Qrator.WAF
Comprehensive protection against hacking attempts for the most high-load web applications with minimum delays and guaranteed service availability
99.95%
Service Level Agreement for availability of customers' applications
Tools
Effective tools for false-positives protection
4tbps
Bandwidth over 4 Tbps
Comprehensive Protection Against Hacking Attempts for the most High-Load Web Application
Despite their importance, often it’s web applications which are the ‘weak link’ within organizations’ security perimeters. Typically, companies’ in-house web applications have complex architectures and many borrowed components, and in-house developers do not have enough time to organize the proper security for these resources. The application security is sometimes a sacrifice in the run for future releases of new features or functionality. Web applications are subject to various threats, such as theft of confidential data, fraud, or spoofing, and serve as a convenient entry point for further attacks.
Next-Generation Flexible Web Application Security Protection
Your Critical Web Resources are under Control
Effectively secure critical web resources against external attacks and gain complete control over application usage in the allowed scenarios with the cloud Qrator Web Application Firewall.
Strengthen Your Protection
Qrator.WAF is an advanced next-generation tool that helps to prevent a wide range of threats to web applications during their operation.
Full Coverage
A high level of protection against both simple and complex targeted attacks is achieved by using the most detailed models of the protected application along with signature-based and behavioral anomaly detection methods.
Always Stay Online
The distributed infrastructure of WAF filtering nodes within the perimeter of the Qrator Labs network allows you to protect even the most heavily loaded applications with minimal delay and guaranteed service availability.
Qrator.WAF Advanced Features
Comprehensive Web Threats Protection
Major classes of web threats, including OWASP Top 10
Brute force attacks
Attacks on identification and authorization mechanisms
API security
Corporate service security
Adaptive Security Mechanisms
Basic security mechanism
Enhanced security capabilities
HTTP protocol validation (request types, headers, and their parameters, etc.)
Automatic filtering of static resources: a separate mode for processing static resources (provides ease of data analysis in the control and monitoring subsystem)
Analysis of requests and responses using signature analysis (including those that detect OWASP Top 10 attacks)
The mechanism of "black" and "white" lists for basic types of sources (IP address, URLs)
Blocking sources when multiple anomalies are detected in the requests
Limiting the rate of requests from one source (Rate Limiting) for the application as a whole.
Automatic detection of the performed logical actions and checking its parameters for compliance with the predetermined patterns
Controlling sequences of logical actions
Success measurement of the performed actions based on the analysis of responses, including nested data
Defining sources that are arbitrary parameters of logical actions that characterize the request source (IP address, session ID, user name, certain cookie, etc.)
Controlling users and sessions, which define the key session parameters and the logical actions that are used as a framework to set, monitor, and disable these parameters)
Controlling user authorization at the level of sessions and performed logical actions
Controlling the rate of requests to individual logical actions depending on the parameters of the request source and other parameters (Rate Limiting)
Monitoring interface
No need to have special expertise to make changes to the architecture of the protected application and configure cloud WAF rules. We provide access to a ready-made solution based on the customer's wishes and provide round-the-clock monitoring of incidents in your personal account with the following features available
Summary
Events
Transactions
Summary
A dashboard with different metrics of the protected web applications traffic (response code, locks, delay, sessions, hostility).
Events
A flexible tool for analyzing detected security events, grouped by type and threat level, with an option to view all the details of each individual transaction. It is also possible to manually suppress a false positive when a false positive lock is detected in the transactions.
Transactions
A section where all transactions of the protected application are stored, offering the possibility to flexibly search for requests using various parameters.
How it works
Trusted by
1000+
Enterprises all over the globe
Backspace Technologies - Wholesale VOICE and APN solutions provider - improves real-time BGP anomalies detection to ensure better network performance and high availability of service with Qrator.Radar.
Qrator.Radar helps Dailymotion - Online video sharing platform - ensure high quality of video broadcasts with a primary focus on controlling and detecting network anomalies, which may cause a degradation of the video delivery service.
Cindicator - Crypto trading company - stops Denial of Service issues and mitigates infrastructural and reputational risks with Qrator Labs filtering network letting the platform run like clockwork 24/7.
Türk Telekom - Telecom operator - improves routing health of its network detecting global connectivity incidents with Qrator.Radar
Olymp Trade - Online trading company - reaches continuous availability of its resources and provides a secure trading environment for customers using Qrator.AntiDDoS solution
Qrator Labs helps Lazada - Ecommerce company - prevent targeted attempts to disable the system with sophisticated DDoS attacks ensuring uninterrupted business operations, and boosting website performance.