AWS WAF

AWS WAF

Amazon
+
+

Related Products

  • Cloudflare
    1,918 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • AI Docs
    15 Ratings
    Visit Website
  • 1Password
    16,511 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Retool
    566 Ratings
    Visit Website
  • Kamatera
    152 Ratings
    Visit Website
  • Feroot
    27 Ratings
    Visit Website

About

AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules. With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives.

About

Web attack recognition is based on AI+ rules. It is anti-bypass and low in both false negative and false positive rates. Web attack recognition defends effectively against common web attacks including the OWASP top 10 web security threats (SQL injection, unauthorized access, cross-site scripting, cross-site request forgery, web shell trojan upload, etc). Users can cache core web contents to the cloud and publish cached web pages, which act as substitutes and can prevent the negative consequences of web page tampering. Backend data is well protected by pre-event server and application concealing, mid-event attack prevention and post-event sensitive data replacement and concealing. WAF performs nationwide DNS verification of the domain names submitted by the customer to detect and display the hijacking conditions of the protected domain names in various regions, helping avoid data theft and financial losses caused by the hijacking of website users.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone looking to protect their web applications from common web exploits

Audience

Companies searching for an AI-based web business protection solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/waf/

Company Information

Tencent
Founded: 2013
China
intl.cloud.tencent.com/product/waf

Alternatives

Alternatives

AppWall

AppWall

Radware
Trusted Knight Protector Web

Trusted Knight Protector Web

Trusted Knight Corporation

Categories

Categories

Web Application Firewalls (WAF) Features

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
Dashboard
DDoS Protection
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Integrations

AWS App Mesh
AWS Elastic Load Balancing
AWS Firewall Manager
AWS Marketplace
AWS Shield
Amazon CloudFront
Amazon Data Firehose
Chronicle SOAR
Elastic Observability
EmailAuth.io
HUMAN Bot Defender
MLM Protec
Mackerel
New Relic
NopeCHA
Sekoia.io
SolarWinds AppOptics
Temperstack
Tencent Cloud

Integrations

AWS App Mesh
AWS Elastic Load Balancing
AWS Firewall Manager
AWS Marketplace
AWS Shield
Amazon CloudFront
Amazon Data Firehose
Chronicle SOAR
Elastic Observability
EmailAuth.io
HUMAN Bot Defender
MLM Protec
Mackerel
New Relic
NopeCHA
Sekoia.io
SolarWinds AppOptics
Temperstack
Tencent Cloud
Claim AWS WAF and update features and information
Claim AWS WAF and update features and information
Claim Tencent Cloud Web Application Firewall and update features and information
Claim Tencent Cloud Web Application Firewall and update features and information