This resource is no longer available
A new approach to the web application firewall (WAF)? That’s a must have.
WAFs have long been difficult to manage, and Next-Generation WAFs (NGWAFs) still fail to stop subtle or advanced threats.
What you need is a new approach that extends the evolution of the NGWAFs to add real-time attacker-centric analysis in addition to application-centric analysis. This paper details how correlating across the unique attributes of attackers and actively engaging suspicious behavior can find and stop true threats in real time, and avoid false positives.
Read on to discover comprehensive core concepts, drivers, and potential benefits of this attacker-centric approach from ThreatX.