Newsletter
IT and data security solutions added value distribution

About Array

Array Networks improves application availability, performance and security – optimizing traffic from any cloud or data center to any user, anywhere while minimizing cost and complexity.

Proven at over 5000 worldwide customer deployments, Array is recognized by leading cloud service providers and enterprises for next-generation technology and unmatched price-performance.

Array AWF

 

Array AWF Series next-generation Web application firewalls extend beyond traditional firewalls and intrusion detection systems (IDSs) to provide comprehensive protection for business-critical Web applications.array_industry_scheme

The AWF Series not only detects the complex Web application attacks of today, but also blocks the attack traffic in real time without

In addition, The AWF Series provides extremely fine-grained attack detection and analysis capabilities while protection against the most common Web application threats including SQL injection attacks, Web page tampering, Web site malicious code, and disclosure of sensitive information.

Buzzwords: SQL Injection, Cross-Site attack (XSS), Cookie Injection, Malicious code, packet filtering, blacklist/whitelist, URL-based access control, layer 1-7 protection, Web application firewall (WAF), server security.

About Rohde&Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity protects companies and public institutions worldwide against espionage and cyberattacks. The company develops and produces high-end encryption products, next-generation firewalls, network traffic analytics and endpoint security software as leading-edge technical solutions for information and network security requirements.

The awarded “made in Germany” IT security solutions range from compact all-in-one products to bespoke solutions for critical infrastructures.

DenyAll Web Application Firewall 

DenyAll Web Application Firewall (WAF) protects your web sites & applications from defacement, denial of service, data leakage, identity theft and intrusion attempts:

  • Ease of configuration: configuring policy is as simple as dropping boxes and dragging arrows. Changes are made in a few clicks. Policy can be easily understood by managers, even if they are not application security experts.
  • Powerful security: combine negative and positive security models to effectively prevent known attacks such as OWASP TOP 10 (injections, scripts, etc) and unknown attacks such as zero-day.

Buzzwords: WAF, cross site scripting (XSS), sql injection, OWASP, web application protection, virtual patching, PCI DSS WAF, SSL off-loading

About Sophos

IT security products have become as complex as the networks they’re trying to secure. Sophos knows that the solution to complexity is not more complexity.  Sophos began producing antivirus and encryption products nearly 30 years ago. Today their products help secure the networks used by 100 million people in 150 countries and 100,000 businesses, including Pixar, Under Armour, Northrop Grumman, Xerox, Ford, Avis, and Toshiba. Sophos products allow you to secure every endpoint of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices.

Sophos provides two options for your web security needs:

Sophos Web appliance

sophos applianceSophos Web appliance– get the ultimate in web security, control, and insights. It’s web protection that’s effective, affordable, and easy with lightning performance that won’t slow users down.

More about solution and implementation:  Sophos web appliance

Secure Web Gateway

sophos endpoint

Secure Web Gateway – Advanced Web Security for a Mobile Workforce provided from reliable, globally-deployed cloud infrastructure. Comprehensive protection from the latest web threats, on every device, wherever your users go.

More about solution and implementation: Sophos secure web gateway

 

 

Buzzwords: web protection, safe surfing, application control, URL filtering, HTTPs scanning, malicious site filtering, call-home detection, offsite protection, Anonymizing proxy blocking, network sandbox, AV with HIPS