![]() ![]() ![]() For zero-day threats for which no signatures exist, no protection is provided until someone creates a signature and is able to write a rule for protection. That said, both F5 and iMPERVA are signature based WAF technologies. In addition, here are some thoughts on the specific questions you are askingīoth F5 and Imperva are excellent WAF offerings with long track records and both will likely do a good job detecting known OWASP 10 threats. I have recently published a blog post on the issues one needs to consider when selecting a WAF. With application logic and date being at the core of the technology stack value, WAF is the most reasonable place to monitor application traffic and defend from hacker's attacks. ![]() Firstly, implementing WAF is an excellent decision. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |