Cloud WAF CWAF

It provides professional protection for web applications, detects and verifies contents of all kinds of requests from web application clients, effectively responds to SQL injection, cross-site scripting and its deformation attacks, detects web page tampering in real time, provides active diagnosis of trojans, and provides fine-grained application-layer DDoS attack protection functions.

  • Product Advantages
  • Product functions
  • Application scenarios
  • solution

Product Advantages

  • Meticulous and efficient rules

    Based on years of cybersecurity research and accumulation, the Inspur Cloud WAF rule base has been highly refined; While refining a variety of rules, Cloud WAF also introduces a number of mechanisms to ensure the accuracy and effectiveness of the rules.

  • 安全稳定.png
    Protection perspective of the tenant view

    Cloud WAF treats the site as the user’s customer assets, uses the site tree to display the asset list, visually displays the asset list and the attributes of each asset, and saves the security policies used by the assets in the form of templates.

  • Whitelist based on self-study

    The self-learning + whitelist mechanism introduced by Cloud WAF makes up for the inherent shortcomings of the blacklist protection system and effectively enhances the protection and precise protection capabilities of 0-day vulnerabilities. It assists administrators in building normal business traffic models and forming whitelist rules.

Product functions

  • Web attack protection

    As a professional protection device for web application systems, Cloud WAF has a built-in dual detection and protection mechanism with an algorithm protection engine and an event protection engine to block web attacks without affecting normal business access.

  • Application-layer DDOS protection

    Cloud WAF uses intelligent traffic identification and detection technology to perform interactive verification of information on the access source client and identify the legitimacy of its access identity, and adopts a strict data flow compliance check mechanism to ensure the availability and continuity of web services.

  • Sensitive information protection

    Cloud WAF has the sensitive information leakage prevention capability, which can flexibly define the default page that is returned when HTTP errors are generated, thus avoiding the leakage of sensitive information caused by web service exceptions.

  • Malicious code protection

    Cloud WAF supports the detection of link content embedded in web tag links, and uses blacklist and abnormal detection technologies to detect and prevent web page trojan behaviors.

Application scenarios

  • Attack protection requirements for web portals and web applications

  • Defend against attacks from the Internet on web portals and open government systems, and prevent web pages from being maliciously tampered with, data leaked, or controlled by Trojans to attack other internal systems as an internal springboard; Attack protection of internal web-based business systems can prevent attack behaviors such as malicious data theft and data tampering by internal illegals on web-based applications.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.