Web Application Firewall

  • What is Web Application Firewall?

    Web applications are an important part of your business and a vital part of how customers communicate with you. Unfortunately web applications can give hackers access to your data and website(s). Web application attacks are a major risk for your business. The average website has 56 vulnerabilities and a 50% chance of being attcked over 30 times this year.

    The best way to protect a web application is the use of a Web Application Firewall (WAF). WAFs analyse web traffic in contact with how the application works. If a WAF detects something suspicious, it responds immediately. So why does not everyone have a WAF? Because monitoring, managing and setting up a WAF to distinguish between “good” and “bad” traffic, is very difficult.

    Internedservices offers Web Application Firewall as a managed services, so there is no need for you to do anything. All your data is monitored by experts 24/7/365.

  • Go directly to:

  • How does a Web Application Firewall work?

    The website security model consists of several elements which together provide a complete and robust defense mechanism against online threats:

    • Identification of visitors. The so-called ‘client classification engine’ identifies bots such as Google’s search robots or Pingdom, operated by well-known and frequently used services. These get access to your site.
    • Request for inspection. In addition to profiling and identifying each user, behavioral analysis and other theories are used to detect malicious visitors.
    • Crowd sourcing. New bots and threats are constantly discovered. Once identified, these requests are blocked for all customers. This means that the service constantly learns and that any site, regardless of its size, makes the system smarter.
    • Application Aware. For this service a growing database is composed of all common website Stacks, Content Management Systems and eCommerce solutions, and safety rules are applied in order to proactively respond to known vulnerabilities.

    In addition, the service has another advantage: the IP address of your server is not visible. This is called IP Address Shielding. This prevents unauthorised access via SSH, FTP, Telnet or other methods.

  • “If something goes wrong just once, you may well lose your reputation. Security can be seen as an insurance, and as such it costs money, but it is extremely important.”

    Author's imagePeter van NoordCo-founder & Director of De Nieuwe Zaak
    Read the entire case of De Nieuwe Zaak (Dutch only)
  • Why KPN Internedservices?

    With Internedservices your data is always subject to Dutch law, because we are a 100% Dutch company. Web Application Firewall can be obtained for a fixed monthly fee and protects your organisation from these and other threats.

    Obviously Web Application Firewall can be combined with other IT Security solutions offered by Internedservices, for optimum protection.

    Tell me more about Web Application Firewall

What does a Web Application Firewall protect against?

    • SQL Injection. SQL injection is a code injection technique that exploits a vulnerability in the database layer of an application. Attackers can use these vulnerabilities to execute SQL commands on your backend database and steal or damage it or use it to remove data from your databases.
    • Cross Site Scripting (XSS). Cross-site scripting is a web application attack that makes use of the vulnerabilities in the visitor’s browser. This can lead to data theft and possibly to installation of malicious software on the visitor’s computers.
    • Illegal Resource Access. This is a web application attack to gain access to closed areas and sensitive pages on your web server.
    • Remote File Inclusion. This allows an attacker to add an external file, usually through a script on the web server.
    • Comment Spam. Comment Spam is the automated placing of comments or commercial promotions on blogs, wikis, guestbooks, or other publicly accessible online discussion forums.
    • OWASP Top 10 vulnerabilities. The Open Web Application Security Project (OWASP) Top 10 represents the most critical Web Application Security risks, identified by a variety of Web Application Security experts from around the world. The OWASP Top 10 has become a de facto standard checklist for website / application security.
  • The OWASP Top 10 vulnerabilities

    The Open Web Application Security Project (OWASP) Top 10 consists of the most critical online security threats:

    1. (SQL) Injection
    2. Broken Authentication and Session Management
    3. Cross-Site Scripting (XSS)
    4. Insecure Direct Object References
    5. Security Misconfiguration
    6. Sensitive Data Exposure
    7. Missing Function Level Access Control
    8. Cross-Site Request Forgery (CSRF)
    9. Using Components with Known Vulnerabilities
    10. Unvalidated Redirects and Forwards

    Web Application Firewall by Internedservices protects against all online threats mentioned above.

  • No worries with a Web Application Firewall

    We believe you should be able to focus on what you do best: business. This cloud-based WAF unburdens you, after all no management and no upfront investment. Listed:

    • Just a few minutes set up without downtime
    • No installation of hardware or software changes
    • No investment in hardware or management costs
    • Full auditing and reporting functionality
  • With the Web Application Firewall of Internedservices you no longer need to worry about online attacks and you are always well protected.

  • Curious as to the possibilities for your organisation?

    Contact one of our specialists now.

    Did you get excited about this case and are you curious how we can realise this for your organisation? Call us at +31(0)88-4803000 or complete the form below and we will contact you.