WafCharm is a service for the auto-optimization of AWS WAF operations. It learns the attack pattern against the websites around the world through AI and can automate all the necessary operations so that users can focus on their core business rather than managing security rules.
WafCharm analyzes the access log in S3 and selects the most optimal rule that is perfect for the target Web service.
Since there is a limit on the number of rules that can be applied in AWS WAF, there is a possibility of leakage. With WafCharm, the leaks can be re-matched with hundreds of signatures, and those that are identified as attacks by re-matching can be automatically applied to the Blacklist.
Create and set rules that are optimal for your environment.
Automation of WAF from introduction to handling new vulnerabilities.
Reliable support system in case of false-positives.
※1 Excludes Entry Plan
Cyber-attack detecting AI engine using Deep Learning
Cyneural, a cyber-attack detecting AI engine using Deep Learning, uses a feature extraction engine that makes use of thknowledge gained through our research on web access and various attack techniques to construct multiple learning models, which makes it possible to detect general attacks, as well as quickly discover unknown threats (zero-day attacks) and false-positives.
Technology for automatic optimization of rules using AI
WRAO is a patented technology for automatic rule optimization for websites to reduce the cost of WAF operation. Through userʼs web access data, WRAO learns the normal access trend of a website and predicts the attack possibilities on the website. As a result, it is possible to automatically select ﬂexible rules that match the modeled web application and attack model.
Worldʼs leading cyber threat intelligence & threat information monitoring team of security researchers
The demand for collecting and evaluating cyber threat information and quickly reﬂecting it in signatures is increasing day by day. We collect the latest information from the world's leading cyber threat intelligence information, affiliated Israeli companies, information on the Internet, etc. efficiently, and our in-house team of security researchers consistently perform accurate evaluation and creates signatures.