Airlock Web Application Firewall
Within the secure access hub, Airlock WAF acts as a central reverse proxy for all HTTPS connections and protects against web attacks.
Airlock WAF works in conjunction with Airlock IAM to ensure secure session management while serving as a policy enforcement point for authentication and authorisation decisions.
A web portal is a very exposed thing and must be specially secured in every case. It was therefore clear to us that we wanted to protect the web applications from unauthorized access in the best possible way with upstream security functions in a web application firewall (WAF).
Martin Burri, IT Security Officer Visana
- Filtering (Attack blocking)
- Fraud detection
- Threat Intelligence
- Rapid deployment – DevSecOps
- Reporting & monitoring
- SIEM integration
- Virtual patching
- Load balancing
- Learning Mode for easier administration
- MS applications
With the advent of microservice architectures and DevOps practices, central security gateways concentrating many tasks for all services on a single system have increasingly been challenged. The various stakeholders may have differing requirements, timelines and policies for the single system they share.
Airlock Microgateway it is now available as a container also in a freemium edition.
Airlock Microgateway 2.1 will be available end of May.
Airlock can be quickly and easily deployed in the Google Cloud. Existing Airlock licenses can be used for operation in the Google Cloud. The operation follows the BYOL model (Bring your own Licence).
Airlock Gateway 7.8 & Microgateway 3.1
Before attacking, some hackers scans their target with a vulnerability scanner. Although an automated tool often does no damage at first, it should be deterred preventively. Just like in sports, "forechecking" hinders the opponent early on, even before he can start the actual attack.
The Airlock Anomaly Shield uses machine learning to detect such automated attacks and malicious bots based on their unusual behavior. It has been proven in production as part of our innovation program. With Airlock Gateway 7.8, the sensors of the Anomaly Shield have been improved: in practice, for example, a vulnerability scan is stopped within a few requests. The configuration has also been further simplified: you don't need a doctorate in Data Science for implementation and maintenance, but only a few minutes.
Filtering of application-based attacks
Airlock WAF analyses traffic moving between users and services. Attempted attacks on applications are blocked before they can reach the in-house systems.
Airlock WAF provides comprehensive protection against the OWASP Top 10 vulnerabilities and enables centralised management of security policies. Thanks to these innovative security functions, you can always stay ahead of attackers.
Policy enforcement point
Working in conjunction with Airlock IAM, Airlock WAF serves as a policy enforcement point for security guidelines, allowing only filtered, authenticated and authorised access.
This combination of access management and content filtering guarantees security, with no compromises.
Thanks to built-in dynamic reporting, decision makers have an overview of attempted attacks at all times. Operational problems such as performance bottlenecks or back-end problems are also displayed. Interactive drill-down from the dashboards, along with the display of the log lines causing the issue, facilitate the in-depth analysis of every attempted attack.
Airlock Threat Intelligence
Airlock WAF seamlessly integrates Webroot's Threat Intelligence Service. Based on the categories and trust levels provided, this automatically blocks dangerous clients and further increases application protection against misuse. Webroot BrightCloud® Threat Intelligence Services is a proactive, automated security solution that provides effective, real-time policy enforcement against the latest threats.
Reverse proxy functionality and high availability
Airlock WAF is a reverse proxy that makes it possible to virtualise in-house services and applications for external access. The integrated load balancer also ensures the high availability of applications and services. Even complex issues such as the configuration of TLS security and certificate management can be dealt with upstream on the central proxy.
Thanks to integrated Let’s Encrypt support, certificate renewals can even be completely automated.
Airlock WAF provides a host of interfaces with peripheral systems such as SIEM systems, virus scanners, fraud-prevention systems and HSMs. Thanks to its integrated threat intelligence feed, Airlock WAF reacts immediately to real-time threat situations on the Internet, protecting systems from new and potentially harmful hazards. Additional components can be integrated via the high-availability capable ICAP interface.
In a DevSecOps culture, every agile team has a security expert. He fulfills non-functional requirements, so the product owner includes security in the development plan.
Read this whitepaper to learn key insights on how to successfully and efficiently implement DevSecOps, what security components are needed to make it happen, and the benefits of a microgateway architecture.
Airlock cloud image
Microgateway as a container
Zero Trust is a journey
The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles. Lern more about the effects of ongoing digitization and how it affects modern information technology
The two-factor authentication (2FA, MFA or SCA for short) in the area of IT security offers double the security. In combination with efficient customer identity & access management (cIAM), numerous processes are significantly simplified. Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.
From spoilsport to the pioneer of digitisation
Digitisation is presenting businesses with new challenges which go far beyond information technology. This primarily relates to an aspect which is becoming increasingly important: IT security. Learn how IT security is accelerating digitization.
In order to stay technically viable in this digital transformation, companies must increasingly switch to hybrid cloud environments. This requires new security approaches as well as a mature customer identity and access management system. Learn more about this topic in our whitepaper in cooperation with our partners Deloitte, eperi und SHE.