Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/14/2011
02:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Art Of Defence Launches New Open WAF Project

openWAF project working toward theindustry's first open- source dWAF

SAN FRANCISCO, CA--(Marketwire - February 14, 2011) - Today, art of defence, the leading distributed web application firewall (dWAF) provider, launched the openWAF project -- an open source community of web application security professionals working together on the industry's first open source dWAF. art of defence is going to contribute source code of its enterprise dWAF to this project in order to give the community a good starting point. The source code will be released soon after some necessary rework on code licensed from a third party.

"By launching the openWAF project, we want to give the open source community a truly distributed WAF alternative to choose from in protecting web and cloud applications. Today, application security is the most important part in a good defense strategy for protecting online systems. With its distributed architecture, openWAF will be the first cloud-ready open source WAF solution," said Alexander Meisel, CTO and founder, art of defence.

Key openWAF Facts

* openWAF allows real multi-tenancy across any number of users and web applications per user, all with a single administration point.

* openWAF provides true cluster awareness and central administration from one, easy to understand GUI.

* openWAF's protection levels are easily tightened iteratively without risk of unwanted exposure or blocking to the application being shielded.

* openWAF's 'detection only mode' allows rule-sets to be tested but not enforced, alongside with rule-sets in 'protection mode' that enforce already proven security policies.

* Binaries are available now for Linux (Red Hat, Ubuntu), FreeBSD, Solaris, and Microsoft Windows

Resources

* For more information about openWAF, visit the project website here, www.openwaf.org

* For more about art of defence, visit the website here, www.artofdefence.com

* art of defence will exhibit at the RSA Conference (booth #342), in San Francisco, Feb 15-17

* Follow the openWAF project on Twitter at twitter.com/openwaf

* Follow art of defence on Twitter at twitter.com/hyperguard

Tags

art of defence, open source, openWAF, hyperguard, dWAF, WAF, web application, security, cloud

About art of defence Founded in 2005, art of defence established its San Francisco-based North American headquarters in 2009. Focused exclusively on providing comprehensive web application security technology on any scale, art of defence's distributed web application firewall (dWAF) technology, hyperguard™, is the industry's first WAF SaaS offering available through the Amazon Web Services Partner Program. Available in many forms, hyperguard is the most flexible solution on the market today. Customers have access to the solution as a software plug-in, virtual appliance, hardware appliance or as a standalone software solution.

The company serves the financial services, eCommerce, technology, telecommunication and public sector markets. art of defence partners with leading technology providers like Amazon Web Services, GoGrid, White Hat and Microsoft. Regensburg, Germany, remains the global headquarters for the European and Asian markets in addition to North America.

For more information about art of defence, visit: www.artofdefence.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Google Lets iPhone Users Turn Device into Security Key
Kelly Sheridan, Staff Editor, Dark Reading,  1/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3595
PUBLISHED: 2020-01-22
Multiple Cross-site Scripting (XSS) vulnerabilities exist in Joomla! through 1.7.0 in index.php in the search word, extension, asset, and author parameters.
CVE-2011-3610
PUBLISHED: 2020-01-22
A Cross-site Scripting (XSS) vulnerability exists in the Serendipity freetag plugin before 3.30 in the tagcloud parameter to plugins/serendipity_event_freetag/tagcloud.swf.
CVE-2019-18583
PUBLISHED: 2020-01-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019. Notes: none.
CVE-2019-18584
PUBLISHED: 2020-01-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019. Notes: none.
CVE-2019-18585
PUBLISHED: 2020-01-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019. Notes: none.