In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
CTOnews.com December 12 news, according to the China Academy of Communications Cloud WAF assessment results show that China Telecom Tianyi Cloud Web application firewall (original version) successfully passed the evaluation. Web application firewall is one of the important products to ensure the security of user application layer, and cloud WAF is an important part of it. Compared with the traditional protection based on host software, cloud WAF deployment is more flexible, operation and maintenance is simpler, and can greatly reduce the burden of enterprise security protection.
In order to standardize the capability requirements of cloud WAF and promote the landing use of cloud WAF in domestic enterprises, the Institute of Information Technology and Communications has formulated the standard work of "capability requirements for Cloud Web Application Firewall", which puts forward requirements for cloud WAF capabilities from many levels, including service access, access control, security protection, security capabilities, performance and scalability, and reliability. It provides a reference for domestic enterprises to effectively deal with the increasingly complex Web attacks in the cloud era and to test the capabilities of cloud WAF technology.
Site-level protection can no longer meet the flexible requirements of Web protection. Cloud WAF needs to have API behavior detection capabilities, enhance unknown risk monitoring capabilities, and strengthen identification and blocking of unexpected BOT traffic. In addition, cloud WAF is an important line of defense for enterprise network security, which requires high availability to ensure uninterrupted defense.
CTOnews.com learned that Tianyi Cloud Web Application Firewall (original version) can provide one-stop security protection for users' Web applications, including Web application attack protection, CC attack protection, BOT protection, etc., covering most of the current attack methods, it can effectively identify the characteristics of malicious requests and defend them, prevent the origin server from malicious intrusion, and protect the core business security and data security of the website.
According to officials, Tianyi Cloud Web Application Firewall (original version) adopts the native cloud model, which provides convenient access for cloud users by combining with Tianyi cloud pedestal capabilities; provides stable and high-quality services by relying on the IaaS and PaaS capabilities of cloud pedestal; makes operation and maintenance management more convenient with the help of cloud pedestal monitoring and management capabilities; and makes security detection more accurate based on the advantages of cloud platform data analysis. In addition, in the cloud native mode, cloud WAF can be combined with other atomic security capabilities to further enhance the security guard capability of cloud WAF.
Tianyi Cloud Web Application Firewall (original version) integrates multiple heterogeneous protection engines, combines semantic features with machine learning classification algorithms, significantly improves detection accuracy and recall, continuously optimizes the set of high-quality attack detection rules, takes into account performance and simple configuration, and well covers common attack types of OWASP. Support multi-dimensional custom rule configuration, flexibly configure attack identification and confrontation strategies based on session characteristics, accurately intercept, and reduce false positives; adopt carrier-level cloud resource pool architecture, with the help of cluster + redundant high availability mode, effectively eliminate single point of failure and improve service availability.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.