WAF Web Application Firewall

WAF Web Application Firewall

Generally speaking, a Web Application Firewall (WAF) is used to detect and protect web applications from attacks that try to exploit application vulnerabilities. To drill down on the explanation a bit, a WAF is responsible for inspecting the HTTP request and response based on predefined rules; processing preset actions against questionable HTTP requests/responses identified during the inspection phase or during the HTTP connection validity check; and logging the malicious HTTP requests/responses identified during the inspection.

UltraWAF relies on proprietary and third-party sources that provide a comprehensive view of the threat landscape.

UltraWAF is intuitive and you can set it up to protect against the most common application attacks in minutes. Or if you prefer, our dedicated provisioning team is available to assist you with UltraWAF configuration.

Every WAF is prone to false negatives and false positives. Unfortunately, no WAF by itself will be able to tune out false negatives or false positives, but our SOC Provisioning Team will work with you to refine UltraWAF deployment and minimize the false positives or false negatives.

Yes, UltraWAF provides always-on protection with flexible controls to mitigate brute force and credential-stuffing attacks conducted by botnets.

Yes. As the time to exploit a new vulnerability has declined from weeks to days to hours, being able to patch your applications against the newest vulnerabilities is critical to your security. Virtual patching with UltraWAF allows you to block traffic that looks to exploit vulnerabilities while giving you time to properly test patches in your environment. You can choose from thousands of pre-defined signatures that are frequently updated. If a signature is not yet available, UltraWAF allows you to define a customer signature based on SNORT or PCRE.

Yes, if you can’t find what you need in the pre-defined signature list, you can create your own custom signature.

Yes, all information available in the portal on the Web is abstracted through a publicly available version-controlled API. This includes configuration, reporting, and detailed violation logs.

Yes. We recognize that each customer environment is unique and not all applications may require all WAF security controls. UltraWAF can be customized for each unique environment.

Yes. One of the benefits of UltraWAF is that it’s agnostic to your back-end infrastructure, and works well even in cloud environments like AWS, Azure, etc.

UltraWAF is built upon our DDoS infrastructure which can handle up to 15+Tbps of traffic. This ensures our service can support a significant amount of traffic to meet your needs.

No. UltraWAF does not impede performance as it is in line and has an enormous scale since it’s a distributed cloud platform.

Yes. SIEM integration can be achieved via the UltraWAF API, which can take any and all log information in a structured format to allow the customer to easily integrate. Notification integration is also available via webhooks.

Yes. UltraWAF can be integrated with ticketing systems via the UltraWAF API, webhooks, or email notifications.

UltraWAF reports are available via the web portal or API and provide, at a glance, information about the most common attack vectors. Detailed violation logs and IP address enrichment provide important information about the source of the attacks. Reports can be exported into PDF, JSON, or CSV formats as appropriate.

UltraWAF includes 24x7x365 phone/web/email support with direct access to our SOC engineers who can assist you with any questions you have about your configuration or attacks you may see.

Yes. UltraWAF logs all violations and makes header and user agent information visible for deeper investigation.

Yes. UltraWAF uses static and dynamic methods to detect malicious bots to keep your applications safe.

Yes. UltraWAF protects against the most common application attacks including the OWASP top 10.

Yes. UltraWAF allows you to create many types of= customizations including policy relaxation rules, rate, and geo limits, custom signatures, as well as block and allow lists for IP addresses and known bots.

Learn more about how UltraWAF can support your security needs.

  • Solutions
  • Products
  • Industries
  • Why Vercara
  • Plans
  • Partners
  • Resources
  • Company