XSS. Users can customize policies in order to recognize and block more attacks and mitigate Web security problems that cannot be resolved by using traditional security devices such as firewalls and UTMs. Venusense WAF does well in Web security protection and application delivery, provides the professional Web attack prevention capability, and brings an integrated Web security solution that is easy to deploy and manage. 4Advantages:\r\n● Leading Web security delivery and security protection capabilities in the industry: Integrates Web attack prevention, malicious Web code prevention, unauthorized Web access prevention, Web application compliance, and Web application delivery acceleration to build an excellent Web security delivery platform.\r\n● Complete and effective Web attack detection: Integrates VXID detection, event signature detection, customized event signature detection, and self-learning modeling detection to prevent known Web attacks such as SQL injection attacks, XSS attacks, and CSRF attacks and protect against special attacks and unknown attacks by using detection measures such as customized event signature and self-learning modeling.\r\n● Quick response to Web attack events: Has a built-in Web prevention event library, provides periodical upgrade and immediate upgrade once upon emergent Web events, quickly responds to latest, emergent, or hotspot Web attack events. With a large number of vulnerability discoverers and analysts, Venustech's ADLab has independently discovered the most CVE vulnerabilities in China.\r\nDeployment:\r\n● Bridge mode\r\nIn bridge mode, users do not need to change the original network topology and configurations, to protect the Web server.\r\n● Proxy mode\r\nIn proxy mode, the actual IP address of the Web server can be hidden to access users, to protect the Web server.\r\n● One-arm mode\r\nThe one-arm mode is similar to one-arm routing, in which WAF is physically deployed in bypass mode and logically deployed in path mode. In one-arm mode, attacks from the network application layer can be blocked. When WAF becomes unavailable, service traffic will not be blocked. In this mode, only one network interface is used to filter internal network traffic. Users do not need to change the physical network structure and IP settings, so configuration can be completed quickly.\r\n● BYPASS\r\nAs a serial access security device, WAF provides the software BYPASS function and hardware BYPASS function in bridge deployment mode to ensure smooth service links.\r\nCertifications and Honors: ● EAL3 Plus Certificate (Megabit, Gigabit, Ten-Gigabit)\r\n● CVE Certificate\r\n● Web Application Firewall Certificate issued by OWASP China\r\n● IPv6 Ready Logo Phase 2 Gold Accreditation Certificate","shortDescription":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Venusense Web Application Firewall (WAF)","keywords":"prevention, security, mode, application, attacks, attack, delivery, detection","description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:title":"Venusense Web Application Firewall (WAF)","og:description":"Venusense Web Application Firewall (WAF) is a new generation of Web security protection and application delivery product developed by Venustech. It mainly","og:image":"https://old.b4r.io/fileadmin/user_upload/VenusTech.jpeg"},"eventUrl":"","translationId":1625,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1626,"logoURL":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg","logo":true,"scheme":false,"title":"WAPPLES Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"wapples-web-application-firewall-waf","companyTitle":"Penta Security Systems","companyTypes":["supplier","vendor"],"companyId":4290,"companyAlias":"penta-security-systems","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\r\nBesides blocking basic web attacks, WAPPLES is deployed to effectively guard against sensitive data leakage, block malicious web access and prevent website defacement in this era of intensified attacks.\r\nPowered by an intelligent detection engine, WAPPLES is capable of combating the newest threats, including attacks often utilized in Advanced Persistent Threats (APT) launched by malicious agents to obtain data assets of governments and enterprises or for terrorism or political gains.\r\nWhile traditional WAFs depend on high-maintenance signature updates for low-accuracy pattern-matching, WAPPLES uses a logic-based detection engine called COCEP™ (Contents Classification and Evaluation Processing).\r\nUtilizing 28 pre-configured detection rules, modified and even unknown attacks are categorized and blocked heuristically and semantically. This proprietary technology allows WAPPLES to deliver superior security with industry-leading accuracy and low false positive rates under various network environments. Maintaining high stability and performance, WAPPLES’ ease of deployment and low operational workload was recognized by Gartner as what made the WAF a popular choice for surveyed clients.\r\n<span style=\"font-weight: bold;\">WAF comparison</span>\r\nThrough the analysis of an attack’s characteristics, WAPPLES is able to identify attacks that utilize new patterns of exploit that often bypass typical WAFs utilizing signature-based detection engines.\r\n1st and 2nd generation WAFs that operate on blacklists and whitelists lag behind due to their reliance on signature updates to detect the latest threats. In comparison, the sophistication of security that WAPPLES can provide greatly surpasses that of signature-based WAFs.\r\n<span style=\"font-weight: bold;\">WAPPLES Product Family and Related Services</span>\r\n<ul><li>WAPPLES (Appliance-type WAF product)</li><li>WAPPLES SA (Virtual WAF optimized for cloud environment)</li><li>Cloudbric (Cloud-based web security service)</li><li>Cloudbric Business Edition (Web security delivered from Cloudbric or Partner infrastructure)</li></ul>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Features</span>\r\n<span style=\"font-weight: bold;\">High-Accuracy Web Attack Defense</span>\r\n<ul><li>Logic-analysis based COCEP™ engine protects websites against OWASP Top 10 risks</li><li>Extremely low false positive rates through heuristic and semantic traffic analysis</li><li>Utilizes 28 detection rules that can be fine-tuned to create robust custom security policies</li><li>Defense from known, zero-day, and HTTP DDoS attacks</li><li>Validity testing (Luhn: ISO/IEC7812) prevents leakage of sensitive data</li><li>High Performance and Stability</li></ul>\r\n<span style=\"font-weight: bold;\">Optimized core provides enhanced performance</span>\r\n<ul><li>High processing power with in-memory computing capability</li><li>Stable performance even with strict security policy settings enabled</li><li>Increased bandwidth through bonding technology</li><li>Easy to Install & Configure</li></ul>\r\n<span style=\"font-weight: bold;\">Minimal changes to existing systems</span>\r\n<ul><li>Quick setup with preconfigured security policies</li><li>Statistics visualized on centralized dashboard</li><li>Intuitive and easy-to-use GUI management console</li><li>Increases efficiency in web security management</li></ul>\r\n<span style=\"font-weight: bold;\">Supports Various Environments</span>\r\n<ul><li>Can be deployed in Reverse proxy, Inline, or High Availability (HA) configuration modes</li><li>Support for EtherChannel and Multi-Segment</li><li>Integration with SIEM (Micro Focus ArcSight, Splunk)</li></ul>\r\n<span style=\"font-weight: bold;\">Implementation</span>\r\nWhen a customer chooses to deploy WAPPLES, a thorough analysis of the customer environment will be conducted prior to installation. This is important for optimizing policy settings tailored to specific operational and business needs to achieve an optimal configuration. Post-installation, detection logs are also monitored over a period of time and analyzed to further fine-tune the security policies and complete the implementation process.\r\n<ul><li>Pre-inspection</li><li>WAPPLES installation</li><li>WAPPLES configuration</li><li>Operation testing and demonstration</li><li>Detection log analysis</li><li>Analysis report</li><li>Policy modification</li></ul>","shortDescription":"WAPPLES WAF is deployed to effectively guard against sensitive data leakage, blocking basic web attacks, block malicious web access and prevent website defacement in this era of intensified attacks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"WAPPLES Web Application Firewall (WAF)","keywords":"WAPPLES, security, detection, that, with, attacks, WAFs, performance","description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:title":"WAPPLES Web Application Firewall (WAF)","og:description":"Market share leader for three consecutive years, WAPPLES is the Web Application Firewall (WAF) of choice for customers in the Asia Pacific.\rBesides blocking","og:image":"https://old.b4r.io/fileadmin/user_upload/WAPPLES.jpg"},"eventUrl":"","translationId":1627,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1628,"logoURL":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png","logo":true,"scheme":false,"title":"DenyAll Web Application Firewall (LTS)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"denyall-web-application-firewall-lts","companyTitle":"DenyAll, a Rohde & Schwarz Cybersecurity company","companyTypes":["supplier","vendor"],"companyId":4291,"companyAlias":"denyall-kompanija-rohde-schwarz-cybersecurity","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through. This all-in-one solution protects and manages multiple security solutions - Web Application Firewall, Web Services Firewall and Web Access Management - in a single management console (centralized administration station, monitoring, reverse proxy, etc.). The platform also provides cache, acceleration and optimization of your web traffic.\r\n<span style=\"font-weight: bold;\">Highlights</span>\r\n<ul><li>Web Application Firewall (WAF): to protect the web applications vital to every business against external threats and to assure continuous service.</li><li>Web Services Firewall (WSF): to protect the infrastructure, information networks and application servers against attacks while preventing denial of service and anticipating traffic overload.</li><li>Web Access Management (WAM): to simplify Web access authentication while maintaining a high level of security, without agent deployment on the application server.</li></ul>","shortDescription":"DenyAll Web Application Firewall (WAF) provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently passing benign traffic through.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DenyAll Web Application Firewall (LTS)","keywords":"Firewall, Application, security, while, traffic, service, application, DenyAll","description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:title":"DenyAll Web Application Firewall (LTS)","og:description":"DenyAll Web Application Firewall provides a multilayered approach to security services to dynamically detect and block malicious content while efficiently","og:image":"https://old.b4r.io/fileadmin/user_upload/DenyAll.png"},"eventUrl":"","translationId":1629,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1634,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png","logo":true,"scheme":false,"title":"TrustWave Web Application Firewall (WAF)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"trustwave-web-application-firewall-waf","companyTitle":"Trustwave","companyTypes":["supplier","vendor"],"companyId":4293,"companyAlias":"trustwave","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual patching and is backed by the expertise of our elite SpiderLabs Research team, who deliver ongoing application vulnerability and emerging threat information.\r\nAttackers use a wide range or techniques to attack web applications: site scraping, malicious bots, zero-day, targeted attacks and more. The Trustwave WAF protects against these and others, including the OWASP Top 10 by offering a comprehensive set of capabilities, including positive and negative security, virtual patching, inspection of outgoing traffic, and more. The Trustwave WAF is fueled by the SpiderLabs Research team, who provide rules and threat intelligence that identify the latest web application attacks and threats.\r\n<span style=\"font-weight: bold;\">Features</span>\r\n<ul><li>Continuous Protection. Delivers continuous protection With a combination of positive and negative security, perpetual tuning and dynamic virtual patching.</li><li>Ease of Use. Centralized management dashboards and an intuitive UI let you prioritize and respond faster and more effectively to threats.</li><li>Multiple Deployment Options. Implement Trustwave WAF how you need it - inline or out-of-line and as a cloud service in Amazon Web Services or Microsoft Azure or as a physical or virtual appliance.</li><li>Real-Time Threat Detection. Identify abnormal behavior, improve threat blocking and prevent outbound data leaks with bi-directional traffic analysis and behavioral profiling.</li><li>Simplified Customization. Pre-define rules and customize scenarios to focus on the specific requirements of your applications and your business.</li><li>Improved Performance. Take advantage of features outside of security to improve performance by load balancing traffic or identifying issues and trends in the web application environment.</li><li>Built-in Threat Intelligence. The elite SpiderLabs team delivers ongoing application vulnerability and emerging threat information to the Trustwave WAF.</li><li>Built-In Compliance Reporting. Includes pre-built best practice controls and reports for compliance mandates including the PCI DSS.</li><li>Built-in Integration. Integration with Trustwave App Scanner provides customized protection for any application via virtual patching.</li></ul>","shortDescription":"The Trustwave Web Application Firewall (WAF) helps you protect your valuable web applications and data by continuously monitoring traffic and enforcing policies to identify and block threats. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"TrustWave Web Application Firewall (WAF)","keywords":"Trustwave, application, virtual, patching, threat, SpiderLabs, team, protection","description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:title":"TrustWave Web Application Firewall (WAF)","og:description":"The Trustwave WAF integrates with Trustwave application scanning solution, App Scanner to provide customized protection for any application via virtual","og:image":"https://old.b4r.io/fileadmin/user_upload/Trustwave.png"},"eventUrl":"","translationId":1635,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":251,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif","logo":true,"scheme":false,"title":"Sophos UTM","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"sophos-utm","companyTitle":"Sophos","companyTypes":["vendor"],"companyId":2791,"companyAlias":"sophos","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection.\r\nHighlights\r\nÌ Every feature available on every appliance\r\nÌ Firewall, VPN, ATP, IPS, email, web filtering and app control\r\nÌ Hardware, virtualized, software or cloudbased appliance\r\nÌ Intuitive browserbased interface\r\nÌ Built-in reporting on all models\r\nÌ Two-factor authentication with one-time password (OTP) in many areas\r\nÌ Integrated wireless controller\r\n\r\nConsolidated network security platform—no compromise\r\nProtect your network using multi-layered proven protection technologies including\r\nAdvanced Threat Protection (ATP), IPS, VPN, email and web filtering combined with the\r\nindustry’s simplest admin interface. We’ve engineered our software and hardware to give\r\nyou the throughput speeds you need. And, you can choose the level of protection you need\r\nwith modular subscriptions as every feature is available on every appliance.\r\nAll the Next-Gen Firewall features you need\r\nWe’ll give you complete control to block, allow, shape and prioritize applications. Our Deep\r\nLayer-7 inspection (Next-Generation Firewall) ensures true application identification and has\r\nregular automatic updates. And you’ll get feedback on unclassified applications too.\r\nIntuitive management and detailed reporting\r\nYou’ll know what’s happening with your users and you’ll have complete control over all the\r\nfeatures you need, with none of the complexity. Easily build policies while getting detailed\r\nreal-time and historical data with our on-box reporting, helping you to fix problems fast. And\r\nour Free Sophos UTM Manager lets you centrally administer several appliances through a\r\nsingle login.\r\nConnect remote offices with easy VPN and Wi-Fi\r\nSophos RED (Remote Ethernet Device) provides secure remote access to your off-site\r\nlocations. It’s the first security gateway that requires no technical skills at the remote site.\r\nOnce installed, it forwards traffic to the UTM for complete security. Sophos UTM also works\r\nas a wireless controller; access points are automatically set up and receive complete UTM\r\nprotection.","shortDescription":"Sophos UTM provides the ultimate network security package with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sophos UTM","keywords":"with, security, need, your, Sophos, control, protection, appliance","description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:title":"Sophos UTM","og:description":"Unified Threat Management makes security simple. Sophos UTM provides the ultimate network security package with everything you need in a single modular","og:image":"https://old.b4r.io/fileadmin/user_upload/Sophos_UTM.gif"},"eventUrl":"","translationId":252,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":49,"title":"VPN - Virtual Private Network","alias":"vpn-virtual-private-network","description":"VPN (англ. Virtual Private Network — виртуальная частная сеть) — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).\r\n\r\nВ зависимости от применяемых протоколов и назначения, VPN может обеспечивать соединения трёх видов: узел-узел, узел-сеть и сеть-сеть.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/VPN\r\n","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/vpn.png"},{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/iam-identity-and-access-management.png"},{"id":335,"title":"Secure Content and Threat Management","alias":"secure-content-and-threat-management","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/content-security-management.png"},{"id":542,"title":"UTM - Unified Threat Management Appliance","alias":"utm-unified-threat-management-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/firewall-hardware.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/web-filtering-hardware.png"},{"id":556,"title":"Antispam - Appliance","alias":"antispam-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/antispam-hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/IPC1.png"},{"id":544,"title":"DLP - Appliance","alias":"dlp-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DLP1.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1581,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png","logo":true,"scheme":false,"title":"Imperva Incapsula","vendorVerified":0,"rating":"1.70","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":2,"alias":"imperva-incapsula","companyTitle":"Imperva","companyTypes":["vendor"],"companyId":207,"companyAlias":"imperva","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula can protect your organization against any DDoS threat.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">WEBSITE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection that automatically detects and mitigates attacks targeting websites and web applications.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Website Protection is an optional DDoS mitigation service that can be added to any Website Security subscription.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">INFRASTRUCTURE PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">On-demand or always-on protection against DDoS attacks that directly target your network infrastructure.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Infrastructure Protection can be used to defend entire subnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">NAME SERVER PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Always-on DDoS protection for your Name Server (NS) that protects DNS servers against network and application layer assaults.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Name Server Protection also accelerates DNS responses.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ALL-INCLUSIVE DDOS PROTECTION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula DDoS protection supports Unicast and Anycast technologies to power a many-to-many defense methodology. This automatically detects and mitigates attacks exploiting application and server vulnerabilities, hit-and-run events and large botnets.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">10-SECOND MITIGATION SLA</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">When DDoS strikes, it takes target services moments to go down and hours to recover. Incapsula is the only service to offer a SLA-backed guarantee to detect and block all attacks in under 10 seconds.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">HIGH-CAPACITY NETWORK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our high-capacity global network holds over (Terabits per second) of on-demand scrubbing capacity and can process 30 billion attack packets per second. Incapsula network has successfully defended clients against some of the largest attacks on record.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">ATTACK VISIBILITY</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula shows you attacks as they are happening and gives you actionable insight into Layer 7 attacks. Incapsula security dashboard lets you quickly analyze attacks and lets you adjust security policies on-the-fly to stop web application attacks.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">BLOCK ANY TYPE OF DDOS ATTACK</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Incapsula proxies all web requests to block DDoS attacks from being relayed to client origin servers. Incapsula detects and mitigates any type of attack, including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>TCP SYN+ACK</li><li>TCP FIN</li><li>TCP RESET</li><li>TCP ACK</li><li>TCP ACK+PSH</li><li>TCP Fragment</li><li>UDP</li><li>Slowloris</li><li>Spoofing</li><li>ICMP</li><li>IGMP</li><li>HTTP Flood</li><li>Brute Force</li><li>Connection Flood</li><li>DNS Flood</li><li>NXDomain</li><li>Mixed SYN + UDP or ICMP + UDP Flood</li><li>Ping of Death</li><li>Smurf</li><li>Reflected ICMP & UDP</li><li>As well as other attacks</li></ul>","shortDescription":"Incapsula is guaranteed to mitigate any DDoS attack in under 10 seconds, regardless of its size and without getting in the way of legitimate traffic. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":10,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Imperva Incapsula","keywords":"attacks, Incapsula, DDoS, against, network, PROTECTION, protection, that","description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:title":"Imperva Incapsula","og:description":"Incapsula can protect your organization against any DDoS threat.\rWEBSITE PROTECTION\rAlways-on DDoS protection that automatically detects and mitigates attacks","og:image":"https://old.b4r.io/fileadmin/user_upload/IMPERVA_Incapsula.png"},"eventUrl":"","translationId":1446,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":562,"title":"DDoS Protection - Appliance","alias":"ddos-protection-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/denial-of-service-attacks-protection-hardware.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/DDoS-Protection.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1604,"logoURL":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg","logo":true,"scheme":false,"title":"F5 Silverline Web Application Firewall","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"f5-silverline-web-application-firewall","companyTitle":"F5","companyTypes":["vendor"],"companyId":2749,"companyAlias":"f5","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data, and enable compliance with industry security standards, such as PCI DSS. Silverline Web Application Firewall is available as a fully managed service for comprehensive and customized app protection, or as an express self-service for rapid deployment of expertly maintained policies.\r\n<span style=\"font-weight: bold;\">Managed service key benefits</span>\r\n<ul>\r\n<li>Ensure application security and compliance</li>\r\n<li>Get comprehensive protection from advanced layer 7 attacks, OWASP Top Ten application security risks, and zero-day attacks—and enable compliance with key regulatory mandates.</li>\r\n<li>Get 24x7x365 expert service</li>\r\n<li>Receive 24x7x365 access to web application firewall (WAF) experts who build, proactively monitor, and fine-tune WAF policies against known and emerging threats.</li>\r\n<li>Deploy flexibly across hybrid environments</li>\r\n<li>Ensure consistent web application security, availability, and user experiences across traditional and cloud data centers.</li>\r\n<li>Defend with proven security effectiveness</li>\r\n<li>Leverage security efficacy with technology built on the NSS Labs–recommended F5 BIG-IP® Application Security Manager™ (ASM), based on tests that demonstrate 99.89 percent overall security effectiveness.</li>\r\n<li>Drive operational and cost efficiencies</li>\r\n<li>Remove the complexity of WAF management,</li>\r\n<li>increase the speed to deploy new policies, and</li>\r\n<li>decrease operational expenses.</li>\r\n<li>Gain attack insights and intelligence</li>\r\n<li>Access reports through the cloud-based customer portal and incorporate external intelligence for securing apps against identified threats. </li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">What’s Inside</span>\r\n<ul>\r\n<li>Drive Efficiencies with a Comprehensive Web Application Firewall Service</li>\r\n<li>Receive Expert Policy Building and Monitoring</li>\r\n<li>Hybrid Policy Management and Deployment</li>\r\n<li>Defend with Proven Security Effectiveness</li>\r\n<li>Comprehensive Attack Protection</li>\r\n<li>Built-In Compliance and Reporting Capabilities</li>\r\n<li>Gain Attack Insights and Intelligence</li>\r\n<li>Comprehensive Managed Service App Protection</li>\r\n<li>Streamlined Self-Service App Protection</li>\r\n<li>The Silverline Cloud-Based Platform</li>\r\n<li>Flexible Licensing</li>\r\n<li>Add-On Threat Intelligence Services</li>\r\n<li>F5 Security Operations Center</li>\r\n</ul>\r\n","shortDescription":"F5® Silverline® Web Application Firewall is a cloud-based service with 24x7x365 support from highly specialized security experts. It helps organizations protect web applications and data.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"F5 Silverline Web Application Firewall","keywords":"security, with, Application, service, Silverline, application, Firewall, policies","description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:title":"F5 Silverline Web Application Firewall","og:description":"F5® Silverline® Web Application Firewall is a cloud based service with 24x7x365 support from highly specialized security experts. It helps","og:image":"https://old.b4r.io/fileadmin/user_upload/F5_Silverline_Web_Application_Firewall.jpg"},"eventUrl":"","translationId":1605,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1612,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Positive_Technologies.png","logo":true,"scheme":false,"title":"PT Application Firewall","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"pt-application-firewall","companyTitle":"Positive Technologies","companyTypes":["supplier","vendor"],"companyId":1779,"companyAlias":"positive-technologies","description":"PT Application Firewall is a smart protection solution that offers a serious response to the security challenges created by web portals, ERP, and mobile applications.\r\nEach user group — security staff, network administrators, developers, and SOC operators — has role-based access to data and the admin interface.\r\n<span style=\"font-weight: bold; \">Highlights:</span>\r\n<ul><li>Focus on major threats. Correlation mechanisms reduce the number of alerts and highlight important incidents. Attack chain metrics simplify forensics.</li><li>Instant Blocking. Defends against “self-inflicted” vulnerabilities in custom-built software with virtual patches that protect apps until insecure code is fixed.</li><li>Protection against security bypass. Prevents most firewall bypass methods including HPC, HPP, and Verb Tampering.</li><li>Behavioral analysis against robots. Automated malware protection prevents brute-force attacks, fraud, DDoS attacks, botnets, uncontrolled indexing, and data leakage.</li><li>Evolving Security. Adapts to protect even the most dynamic applications that are constantly being refined and improved.</li></ul>\r\nИсточник: https://azuremarketplace.microsoft.com/ru-ru/marketplace/apps/ptsecurity.ptaf?tab=Overview","shortDescription":"PT Application Firewall detects known & unknown vulnerabilities and prevents attacks on web apps","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PT Application Firewall","keywords":"security, that, against, attacks, Application, data, most, applications","description":"PT Application Firewall is a smart protection solution that offers a serious response to the security challenges created by web portals, ERP, and mobile","og:title":"PT Application Firewall","og:description":"PT Application Firewall is a smart protection solution that offers a serious response to the security challenges created by web portals, ERP, and mobile","og:image":"https://old.b4r.io/fileadmin/user_upload/Positive_Technologies.png"},"eventUrl":"","translationId":1613,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1309,"logoURL":"https://old.b4r.io/fileadmin/content/zavantazhennja.png","logo":true,"scheme":false,"title":"Barracuda Web Application Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-web-application-firewall","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"<p>The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on your web servers—and the sensitive or confidential data to which they have access. Constant Protection from Evolving Threats The Barracuda Web Application Firewall provides superior protection against data loss, DDoS, and all known applicationlayer attack modalities. Automatic updates provide defense against new threats as they apear. As new types of threats emerge, it will acquire new capabilities to block them. Identity and Access Management The Barracuda Web Application Firewall has strong authentication and access control capabilities that ensure security and privacy by restricting access to sensitive applications or data to authorized users. Affordable and Easy to Use Pre-built security templates and intuitive web interface provide immediate security without the need for time-consuming tuning or application learning. Integration with security vulnerability scanners and SIEM tools automates the assessment, monitoring, and mitigation process</p>","shortDescription":"Barracuda Web Application Firewall - protect websites and apps from cyber threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Application Firewall","keywords":"Barracuda, Application, Firewall, security, data, access, capabilities, they","description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:title":"Barracuda Web Application Firewall","og:description":"The Barracuda Web Application Firewall blocks an ever-expanding list of sophisticated web-based intrusions and attacks that target the applications hosted on","og:image":"https://old.b4r.io/fileadmin/content/zavantazhennja.png"},"eventUrl":"","translationId":1391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1582,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png","logo":true,"scheme":false,"title":"Barracuda WAF-as-a-Service","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":4,"alias":"barracuda-waf-as-a-service","companyTitle":"Barracuda Networks","companyTypes":["vendor"],"companyId":183,"companyAlias":"barracuda-networks","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this and have become increasingly clever with their attempts to bring down or compromise websites and apps. These attacks can be prevented, but organizations often struggle to implement a robust web application security posture due to several challenges:\r\n<ul>\r\n<li>Application security is complicated to deploy and manage without specialized resources.</li>\r\n<li>Continuous updates to applications can lead to new vulnerabilities.</li>\r\n<li>Legacy applications were developed without secure coding practices.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda WAF-as-a-Service?</span>\r\n<ul>\r\n<li>Built on a proven security platform. Enterprise-proven technology that provides comprehensive protection from all OWASP recognized security risks, DDoS attacks, and even the most advanced zero-day threats. Proactive bot defense ensures always-on protection from automated attacks, web scraping, and brute force attacks.</li>\r\n<li>Simplified application security for everyone. Remove the complexity of setting up and configuring your application security solution. Barracuda WAF-as-a-Service delivers protection for your web apps in minutes thanks to a simple 5-step setup wizard, and numerous pre-built security policy templates.</li>\r\n<li>Complete control. Unlimited rulesets. For more advanced users, Barracuda WAF-as-a-Service offers a level of control traditionally reserved only for on-premises and public cloud solutions. Fine-tune specific policies for each component of every application's security profile.</li>\r\n<li>Automated vulnerability discovery and remediation. Barracuda Vulnerability Remediation Service is built-in and provides automatic vulnerability detection and remediation which can be scheduled, ensuring ongoing protection without any administrative overhead.</li>\r\n<li>Granular visibility with detailed logs and reports. Gain rich insight into all web traffic events and users. Detailed compliance reports help you easily understand your security status at any given time by having complete visibility into all HTTP/S traffic.</li>\r\n<li>Unmetered DDoS protection included. DDoS attacks disrupt the service availability of your web apps which can have a significant impact on your business. Barracuda WAF-as-a-Service defends against the full spectrum of L3-L7 DDoS attacks ensuring the availability of your web apps.</li>\r\n</ul>\r\n","shortDescription":"Barracuda WAF-as-a-Service - Protect every web app, hosted anywhere, in minutes.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda WAF-as-a-Service","keywords":"security, your, Barracuda, attacks, protection, WAF-as-a-Service, application, DDoS","description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:title":"Barracuda WAF-as-a-Service","og:description":"Complete application security does not have to be complicated. Web applications are connected directly to your business and customer data. Attackers know this","og:image":"https://old.b4r.io/fileadmin/user_upload/Barracuda_WAF-as-a-Service.png"},"eventUrl":"","translationId":1583,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":42,"title":"UTM - Unified threat management","alias":"utm-unified-threat-management","description":"Межсетево́й экра́н, сетево́й экра́н — это комплекс аппаратных и программных средств в компьютерной сети, осуществляющий контроль и фильтрацию проходящих через него сетевых пакетов в соответствии с заданными правилами.\r\n\r\nОсновной задачей сетевого экрана является защита сети или отдельных её узлов от несанкционированного доступа. Также сетевые экраны часто называют фильтрами, так как их основная задача — не пропускать (фильтровать) пакеты, не подходящие под критерии, определённые в конфигурации.\r\n\r\nНекоторые сетевые экраны также позволяют осуществлять трансляцию адресов — динамическую замену внутрисетевых (серых) адресов или портов на внешние, используемые за пределами локальной сети, что может обеспечивать дополнительную безопасность.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%9C%D0%B5%D0%B6%D1%81%D0%B5%D1%82%D0%B5%D0%B2%D0%BE%D0%B9_%D1%8D%D0%BA%D1%80%D0%B0%D0%BD","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/Firewall__2_.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1606,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png","logo":true,"scheme":false,"title":"FortiWeb: Web Application Firewall (WAF)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":21,"alias":"fortiweb-web-application-firewall-waf","companyTitle":"Fortinet","companyTypes":["vendor"],"companyId":690,"companyAlias":"fortinet","description":"FortiWeb Product Details Whether to simply meet compliance standards or to protect mission-critical hosted applications, FortiWeb's web application firewalls provide advanced features that defend web applications from known and zero-day threats. Using an advanced multi-layered and correlated approach, FortiWeb provides complete security for your external and internal web-based applications from the OWASP Top 10 and many other threats. At the heart of FortiWeb are its dual-layer AI-based detection engines that intelligently detect threats with nearly no false positive detections.\r\n<span style=\"font-weight: bold;\">Features and Benefits</span>\r\n<ul> <li>Proven Web Application Protection. FortiWeb protects against all the OWASP Top-10 threats, DDoS attacks and many others to defend your mission critical web-based applications</li> <li>AI-based Threat Detection. In addition to regular signature updates and many other layers of defenses, FortiWeb’s AI-based, dual-layer machine learning engines protect against zero-day attacks</li> <li>Security Fabric Integration. Integration with FortiGate firewalls and FortiSandbox deliver protection from advanced persistent threats</li> <li>Advanced Visual Analytics. FortiWeb’s visual reporting tools provide detailed analyses of attack sources, types and other elements that provide insights not available with other WAF solutions </li> <li>False Positive Mitigation Tools. Advanced tools that minimize the day-to-day management of policies and exception lists to ensure only unwanted traffic is blocked</li> <li>Hardware-based Acceleration. FortiWeb delivers industry-leading protected WAF throughputs and blazing fast secure traffic encryption/decryption</li> </ul>","shortDescription":"FortiWeb is a web application firewall (WAF) that protects hosted web applications from attacks that target known and unknown exploits using multi-layered and correlated detection methods.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FortiWeb: Web Application Firewall (WAF)","keywords":"FortiWeb, threats, that, applications, other, advanced, provide, from","description":"FortiWeb Product Details Whether to simply meet compliance standards or to protect mission-critical hosted applications, FortiWeb's web application firewalls","og:title":"FortiWeb: Web Application Firewall (WAF)","og:description":"FortiWeb Product Details Whether to simply meet compliance standards or to protect mission-critical hosted applications, FortiWeb's web application firewalls","og:image":"https://old.b4r.io/fileadmin/user_upload/Fortinet.png"},"eventUrl":"","translationId":1607,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"},{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1620,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"AWS WAF","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"aws-waf","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения, привести к нарушению безопасности или задействовать чрезмерное количество ресурсов. С помощью настраиваемых правил безопасности AWS WAF позволяет определить, какой трафик для данного интернет-приложения является допустимым и какой необходимо блокировать. AWS WAF можно использовать для создания пользовательских правил, блокирующих распространенные схемы атак (внедрение SQL-кода, межсайтовый скриптинг и т. п.), а также индивидуальных правил для конкретных приложений. Новые правила можно развертывать в течение нескольких минут, что позволит быстро реагировать на изменения схемы трафика. Также AWS WAF предлагает полнофункциональный API, позволяющий автоматизировать процессы создания, развертывания и обслуживания правил безопасности.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Используя сервис AWS WAF, вы платите только за то, что реально используете. Тарифы сервиса AWS WAF зависят от количества развертываемых правил и количества запросов, получаемых веб-приложением. Сервис не требует авансовых обязательств.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Выполнить развертывание AWS WAF можно либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед веб-серверами или серверами источника, работающими на EC2. </span>\r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Преимущества</span>\r\n<span style=\"font-weight: bold;\">Усиленная защита от Интернет-атак</span>\r\nAWS WAF защищает веб-приложения от атак за счет фильтрации трафика на основании созданных вами правил. Например, можно задать фильтрацию сетевых запросов по IP-адресам, заголовкам и телам HTTP-сообщений или строкам URI, что позволяет заблокировать такие распространенные схемы атак, как внедрение SQL-кода или межсайтовый скриптинг.\r\n<span style=\"font-weight: bold;\">Интегрированная защита в ходе разработки приложения</span>\r\nКаждую из функций AWS WAF можно настроить с помощью API сервиса AWS WAF или Консоли управления AWS. Это позволит вам задать правила, повышающие уровень безопасности отдельных приложений, уже на стадии разработки. Вы сможете внедрять средства сетевой безопасности на разных этапах процесса разработки: предоставить их разработчику, изначально пишущему код, специалисту DevOps, выполняющему развертывание приложения, и экспертам в области безопасности, выполняющим аудит.\r\n<span style=\"font-weight: bold;\">Простое развертывание и обслуживание</span>\r\nРазвертывание AWS WAF выполняется легко и помогает обеспечить защиту приложений, развернутых либо на Amazon CloudFront в виде компонента решения CDN, либо на Application Load Balancer (ALB), расположенном перед вашими серверами источника. Не требуется развертывать какое-либо дополнительное программное обеспечение, необходимо лишь включить AWS WAF на соответствующем ресурсе. Правила можно задать централизованно и использовать их повторно во всех веб-приложениях, которые нужно защитить. \r\n<span style=\"font-weight: bold;\">Улучшенная возможность отслеживания интернет-трафика</span>\r\nСервис AWS WAF можно настроить только для мониторинга запросов, соответствующих критериям фильтрации. AWS WAF позволяет отслеживать интернет-трафик в режиме, близком к реальному времени, благодаря чему можно оперативно создавать новые правила или предупреждения в Amazon CloudWatch. \r\n<span style=\"font-weight: bold;\">Экономичная защита веб-приложений</span>\r\nИспользуя сервис AWS WAF, вы платите только за то, что реально используете. Сервис AWS WAF содержит индивидуальные предложения, работающие по принципу самообслуживания; его тарифы зависят от количества развертываемых правил и количества веб-запросов, получаемых веб-приложением. Минимальные платежи и авансовые обязательства отсутствуют.","shortDescription":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS WAF","keywords":"можно, правил, безопасности, количества, либо, приложений, задать, только","description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:title":"AWS WAF","og:description":"AWS WAF – это брандмауэр для интернет-приложений, позволяющий защитить их от распространенных сетевых эксплойтов, способных повлиять на доступность приложения,","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":2743,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1621,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png","logo":true,"scheme":false,"title":"AWS WAF - Web Application Firewall","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":7,"alias":"aws-waf-web-application-firewall","companyTitle":"Amazon Web Services","companyTypes":["supplier","vendor"],"companyId":176,"companyAlias":"amazon-web-services","description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.\r\nWith AWS WAF you pay only for what you use. AWS WAF pricing is based on how many rules you deploy and how many web requests your web application receives. There are no upfront commitments.\r\nYou can deploy AWS WAF on either Amazon CloudFront as part of your CDN solution or the Application Load Balancer (ALB) that fronts your web servers or origin servers running on EC2. \r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits</span>\r\n<span style=\"font-weight: bold;\">Increased Protection Against Web Attacks</span>\r\nAWS WAF protects web applications from attacks by filtering traffic based on rules that you create. For example, you can filter web requests based on IP addresses, HTTP headers, HTTP body, or URI strings, which allows you to block common attack patterns, such as SQL injection or cross-site scripting.\r\n<span style=\"font-weight: bold;\">Security Integrated with How You Develop Applications</span>\r\nEvery feature in AWS WAF can be configured using either the AWS WAF API or the AWS Management Console. This allows you to define application-specific rules that increase web security as you develop your application. This lets you put web security at multiple points in the development chain, from the hands of the developer initially writing code, to the DevOps engineer deploying software, to the security experts conducting an audit.\r\n<span style=\"font-weight: bold;\">Ease of Deployment & Maintenance</span>\r\nAWS WAF is easy to deploy and protect application(s) deployed on either Amazon CloudFront as part of your CDN solution or the Application Load Balancer that fronts all your origin servers. There is no additional software to deploy except to enable AWS WAF on the right resource. You can centrally define your rules, and reuse them across all the web applications that you need to protect. \r\n<span style=\"font-weight: bold;\">Improved Web Traffic Visibility</span>\r\nYou can set up AWS WAF to just monitor requests that match your filter criteria. AWS WAF gives near real-time visibility into your web traffic, which you can use to create new rules or alerts in Amazon CloudWatch. \r\n<span style=\"font-weight: bold;\">Cost Effective Web Application Protection</span>\r\nWith AWS WAF you pay only for what you use. AWS WAF provides a customizable, self-service offering, and pricing is based on how many rules you deploy and how many web requests your web application receives. There are no minimum fees and no upfront commitments.","shortDescription":"AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS WAF - Web Application Firewall","keywords":"your, rules, that, application, security, deploy, requests, based","description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to","og:title":"AWS WAF - Web Application Firewall","og:description":"AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to","og:image":"https://old.b4r.io/fileadmin/user_upload/Amazon_WorkSpaces.png"},"eventUrl":"","translationId":1621,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":19,"title":"WAF - Web Application Firewall"}],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/WAF.png"},{"id":546,"title":"WAF-web application firewall appliance","alias":"waf-web-application-firewall-appliance","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/waf-application-firewall-hardware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["Malware infection via Internet, email, storage devices","No IT security guidelines","Risk or Leaks of confidential information","Risk of attacks by hackers","Risk of data loss or damage","Risk of lost access to data and IT systems","High costs"],"materials":[],"useCases":[],"best_practices":[],"values":["Reduce Costs","Ensure Security and Business Continuity"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"19":{"id":19,"title":"WAF - Web Application Firewall"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}