Application Security

Web Application Firewall

Web application firewall to protect, balance, and accelerate web

Applications. When combined with our Web Application Security Service you’re protected from the latest application vulnerabilities, bots, and suspicious URLs, and with dual machine learning detection engines your applications are safe from sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, cookie poisoning, malicious sources, and DoS attacks.

Features & Benefits

  • Proven Web Application protection
  • Al-based threat detection
  • Advanced visual analytics
  • False positive mitigation tools
  • Hardware-based acceleration

Application Delivery Controller

Application Delivery Controller (ADC) appliances optimise the availability, user experience, and scalability of enterprise application delivery. They enable fast, secure, and intelligent acceleration and distribution of even the most demanding enterprise applications.

Features & Benefits

  • Layer 7 Load Balancing
  • Secure Traffic Management
  • Application Optimisation
  • Global Server Load Balancing

DDoS

Protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

Features & Benefits

  • 100% security processor (SPU)-based layer 3, 4 and 7 DDoS protection application-aware traffic management
  • Behaviour-based DDoS protection to eliminate need for signature files
  • Minimal false-positive detections through continuous threat evaluation
  • Ability to monitor hundreds of thousands of parameters simultaneously
  • Defence against every DDoS attack: bulk volumetric, Layer 7 application and SSL/HTTPS
  • Attack protection for DNS services via specialised tools

Access Management

Identity and Access Management products provide the services necessary to securely confirm the identity of users and devices as they enter the network. Single sign on services, certificate management, and guest management. Confirm the identity of users by adding a second factor to the authentication process through physical and mobile application-based tokens.

Features & Benefits

  • Intuitive, centralised authentication and authorisation services
  • Two factor token authentication and management
  • Single sign-on (SSO) for both Web/Cloud and network resources
  • Guest, BYOD and certificate management
  • Simple deployment and licensing
  • Integration with secure directories