Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/14/2011
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Art Of Defence Launches New Open WAF Project

openWAF project working toward theindustry's first open- source dWAF

SAN FRANCISCO, CA--(Marketwire - February 14, 2011) - Today, art of defence, the leading distributed web application firewall (dWAF) provider, launched the openWAF project -- an open source community of web application security professionals working together on the industry's first open source dWAF. art of defence is going to contribute source code of its enterprise dWAF to this project in order to give the community a good starting point. The source code will be released soon after some necessary rework on code licensed from a third party.

"By launching the openWAF project, we want to give the open source community a truly distributed WAF alternative to choose from in protecting web and cloud applications. Today, application security is the most important part in a good defense strategy for protecting online systems. With its distributed architecture, openWAF will be the first cloud-ready open source WAF solution," said Alexander Meisel, CTO and founder, art of defence.

Key openWAF Facts

* openWAF allows real multi-tenancy across any number of users and web applications per user, all with a single administration point.

* openWAF provides true cluster awareness and central administration from one, easy to understand GUI.

* openWAF's protection levels are easily tightened iteratively without risk of unwanted exposure or blocking to the application being shielded.

* openWAF's 'detection only mode' allows rule-sets to be tested but not enforced, alongside with rule-sets in 'protection mode' that enforce already proven security policies.

* Binaries are available now for Linux (Red Hat, Ubuntu), FreeBSD, Solaris, and Microsoft Windows

Resources

* For more information about openWAF, visit the project website here, www.openwaf.org

* For more about art of defence, visit the website here, www.artofdefence.com

* art of defence will exhibit at the RSA Conference (booth #342), in San Francisco, Feb 15-17

* Follow the openWAF project on Twitter at twitter.com/openwaf

* Follow art of defence on Twitter at twitter.com/hyperguard

Tags

art of defence, open source, openWAF, hyperguard, dWAF, WAF, web application, security, cloud

About art of defence Founded in 2005, art of defence established its San Francisco-based North American headquarters in 2009. Focused exclusively on providing comprehensive web application security technology on any scale, art of defence's distributed web application firewall (dWAF) technology, hyperguard™, is the industry's first WAF SaaS offering available through the Amazon Web Services Partner Program. Available in many forms, hyperguard is the most flexible solution on the market today. Customers have access to the solution as a software plug-in, virtual appliance, hardware appliance or as a standalone software solution.

The company serves the financial services, eCommerce, technology, telecommunication and public sector markets. art of defence partners with leading technology providers like Amazon Web Services, GoGrid, White Hat and Microsoft. Regensburg, Germany, remains the global headquarters for the European and Asian markets in addition to North America.

For more information about art of defence, visit: www.artofdefence.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...
CVE-2020-29379
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
CVE-2020-29380
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-...
CVE-2020-29381
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename...
CVE-2020-29382
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.