Security

There’s a whole wide world of web application firewall options – so how do you choose the right one?

Take the heat out of your firewall deployment


Webcast If you’ve got an application which faces the web, no one would dispute that you should probably have a web application firewall sitting in front of it.

Web apps, after all, are the leading cause of security breaches, and the web application firewall (WAF) is first line of defence, preventing bad actors getting in in the first place, and then leaving with whatever goodies they’ve found.

But while it’s easy to identify the problem, it’s a little trickier to identify the precise deployment approach you should follow to fix it. You can opt for a low-cost commodity product, traditional on-prem hardware, or the full gamut of cloud options, from self-managed to fully managed as a service. All have their pros and cons. The trick is working out which works for your organization, and your app.

It’s a complicated equation to work your way through, but as always, we’re here to help, with our upcoming webcast, Choosing the Right WAF Deployment Model, on April 13 at a very civilized 1100 BST (1200 CEST.)

Your host will be our own Tim Phillips, who has worked through a fair few tricky equations himself over the years. He’ll be joined by Keiron Shepherd of F5 Networks, who has over 20 years of experience tackling hard core cyber security issues.

Together they’ll walk you through the key WAF deployment models, and pick over their pros and cons.

They’ll also take you deeper into key areas such as advanced protection, behavioural analytics, proactive bot protection and API security.

And they’ll help you work out where your WAF choices can – and should fit – with your app development lifecycle.

So, if you’ve even the slightest worry that your current web app protection is a little more whiff that WAF, just drop your details in the registration box, and we’ll make sure to remind you on the day.

Brought to you by F5 Networks

Send us news

Microsoft rolls out safety tools for Azure AI. Hint: More models

Defenses against prompt injection, hallucination arrive as Feds eye ML risks

Hillary Clinton: 2024 will be 'ground zero' for AI election manipulation

2016 meddling was 'primitive' compared to what's ahead

Cloud server host Vultr rips user data ownership clause from ToS after web outrage

We know the average customer doesn't have a law degree, CEO tells us

HPE bakes LLMs into Aruba as AI inches closer to network takeover

But don't worry, the models are here to help summarize technical docs and answer your questions ... for now

Pressuring allies not to fulfill chip kit service contracts with China now official US policy

Xi Jinping warns 'no force' can stop country's science and tech progress

JetBrains keeps mum on 26 'security problems' fixed after Rapid7 spat

Vendor takes hardline approach to patch disclosure to new levels

University of Washington's Workday woes leave research grants in limbo

$340M finance upgrade still working out the kinks

FTX crypto-crook Sam Bankman-Fried gets 25 years in prison

Could have been worse: Prosecutors wanted decades more

Nvidia's newborn ChatRTX bot patched for security bugs

Flaws enable privilege escalation and remote code execution

Intel's green dream is chips without any dips in Mother Nature's health

Sustainability Summit pushes industry partners to reduce their environmental impact, including harmful chemicals

US critical infrastructure cyberattack reporting rules inch closer to reality

After all, it's only about keeping the essentials on – no rush

How a single buck bought bragging rights in the battle to port Windows 95 to NT

It reached the desktop and then ...