Web Application Firewall (WAF)

Protect your apps and APIs and get robust security with a proven WAF

DT Cloud Platform WAF

Prevents security breaches, data loss, and possible unauthorized modifications. Your applications and APIs are not only  your most valuable bit but also your most vulnerable assets. DT Cloud Platform WAF keeps them secure by protecting against both known and unknown attacks and providing insights for faster remediation. Thus, you can be confident in the security and performance of applications even in multi-cloud environments.


Defend your applications and APIs against OWASP top 10 threats and zero-day attacks

Real-time monitoring and security alarms

Real-time monitoring and security alarms


Minimized cost of managing security infrastructure

boosted security

DevOps team may set up application-specific rules using a robust REST API to boost security

WAFs can be used to protect against a wide range of threats, including SQL injection attacks, cross-site scripting (XSS), cross-site request forgery (CSRF), clickjacking, and denial of service (DDoS) attacks.

Improve security
Improve Security

Protects against security breaches, data loss, and unauthorized changes to websites that access sensitive business or consumer data. It does this by filtering both requests and answers, assessing them for indications of malicious behavior, and blocking these kinds of requests.

Protect web applications
Protect Web Applications

Website is secured not just against known sorts of attacks, but also from new, previously unknown types of attacks. In addition to stopping unwanted access to web servers and websites, the Web App Firewall protects vulnerable spots in legacy CGI code or scripts, web server software, web frameworks, etc.

Protect web apps with managed and pre configured rule sets
Protect Web Apps With Managed and Pre-configured Rule Sets

WAF engine detection paired with updated rule sets improves efficiency while increasing security and reducing false positives. The updated rule sets include:

  • Detection of new OWASP Top 10 vulnerabilities like XXE and XXE injection, as well as SQL injection
  • Updated rules for potential HTTP response splitting attacks
  • A revised XML encryption detection rule set that is more accurate and reduces false positives
  • New rules to detect cross site scripting (XSS) in JavaScript files