Overview
To protect their services from various web threats, Cloud Service Providers (CSPs) such as AWS provide a Web Application Firewall (WAF), allowing the users to create and manage security rules that fit their needs. These user-centered self-service WAFs can block web attacks such as SQL Injections and Cross Site Scripting (XSS) and filter specific IP addresses or regions.
However, as AWS WAF requires the users to create, configure, and manage the rules for AWS WAF on their own, the users are burdened with complicated rules and maintenance responsibilities, which can be difficult for a user without expert knowledge.
Cloudbric’s WAF Managed Service (WMS) is an intelligence-based security rule operation and management service that provides systematic support for users under the supervision of security experts with over 20 years of experience in the field and accumulated know-how to protect from various security threats. WMS provides Rule Sets and intelligence-based threat detection technologies according to the user’s environment to maintain a stable level of security while minimizing the burden of operation and management for the users.
With the logic-based detection engine with the leading market share in the APAC region, WMS accurately detects abnormal patterns and behaviors from millions of logs. With threat IP information collected and processed from over 700,000 sites in 95 countries, WMS can analyze the reputation of the threat IPs and promptly respond to any advanced cyberattacks. To further improve the service quality, Cloudbric has joined the Cyber Threat Analysis & Sharing (C-TAS) and Cyber Threat Alliance (CTA) to link with their systems to advance the Threat DB.
Through 24/7 support channels and technical support provided in Korean, English, and Japanese, users can maintain an advanced security level through Cloudbric’s WMS, even without security experts onboard.
Highlights
- Web-based intuitive user interface provided for the users to conveniently review the security status of the website and apply appropriate measures without any expert knowledge.
- Helps user to focus on key business by protecting the users from threats and conserving time in maintaining the rules.
- Establishes countermeasures against new vulnerabilities, security issues such as false-positive, and any related threats based on the expertise of over 20 years of experience in the field and accumulated know-hows.
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Resources
Vendor resources
Support
Vendor support
24/7 support channels are available in cases where the user is experiencing an attack. Technical support is provided in Korean, English, and Japanese.
For product-related all inquiries, please contact : awsmkp@pentasecurity.com .
If you are a buyer based in Japan, and need to request a TQI, please contact: jp-sales@pentasecurity.com .