A web application firewall protects web servers and web applications from malware and threats by providing a layer of control between end users and applications. The web application firewall functions as a flexible barrier that filters all application access, inspecting both in-bound and out-bound traffic. It is specifically designed to mitigate attacks without blocking legitimate users and without slowing down application performance.

A web application firewall differs from a traditional network firewall in its ability to inspect data at a more granular level – for example, by validating form field input or protecting application cookies. A network firewall and a web application firewall are generally deployed together and provide complementary levels of security.

Cloud-based WAFs, thus, utilize all advantages of WAFs and share that threat detection information among all tenants of the service, which improves results and speeds up detection rates. The whole community learns from an attack to any website sharing a single cloud-based WAF service. Plus, cloud based WAF technology is:

  • – Elastic
  • – Scalable
  • – Fast
  • – Offered as pay-as-you-grow service

Threat Vectors

Applications can be vulnerable to many threats that are not detected by regular network firewalls. The impact of these attacks can be quite severe. The Open Web Application Security Project (OWASP) has compiled a list of the top 10 risks that still threaten many web application deployments. The top 10 of 2010 is virtually identical to the new 2013 version; the most common attacks have not changed dramatically over the years.

Here are some examples


SQL Injection Attacks use a Web form or other mechanism to send SQL commands or commands containing SQL special characters. By sending these SQL commands, the attacker can trigger the back-end SQL database to execute the injected commands and allow unauthorized users to obtain sensitive information from the database.

Cross-site Scripting (XSS)

XSS attacks exploit a Web server that does not validate data coming from another site. XSS can enable the attacker to obtain sensitive information, or to compromise a Web server.

Sensitive Data Exposure

If Web applications do not protect sensitive data such as credit card numbers, attackers are able to conduct identity theft, credit card fraud, or other crimes.

Cross-site Request Forgery (CSRF)

CSRF attacks force a user to send an HTTP request, including the victim’s session cookie, to a vulnerable web application. To the vulnerable web application, this appears to be a legitimate request coming from the victim.

Managed Web-Application Firewall

It takes a lot of careful planning, design, and configuration to optimize your WAF for your organization’s specific needs. WAF operates automatically, but it still requires the human factor to make sure that nothing is missed or overlooked. Therefore, the application must be monitored 24 hours a day, 365 days a year. If your security solution is left unattended, it increases your risk of threat exposure.

Implementing and monitoring these systems in-house takes a tremendous amount of money, personnel, and other resources. However, CloudOps is equipped to manage your WAF system for you, including:

    • – Design and implementation
    • – Calibrating the system to guard against false positives
    • – Day-to-day monitoring of logs, 24/7

In addition, we’ll stay in close contact with you, to keep you informed of what’s going on in your system, not only when there are problems, but also simply to touch base and make sure that you’re getting the most benefit from our services. Our managed WAF services keep your system secure, while saving you time and resources.