Cyberoam launches Web application firewall subscription on its UTM appliances

6 March 2012 IT infrastructure

Today, organisations host critical Web-based applications like CRM, ERP, inventory management, online banking, e-commerce applications and more. Vulnerabilities present in these Web-applications give free reign to hackers to break into organisations IT networks and reach the database server. This can result into loss of sensitive business data, IPR theft, downtime, and loss of reputation for organizations

Cyberoam now secures critical Web applications in organisations with the launch of its Web Application Firewall (WAF), available as a subscription on Cyberoam UTM appliances. Cyberoam Web Application Firewall (WAF) is deployed to intercept the traffic to and from the Web servers to provide an added layer of security against attacks before they can reach the Web applications. Available as a subscription on Cyberoam UTM, it will remove the need for SMBs and enterprises to spend a fortune on dedicated hardware appliances or other price-through-the-roof solutions.

Cyberoam WAF follows the positive security model based on its Intuitive Website Flow Detector to secure Web-based applications against attacks like SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking and more, including the OWASP Top 10 Web application vulnerabilities.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

SIM management tool for IoT security devices
Issue 9 2020, Flickswitch , IT infrastructure
SIM management can appear easy when you start off, but quickly becomes complicated as your SIM base grows.

LD Africa joined forces with Jimi IoT
Issue 9 2020, LD Africa , IT infrastructure
LD Africa is now an approved distributor of Jimi IoT security solutions such as body-worn cameras, PTT walkie-talkies over GSM and specialised CCTV cameras.

Opportunities on the edge
Issue 9 2020 , Editor's Choice, IT infrastructure
The ability of organisations to realise business value from data increasingly depends on their capacity to collect, process, store and analyse it at the edge.

Think data protection first, POPIA compliance will come
Issue 9 2020, AVeS Cyber Security , IT infrastructure
Rather than focusing only on compliance, use POPIA as an opportunity to sharpen your organisation’s data protection capabilities.

TRENDnet introduces ONVIF conformant Smart Surveillance switches
Issue 7 2020, TRENDnet , IT infrastructure
Gigabit PoE+ Smart Surveillance switches support PoE self-healing and integrated camera management features, and are ONVIF Profile Q conformant.

First Distribution to distribute Video Storage Solutions
Issue 8 2020 , News, CCTV, Surveillance & Remote Monitoring, IT infrastructure
First Distribution has signed an agreement to distribute the entire Video Storage Solutions (VSS) product line of video surveillance appliances.

COVID-19 will foster much needed collaboration in the future of work
Issue 7 2020 , IT infrastructure
Business leaders are starting to discuss the lessons learnt from these challenging times and how they can be used to shape the future world of work.

Fake cloud vs true cloud
Issue 7 2020 , IT infrastructure
Many organisations have invested in fake cloud solutions only to find out that the benefits they expected have not materialised.

The other connectivity option
Issue 8 2020 , IT infrastructure
The most efficient and affordable connectivity options for remote areas is unquestionably VSAT technology.

Finding customer insights from data
Issue 8 2020 , IT infrastructure
Data is often trapped in multiple siloes, in non-standardised formats and frequently inaccessible to those who need it, hampering operational efficiency and regulatory compliance.