Dragonwaf

223 views

Published on

Web Application Firewall

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
223
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Dragonwaf

  1. 2. The Website Security ensures <ul><li>User Access </li></ul><ul><li>Information Engagement </li></ul><ul><li>Safe Online Transaction </li></ul><ul><li>Brand Trustworthiness </li></ul><ul><li>Business Sustainability </li></ul>
  2. 3. Compromised Web Sites
  3. 4. Threats Facing Web Servers SQL Injection Buffer Overflow HTTP Response Splitting Encoding Attack Keyword Strings Directory Traversal Directory Indexing Shellcode Unauthorized HTTP command
  4. 5. Difference From Ordinary Firewalls 75% of cyber attacks pass through ordinary firewalls
  5. 6. Difference From Conventional Firewalls
  6. 7. DragonWAF Features <ul><li>Website malicious attack & injection filtration </li></ul><ul><li>SQL Injection Prevention </li></ul><ul><li>Buffer Overflow Protection </li></ul><ul><li>Shellcode Exploits Prevention </li></ul><ul><li>HTTP Allowed Methods Prevention </li></ul><ul><li>Encoding Attack Prevention </li></ul><ul><li>Directory Traversal Prevention </li></ul><ul><li>Keyword Strings Filtration </li></ul><ul><li>Cross Site Scripting, (XSS) Attack Prevention </li></ul><ul><li>AJAX Attack Prevention </li></ul><ul><li>X Path Attack Prevention </li></ul><ul><li>XML Attack Prevention </li></ul><ul><li>Allow Directory Prevention </li></ul><ul><li>Customizable Remote Warning Page </li></ul><ul><li>Support SSL websites </li></ul><ul><li>OWASP/PCI-DSS 6.6 compliant </li></ul>
  7. 8. DragonWAF Benefits
  8. 9. DragonWAF Deployment
  9. 10. http://www.cyberim.co.uk/ info @cyberim.co.uk

×