WafCharm

WafCharm

WafCharm is a service for the auto-optimization of AWS WAF operations. It learns the attack pattern against the websites around the world through AI and can automate all the necessary operations so that users can focus on their core business rather than managing security rules.

WafCharm analyzes the access log in S3 and selects the most optimal rule that is perfect for the target Web service.

Since there is a limit on the number of rules that can be applied in AWS WAF, there is a possibility of leakage. With WafCharm, the leaks can be re-matched with hundreds of signatures, and those that are identified as attacks by re-matching can be automatically applied to the Blacklist.

Service for automation of AWS WAF operations by means of AI & Big Data

Service for automation of AWS WAF operations by means of AI & Big Data

Wafcharm Features

Stronger Defense

Create and set rules that are optimal for your environment.

  1. 01.Optimal protection for everyone

    • Automatic selection of optimum signature
    • Signature customization
    • New signature creation
  2. 02.More secure with hundreds of signatures

    • Since there is a possibility of leakage with limited no. of rules WafCharm re-matches the access data with hundreds of signatures
    • Attack sources identified by re-matching are blacklisted automatically
Stronger Defense

Automation by AI

Automation of WAF from introduction to handling new vulnerabilities.

  1. 01.Easy to install and operate

    • Not necessary to install any special equipment or switch DNS, etc.
    • Automatically selects the optimum rules, so customers can concentrate on their core business
    • Fixing a rule is also possible when you don’t want it to change automatically
  2. 02.Customer correspondence is unnecessary even while dealing with new vulnerabilities

    • Monitoring by security experts
    • Quickly create & apply new signatures
Automation by AI

Extensive Support System

Reliable support system in case of false-positives.

  1. 01.When in trouble, contact support

    • English & Japanese language support
    • 24/7 Technical support※1v
    • 99% continuation rate
  2. 02.Relief knowing areas not covered by AI is secured
    by our security experts

    • False-positive correspondence
    • Manual replacement of rules
    • Flexible customization※1

    ※1 Excludes Entry Plan

Extensive Support System

WafCharm System Architecture

WafCharm System Architecture

WafCharm Technology

Cyneural

Cyber-attack detecting AI engine using Deep Learning

Cyneural, a cyber-attack detecting AI engine using Deep Learning, uses a feature extraction engine that makes use of thknowledge gained through our research on web access and various attack techniques to construct multiple learning models, which makes it possible to detect general attacks, as well as quickly discover unknown threats (zero-day attacks) and false-positives.

Cyneural Cyber-attack detecting AI engine using Deep Learning

WRAO

Technology for automatic optimization of rules using AI

WRAO is a patented technology for automatic rule optimization for websites to reduce the cost of WAF operation. Through userʼs web access data, WRAO learns the normal access trend of a website and predicts the attack possibilities on the website. As a result, it is possible to automatically select flexible rules that match the modeled web application and attack model.

WRAO Technology for automatic optimization of rules using AI

Cyhorus

Worldʼs leading cyber threat intelligence & threat information monitoring team of security researchers

The demand for collecting and evaluating cyber threat information and quickly reflecting it in signatures is increasing day by day. We collect the latest information from the world's leading cyber threat intelligence information, affiliated Israeli companies, information on the Internet, etc. efficiently, and our in-house team of security researchers consistently perform accurate evaluation and creates signatures.

Cyhorus Worldʼs leading cyber threat intelligence & threat information monitoring team of security researchers

Inquiries and Document Request