Overview
Tgix delivers a comprehensive suite of Cloud Security Posture Management (CSPM) solutions, enabling our clients to concentrate on their core business while we manage their security needs. Our Managed WAF Service is a vital component of this suite, providing robust protection for your data and applications across all environments. It defends your applications against a wide array of threats, ensuring data integrity, security, and a seamless user experience. With AWS WAF, your applications are fortified against the OWASP Top Ten vulnerabilities, including SQL injections and cross-site scripting (XSS), ensuring compliance with security best practices.
**Tgix’s Managed WAF Service includes: **
Network Security Architecture Comprehensive network security architecture and operational considerations for implementing a scalable WAF strategy.
Configuration of Core Managed Rules Includes Linux, Unix, and Common rules, along with flood protection, GEO-based and IP-based blacklists/whitelists, IP reputation lists, known bad input rules, Cross-Site Scripting (XSS), and SQL injection (SQLi) defenses.
Configuration of Custom Rules Configuration of custom rules to meet the unique needs of your applications, allowing for fine-tuned control over traffic patterns, access control, and threat mitigation, e.g. specialized regex pattern matching rules.
Automatic Deployments and Seamless Integration with AWS Services Automated deployments using CloudFormation and integration with AWS services such as Amazon CloudFront, Elastic Load Balancing, CloudWatch, Lambda, SNS, and more.
Traffic and Anomalous Behavior Monitoring Continuous monitoring of traffic data to provide actionable insights with detailed logging and metrics, enabling better analysis of attack patterns and optimization of WAF configurations.
Tgix’s Managed WAF Service empowers clients to safeguard their applications against ever-evolving threats while ensuring regulatory compliance and business continuity.
Highlights
- Protects against OWASP Top Ten vulnerabilities.
- Customizable configuration with automatic deployments.
- Defends applications from both volumetric and application-layer DDoS attacks.
Details
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
To learn more about Tgix's Marketplace offerings, please contact us at marketplace@tgix.com .