We have been using this solution for a number of use cases. For example, we use it for SQL inspection, cross-site scripting. We also have load sharing and we create our own custom rules for our situation, based on our business. For instance, products, articles, and other parameters that we manage in our applications are packaged in Radware. We also tested the Bot Manager for a month and it seemed quite useful, but due to a matter of project priorities, we could not implement it.
Network Engineer at a real estate/law firm with 1,001-5,000 employees
Real User
Top 5
2023-04-13T18:07:00Z
Apr 13, 2023
We utilize it as a front end for all external connections to our public-facing websites, allowing us to manage traffic and redirect it accordingly. This enables us to store data in the cloud and other remote locations, while also protecting our internal servers from potential security threats by preventing malicious traffic from reaching them. The solution is deployed on Azure and AWS cloud.
CISO at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2023-03-02T21:22:00Z
Mar 2, 2023
We have several web applications in various environments. Some are hosted on-prem or Azure and others are hosted at different locations or by business partners. Cloud WAF provides centralized control over the security of those web applications.
IT Unit Chief at ATM - AUTORITAT DEL TRANSPORT METROPOLITA
Real User
Top 10
2023-02-17T19:40:00Z
Feb 17, 2023
We use the solution to protect our main public application for transportation tickets. We have the product in the cloud set up before our infrastructure, so there is no need to integrate it as if it were an appliance etc.
Manager Cloud Security at a computer software company with 501-1,000 employees
Real User
Top 10
2022-09-12T08:59:58Z
Sep 12, 2022
We have a couple of AWS customers where we are implementing this solution. When we are talking about the WAF use case, we just like to save the request. Whatever request you are getting on the WAF side, you can block it according to the filter. If you have any vulnerability inside the request, that will be inspected. If it's not legitimate, then it will be stopped with the help of WAF.
Radware’s Cloud WAF provides enterprise-grade, continuously adaptive web application security protection. Based on Radware’s ICSA Labs certified, market-leading web application firewall, it provides full coverage of OWASP Top-10 threats and zero-day attacks, while implementing both negative and positive web application security models to automatically adapt protections to evolving threats and protected assets.
Radware’s Cloud WAF offers full web security protection including OWASP Top-10...
We use Radware to protect our applications and the portals that we share with our clients and business partners.
We have been using this solution for a number of use cases. For example, we use it for SQL inspection, cross-site scripting. We also have load sharing and we create our own custom rules for our situation, based on our business. For instance, products, articles, and other parameters that we manage in our applications are packaged in Radware. We also tested the Bot Manager for a month and it seemed quite useful, but due to a matter of project priorities, we could not implement it.
We utilize it as a front end for all external connections to our public-facing websites, allowing us to manage traffic and redirect it accordingly. This enables us to store data in the cloud and other remote locations, while also protecting our internal servers from potential security threats by preventing malicious traffic from reaching them. The solution is deployed on Azure and AWS cloud.
We have several web applications in various environments. Some are hosted on-prem or Azure and others are hosted at different locations or by business partners. Cloud WAF provides centralized control over the security of those web applications.
We use the solution to protect our main public application for transportation tickets. We have the product in the cloud set up before our infrastructure, so there is no need to integrate it as if it were an appliance etc.
We have a couple of AWS customers where we are implementing this solution. When we are talking about the WAF use case, we just like to save the request. Whatever request you are getting on the WAF side, you can block it according to the filter. If you have any vulnerability inside the request, that will be inspected. If it's not legitimate, then it will be stopped with the help of WAF.