WAF

Operational Security

Web Application Firewall

.01

The protective effect and quality of the detection of a context-sensitive firewall are particularly dependent on good modeling of the respective profiles based on the rule sets provided by the manufacturer.

If necessary, we can also expand the manufacturer's rules with rule sets that are precisely tailored to the application to be protected in order to minimize the attack surface of an application or to completely mitigate new attack vectors.

Our experience in recent years shows that quality assurance in the administration of web application firewalls is usually not sufficient. It is particularly important for us to know that the WAF is working properly and that the applications are protected as best as possible. We ensure this with a solution specially developed for this purpose.

In addition, the evaluation of the events is of particular importance, on the one hand to identify errors in the rules and on the other hand to draw a picture of the current threat situation.

We support you

.02

  • Evaluation – Which WAF is best suited for the project
  • Setup – Integration into existing infrastructure (on-premise, cloud)
  • Migration – exchange of WAF; Adoption, adaptation of old configurations
  • Management – Maintenance and ongoing modeling of profiles and rules
  • Auditing – Inspection of the rules, optimization, analysis of the threat situation