Your cookie settings

We use cookies. By clicking "Submit Preferences" you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Some cookies are necessary for the usual function of our website. These are destroyed when you close your browser and do not store any of your details. Please note that choosing this option will result in you seeing this message each time you visit a new page as we are not storing any preferences for you.

In order for us to remember the preferences you select today and ensure that you don’t see this message again, we need to store a cookie to remember you. This is the only tracking cookie we will store if you select this option.

By selecting ‘all cookies’, you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Submit Preferences
Background

Web Applications Firewalls

Web applications are by far the most common target for cyber criminals; by their very nature these services are revealed to the public internet and are therefore constantly exposed to potential attacks from anywhere at any time.

Web Application Firewalls (WAF) add an additional security layer to your existing Perimeter Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS). Positioned in front of Web-facing services, the WAF inspects all incoming traffic and can report and/or block suspicious and malicious activity directed towards your web facing applications

WAF’s can also be a useful means of securing applications while avoiding the need for redesign or coding changes.

Is it right for me?

Protecting applications and the data they hold is more important than ever. Web Application Firewalls are deployed as part of an organisation's defence in depth strategy, protecting against the exploitation of vulnerable weak coding, legacy applications, injection attacks and Cross-site Scripting.

With TLS encryption being mandatory in today’s modern world, traditional firewalls with Intrusion Prevention cannot inspect web application traffic. Web Application Firewalls (WAF) sit in line and dynamically decrypt, inspect and prevent attacks.

Web Application Firewalls protect businesses from some of the most common types of attacks against web-facing services

Why choose The Bunker?

The Bunker offers a number of different solutions for Web Application Firewall (WAF) deployments, including Opensource and appliance based solutions. We deploy on Dedicated or Shared multi-tenant infrastructure and deliver on Virtual or Physical appliances, ,available in High Availability configurations for maximum protecting and availability.

WAFs give you the peace of mind that your applications are protected against application layer attacks. You can rest safe in with the knowledge that all traffic is inspected and logged for instant alerting, and available for forensic examination as part of a Security Incident and Event Management solution.

How WAF works

Deployed at the application layer (Layer 7), the WAF examines every HTTP(S) request that comes through and applies a set of bespoke rules to filter out specific traffic types and patterns.

These devices can also be used as encryption termination devices, reverse proxy servers, authentication platforms and load-balancers.

Our Accreditations

  • ISO 27001
  • CITRIX Partner
  • First
  • G-Cloud Accredited
  • ITIL Service Management
  • Microsoft Gold Partner
  • NHS IGSoC Approved
  • PCI DSS
  • PRINCE2
  • RIPE NCC Member
  • Tech UK
  • Veeam Gold Cloud & Service Provider Partner