-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- Meticulous and efficient rules
Based on years of cybersecurity research and accumulation, the Inspur Cloud WAF rule base has been highly refined; While refining a variety of rules, Cloud WAF also introduces a number of mechanisms to ensure the accuracy and effectiveness of the rules.
- Protection perspective of the tenant view
Cloud WAF treats the site as the user’s customer assets, uses the site tree to display the asset list, visually displays the asset list and the attributes of each asset, and saves the security policies used by the assets in the form of templates.
- Whitelist based on self-study
The self-learning + whitelist mechanism introduced by Cloud WAF makes up for the inherent shortcomings of the blacklist protection system and effectively enhances the protection and precise protection capabilities of 0-day vulnerabilities. It assists administrators in building normal business traffic models and forming whitelist rules.
Product functions
- Web attack protection
As a professional protection device for web application systems, Cloud WAF has a built-in dual detection and protection mechanism with an algorithm protection engine and an event protection engine to block web attacks without affecting normal business access.
- Application-layer DDOS protection
Cloud WAF uses intelligent traffic identification and detection technology to perform interactive verification of information on the access source client and identify the legitimacy of its access identity, and adopts a strict data flow compliance check mechanism to ensure the availability and continuity of web services.
- Sensitive information protection
Cloud WAF has the sensitive information leakage prevention capability, which can flexibly define the default page that is returned when HTTP errors are generated, thus avoiding the leakage of sensitive information caused by web service exceptions.
- Malicious code protection
Cloud WAF supports the detection of link content embedded in web tag links, and uses blacklist and abnormal detection technologies to detect and prevent web page trojan behaviors.
Application scenarios
-
Attack protection requirements for web portals and web applications
-
Defend against attacks from the Internet on web portals and open government systems, and prevent web pages from being maliciously tampered with, data leaked, or controlled by Trojans to attack other internal systems as an internal springboard; Attack protection of internal web-based business systems can prevent attack behaviors such as malicious data theft and data tampering by internal illegals on web-based applications.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.