All-Environment Web Application Firewall

Protect web applications, services, e-commerce shops and APIs from common web vulnerabilities and cyber threats. No matter whether you're hosting on-premises, in the cloud or in hybrid environments.

Screenshot of rescaled WAF Block Page

Feature Highlights

Purpose-Built For All Environments

Our WAF solution comes with a variety of flexible features allowing it to be used in nearly any environment with any workload imaginable.

Scalable.
Every component of our WAF is designed to scale horizontally to be used with all quantities of traffic imaginable.
Customizable.
Decide what your visitors see when requests are being blocked with custom templates and placeholders.
Scored Rules.
All rulesets can be adjusted to either block requests immediately or only after a certain amount of rules matched.
Fast.
Evaluating a request against 100 rules only adds around 3 ms of processing time which makes it barely noticeable.
Powerful Configuration.
Work with Common Expression Language (CEL) expressions to create powerful custom rules.
Body Inspection.
Match rules against payload that is being sent to your workload instead of relying on request metadata, only.
Prometheus Integration.
Get insights into how many requests have been blocked and processed with custom Prometheus metrics.
IP Geolocation.
Configure rules that work with IP geolocation data to block requests from countries or regions of the world.
ASN Matching.
Block requests from malicious networks known for their illegal activity.

Configuration

Tailored Protection

Extensible rulesets and flexible configuration options make it easy to adapt rescaled WAF to your specific workload and security needs.

Baseline Security.
Our General Purpose Rulesets (GPRs) for all environments help you to protect you from common background noise and known vulnerabilities establishing a defensive baseline.
Application Protection.
Choose from a variety of additional rulesets to address common attack patterns against the frameworks and libraries you use.
Targeted Attack Mitigation.
Enrich existing rules with fine-grained rules tailored to prevent targeted attacks against you with surgical precision for maximum protection.
config.yaml
waf.log
- id: gen-ssrf-003
  name: Cloud Metadata SSRF (AWS)
  expression: |
      string(query).contains("169.254.169.254") ||
      string(body).contains("169.254.169.254") ||
      string(query).contains("/latest/meta-data")
  score: 100
  enabled: true
                                    

Threat Intelligence

Smart Blocklisting

Every request is being analyzed and prepared by out threat intelligence engine to allow for smart blocking rules based on extended fields that go beyond the scope of the HTTP protocol.

ASN Blocklisting.
Prevent well-known malicious networks from accessing your resources by blocking entire Autonomous Systems Numbers (ASNs) with a single rule.
Geo Blocklisting.
Restrict access to your resources based on the geographical location of the requester, either for compliance reasons or simply to remove countries of continuous harm from the equation.
Tor Blocklisting.
Intelligent detection of exit nodes of the Tor anonymization network allow you to prevent their users from accessing your website by enabling a single rule.
Feature showcase of rescaled WAF

Use Cases

Block Cyberthreats At The Edge

Setting up a Web Application Firewall (WAF) doesn't make magically immune against cyber attacks. But it helps you to reduce exposure to common threats and to make it harder for threat actors to exploit your applications.

Leaked Secrets.
Mitigate directory and file enumeration attacks and prevent secrets from being leaked due to misconfiguration and accidental exposure.
Directory Traversal.
Prevent attackers from navigating to arbitrary directories on your server by matching requests against a list of known patterns.
XSS & SQL Injection.
Detect common patterns in request payloads and block requests to prevent two of the most common web application attacks.
Feature showcase of rescaled WAF

Get In Touch

Request pricing or schedule a technical demo for your engineering team.
We're happy to get in contact with you!