Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

PT Application Firewall

Positive Technologies Application Firewall (PT AF) is a modern response to the constantly evolving web threat landscape. It combines real-time analytics, innovative technologies, and proven approaches to deliver proactive and continuous protection of all your internet-accessible applications against both known and unknown attacks. This includes the OWASP Top 10, automated and client-side attacks, and zero-days.

Proactive DDoS Defence

Profiling with behavioural analysis improves application security - and even allows predicting how an attack will unfold.

Automatic blocking of zero-day attacks

Multiple techniques, based on machine learning algorithms, combine to flag anomalies and automatically stop never-seen before threats. 

Targeted Protection

Built-in security scanners, plus AT application inspector integration, detect vulnerabilities in application source code and block attack attempts.

Stopping attacks on users

Application users stay safe thanks to the client-side WAF.js module, data masking, and granular access settings.

Pinpoint protection from bot attacks

Modelling of user behaviour makes it easy to identify bots and thwart automated attacked without slowing legitimate traffic. 

Full Security for web and mobile APIs

Threats to web and mobile APIs are stopped by analysis of JSON and XML Data, as well as Approov integration.

Favoured:
0

Listing Details

Vendor
Positive Technologies
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2021-03-19
Owner
ksj
Created
2018-03-15
Tags
web application firewall
  • 1037.png
RecommendReport
  • Web Application FW +
    • - WAF - Appliances
    • - WAF - Cloud
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message