Quttera launches first release of its cloud-based Web Application Firewall

Quttera announced the launch and immediate availability of its Web Application Firewall (WAF). The new firewall is provided as a managed service that protects from application layer attacks, including all OWASP top 10, zero-day threats and much more.

The existing and new customers of ThreatSign – Website Anti-Malware platform can enable the firewall effective immediately to monitor the incoming traffic and block the cyber attacks automatically.

The new WAF is based on Quttera’s threat detection technology powering the traffic filtering rules with automated updates from the threat intelligence database.

The information in the threat intelligence database is coming from Quttera’s online scanners, which are crawling the web and scanning millions of domains/URLs for malware monthly.

WAF rules created by Quttera in response to new threats are distributed to company’s network ensuring update of the protection delivered to entire customer community.

“The addition of the next-generation web application firewall to the cybersecurity toolset developed by Quttera is a significant step towards our objective of building all-in-one anti-malware tools that take malware detection and prevention to another level,” said Michael Novofastovsky, Quttera CTO and co-founder.

“From early results, we can see that WAF rules created in response to new/unknown threats gathered by Quttera scanners are responsible for the detection of the majority of the attacks. Quttera’s WAF is another successful usage of our unique detection technology to enhance the traditional OWASP and customized rules approach and to better fit the new generation of web applications.”

Website application firewall added to the ThreatSign – Website Anti-Malware platform, introduced new capabilities to the set of services which now include among the others:

  • OWASP Top 10,
  • Virtual patching,
  • Security misconfiguration discovery,
  • Shell code detection,
  • XML external entities detection,
  • Vulnerability exploit detection,
  • Brute force protection,
  • Bots (any kind of agent filtering) blocking,
  • GEO location blocking,
  • Preventing upload of malicious files,
  • XSS blocking,
  • Injection protection,
  • Generic attack protection.
More about

Don't miss