Breach Debuts New WAF ApplianceBreach Debuts New WAF Appliance
Breach added to its ModSecurity Pro Web application firewall appliances product line with the launch of the ModSecurity Pro M1100
August 1, 2007
CARLSBAD, Calif. -- Breach Security, Inc., the leader in web application security, today announced a new addition to its popular ModSecurity Pro web application firewall appliances product line with the launch of the ModSecurity Pro M1100. This new appliance offers immediate protection for production applications against targeted attacks with plug-and-play installation and enhanced rule sets. The M1100 includes the mature, proven open source ModSecurity software, which is the most deployed web application firewall available today with more than 10,000 deployments worldwide.
Undetected by network security solutions, a successful hacker can manipulate a web application to steal the information behind it with minimal effort. Safeguards to reduce these attacks, such as secure coding initiatives, vulnerability scanning and penetration testing, are necessary, but have significant limitations. They are costly and do not provide a true security assessment of the web application in a live, real-time production environment.
Providing out-of-the-box security for web applications, the ModSecurity Pro M1100 features pre-packaged rule sets that prevent information leakage and assist organizations with compliance efforts such as the Payment Card Industry (PCI) Security Standards Council Data Security Standard. The standard sets a deadline of June 2008 for any organization gathering or storing credit card numbers to implement regular code scans or deploy a web application firewall.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Supply Chain Cyber Risk Management Whitepaper