New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Application firewall security News
April 24, 2018
As network perimeter security grows less practical, Akamai talks at RSA Conference about moving beyond firewalls to improve authentication with a zero-trust model.
June 02, 2016
IBM reports 30 'bug poaching' cyber extortion attacks in the past year, as black hat hackers aim to "help" enterprises by exploiting SQL injection vulnerabilities.
April 10, 2015
Protecting a Web application increasingly means tuning your protections to the individual characteristics of your applications. There’s more than one way to go about this, though. In this three-part guide we review best practices for taking your Web...
February 23, 2015
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.
Application firewall security Get Started
Bring yourself up to speed with our introductory content
A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are especially useful to companies that provide products or services over the Internet. Continue Reading
Next-generation firewalls are integrated, hardware- or software-based, network security tools designed to detect and block sophisticated attacks. The NGFWs available on the market today can vary significantly from one another in many ways, including... Continue Reading
Log management is the collective processes and policies used to administer and facilitate the generation, transmission, analysis, storage, archiving and ultimate disposal of the large volumes of log data created within an information system. Continue Reading
Evaluate Application firewall security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It might be effective, but Windows Firewall is not the be-all and end-all of security. In some cases, third-party firewalls add the extra layer of protection IT needs. Continue Reading
The new Amazon WAF offers firewall features for the cloud. Expert Dan Sullivan explains how Amazon WAF can be integrated in the enterprise cloud. Continue Reading
As enterprise networks go perimeterless, new network perimeter security strategies gain importance. Expert Johna Till Johnson shares five top tips for perimeterless protection. Continue Reading
Manage Application firewall security
Learn to apply best practices and optimize your operations.
Expert Brad Causey takes a close look at Web application firewalls, explains how WAF technology can prevent Internet-based attacks from known and unknown applications threats, and offers advice on WAF management and deployment. Continue Reading
Before buying a next-generation firewall, read this essential guide that will walk your business through the process, from evaluation to purchase. Continue Reading
View expert advice on seven final factors to take into account before making a next-gen firewall purchase, from vendor support options and ongoing costs to integration capabilities and community support. Continue Reading
Problem Solve Application firewall security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Vulnerabilities in Java and Python have opened them up to possible FTP injections. Expert Nick Lewis explains how enterprises can mitigate these attacks. Continue Reading
Web application security vulnerabilities can exist from browser to SSL/TLS. Expert Brad Causey explains how application security testing and Web application firewalls can address this. Continue Reading
Web application firewalls are complex products. Expert Brad Causey explains the key criteria enterprises need to consider before investing in a WAF product. Continue Reading