PRO+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
November 2014

What to look for in Web application firewall products

Sponsored by SearchSecurity.com

Attackers are increasingly seeking unauthorized access to sensitive corporate data so they can use this information to commit identity theft, financial fraud and other crimes. Because so much of this sensitive data is in back-end databases accessible through Web applications, attackers frequently target these applications to gain access to their associated data.

Web application firewalls (WAFs) were created to prevent these attacks from compromising Web servers and the databases behind them, thus preventing data breaches. Organizations with sensitive data available through Web applications should explore WAFs as an important line of defense against data breaches. Organizations evaluating WAFs should be on the lookout for emerging features, such as reputation services and integration with security assessment tools that will improve the accuracy of WAF detection capabilities.

Table Of Contents

  • How a WAF works
  • WAF features
  • The bottom line