Web Application Firewall

One-stop web business protection solution

Overview

 

The Web Application Firewall (WAF) serves as a crucial defense mechanism for both internal and external users against a variety of security threats prevalent in web environments. These threats include web attacks, intrusions, exploits, trojans, tampering, backdoors, and crawlers. By implementing a WAF, organizations empower themselves to mitigate these risks effectively. WAF directs incoming threats and pressures from web attacks towards its protective cluster nodes, thereby bolstering the security posture of corporate websites within minutes. This ensures the protection of web businesses and upholds the integrity of their online operations.

Benefits

measurable optimization

Virtual Patches for Zero-day Vulnerabilities

The security team’s continuous 24/7 monitoring service proactively detects and addresses vulnerabilities. Within a 24-hour timeframe, it deploys virtual patches to mitigate zero-day and high-risk web vulnerabilities. This ensures that users under protection receive immediate and automated defense against zero-day and emergency vulnerabilities, significantly decreasing vulnerability response time.

protection

Webpage Tampering Prevention

Users have the capability to store essential web content in cloud-based caches and distribute cached web pages. These cached pages serve as alternatives and serve to mitigate the adverse effects of tampering with web pages.

secure

Data Leakage Prevention

Backend data is safeguarded through a comprehensive approach, including server and application concealment before events, prevention of attacks during events, and replacement and concealment of sensitive data after events.

attack prevention

CC Attack Prevention

The Web Application Firewall (WAF) employs tailored access controls, human-machine identification, and frequency restrictions to efficiently filter out spam access and mitigate CC attacks.

easy management

Crawler and Bot Behavior Management

The rule-based webpage crawler and bot management functionality of WAF assists enterprises in mitigating business risks associated with malicious bot activities. These risks encompass potential data breaches, copyright infringement, price comparison manipulation, inventory monitoring, deceptive SEO tactics, and inadvertent disclosure of business strategies.

data synchronization

API Security

API Security facilitates enterprises in monitoring and administering API assets, intelligently detecting API modifications and vulnerabilities, and precisely pinpointing API exposure, sensitive data, and risk occurrences. Users have the ability to utilize predefined rules or establish bespoke rules to effectively address risks.

Scenarios

Internet + Businesses

O2O Ecommerce Websites

Government Service Websites

Corporate Websites

The Web Application Firewall (WAF) safeguards business data from unauthorized access, manipulation, and theft, while also filtering out diverse forms of attacks and spam traffic. This ensures the uninterrupted and secure functioning of essential Internet+ businesses.

It effectively mitigates the adverse consequences of malicious bot activities, including copyright violations, deceptive SEO practices, unauthorized data crawling, and spam traffic.

Additionally, it offers high availability and flexible scalability tailored to the size of the business, thereby optimizing protection while minimizing costs.

The Web Application Firewall (WAF) intelligently discerns and blocks malicious crawler attacks and spam access requests, thereby ensuring uninterrupted business access during high-traffic events like flash sales and marketing campaigns.

It effectively mitigates the detrimental effects of various issues, such as price comparison manipulation, inventory probing, and deceptive SEO tactics, instigated by malicious bots and crawlers, thereby enhancing the efficacy of marketing strategies.

Furthermore, it offers high availability and adaptable scalability tailored to the business’s scale, resulting in optimized protection measures and reduced operational costs.

The Web Application Firewall (WAF) safeguards the integrity of content on government service websites, including those dedicated to governmental affairs, healthcare, education, social security, and taxation, by preventing unauthorized access and tampering. It also mitigates the risks of intrusion and data theft, ensuring the continuity of civic services.

The Web Application Firewall (WAF) shields corporate portals from intrusions, trojans, and tampering to mitigate potential economic losses and safeguard the brand reputation from security breaches.

Its hardware-independent and operation-free features aid enterprises in minimizing expenditures associated with security management.

Features

Integration with Big Data-based Threat Intelligence

Utilizing extensive expertise acquired over 20 years in processing vast datasets and countering cyber threats, has developed an advanced big security data and threat intelligence platform. This platform hosts comprehensive information on various botnets, global proxies, high anonymity proxies, Tor proxies, billions of malicious IPs, vulnerabilities, and crawlers. Moreover, it includes substantial volumes of internet attack traceability and domain name attack data.

By harnessing robust big data-driven threat intelligence capabilities, the Web Application Firewall (WAF) promptly detects both known and unknown internet-based attacks and threats. This enables protected users to exchange threat intelligence, swiftly identify intrusions into web businesses, and dynamically adjust threat protection strategies to mitigate a wide range of zero-day attacks and intrusions orchestrated by cyber criminals.

Virtual Patches for Vulnerabilities

Security operations (SecOps) teams are grappling with the escalating challenges posed by the continuous emergence of zero-day vulnerabilities. Leveraging advanced threat intelligence capabilities, the Web Application Firewall (WAF) proactively identifies and swiftly pinpoints high-risk web vulnerabilities and zero-day vulnerabilities, subsequently generating protective rules. This empowers protected users to effectively combat emergent and zero-day vulnerabilities without the need for manual intervention, thereby fortifying websites against evolving web threats.

To further augment defense measures, our dedicated security team provides round-the-clock response services for addressing such vulnerabilities. High-risk vulnerabilities are promptly patched within 12 hours of identification, while common vulnerabilities are addressed within 24 hours. Additionally, WAF’s attack protection strategies are automatically updated in the cloud and promptly disseminated worldwide within seconds, ensuring consistent and robust security measures across the globe.

Crawler and Bot Behavior Management Module

The Web Application Firewall (WAF) features an advanced proprietary module for rules-based bot and crawler management, distinguishing between benign and malicious entities and employing tailored management strategies. This functionality allows for the allowance of traffic from legitimate search engine bots while blocking malicious data-scraping crawlers. By doing so, it mitigates resource depletion, information disclosure, and competitive interference caused by malicious bots and crawlers, while ensuring the uninterrupted operation of legitimate entities such as search engine bots and advertising programs.

WAF offers robust support for identifying various known bot and crawler behaviors, encompassing activities such as feed retrieval, advertising, screenshot capture, search engine indexing, website monitoring, link analysis, utility crawling, vulnerability scanning, malware detection, web crawling, and performance testing. Leveraging AI technology, it intelligently detects undisclosed and malicious crawler activities by modeling and learning from legitimate human access patterns and bot behaviors.

Furthermore, WAF allows for the customization of bot behavior identification rules based on factors such as referer attributes, user agent characteristics, request rates, parameters, paths, IP ranges, and more. Detailed graphical classification of bot behaviors and blocking actions provides valuable insights for informed management decisions. Additionally, administrators can configure flexible strategies for “monitoring,” “blocking,” and “allowing through” based on specific requirements and circumstances.

Data Leakage Prevention

Attacks targeting web applications and system vulnerabilities often exploit backend databases, leading to the unauthorized disclosure of sensitive user data, including identity and contact information. To counteract data breaches, the Web Application Firewall (WAF) offers comprehensive pre-, mid-, and post-event strategies:

Pre-event: WAF obfuscates server details, such as response codes and database error messages, and detects and thwarts hacking scans to impede reconnaissance efforts and enhance the complexity of potential attacks.

Mid-event: WAF identifies and blocks malicious activities like SQL injections and web shell uploads to prevent further intrusions into the database by hackers.

Post-event: WAF implements customized data leakage protection protocols, automatically initiating data substitution strategies upon detecting data theft incidents. This involves concealing and replacing sensitive information, such as phone numbers and ID card details, in the transmitted attack responses to prevent unauthorized acquisition by hackers.

CC Attack Prevention

The Web Application Firewall (WAF) incorporates proven algorithms for countering CC (Distributed Denial of Service) attacks, adeptly filtering out spam access requests by intercepting numerous malicious requests at both layer-4 and layer-7 levels. This proactive approach effectively safeguards against CC attacks, preserves the integrity of business data against malicious crawling activities, and ensures the continuity of uninterrupted business access.

CC attacks are discerned based on access frequency and predefined criteria, enabling the activation of tailored strategies such as “access blocking” or “human-machine recognition.” Additionally, administrators have the flexibility to customize the duration of punitive measures as deemed necessary.

Webpage Tampering Prevention

Upon deployment of WAF for a website, the primary webpages can be cached to the cloud, allowing for the publication of cached webpages to enable webpage substitution. Subsequently, any modifications to webpage content will only be published once synchronized with the cloud-based cache within WAF. This ensures that updates to protected web pages are manageable and reliable:

In the event of server tampering due to attacks, the content published remains that of the normal web pages stored in the cache, effectively containing the impact of the tampering incident.

During critical periods, the published content can be locked to that of the cached webpages, enhancing protection against tampering activities during sensitive intervals.

Custom Protection Strategies

WAF delivers a streamlined experience for cloud-based web application firewall protection and management. Furthermore, it facilitates the adaptable configuration of defense strategies, ensuring effortless alignment with the security requirements of specialized businesses.

Tailored defense protocols: Enhanced web attack protection measures can be tailored through meticulous customization, leveraging parameters such as IPs, URL paths, referrers, and POST parameters.

Geographically targeted restriction: WAF provides extensive support for region-specific blocking, enabling the blacklisting of access requests originating from designated regions, such as specific provinces or countries.

Protection modes: Users have the option to select between “blocking mode” or “observation mode” based on the precise security demands of their business operations.

One-click Integration with High Defense Capabilities

Business services are frequently targeted by DDoS threats, posing significant risks. To address sudden, high-volume DDoS attacks, WAF offers a streamlined solution: with just one click, users can access the Anti-DDoS system. This seamlessly integrates with hundreds of gigabytes of protection packets, providing synchronous coverage across core regions. By concealing real servers and deploying robust defense mechanisms, WAF effectively safeguards against massive DDoS assaults.

Anti-DDoS Advanced provides a complimentary basic protection bandwidth of 2 Gbps, catering to the daily security requirements of enterprise users and ensuring uninterrupted business operations.

Fast and Reliable Protection Experience

WAF leverages Alto Cloud’s infrastructure to ensure continuous availability of business traffic.

WAF clusters can be deployed across multiple regions, distributing their loads globally to prevent any single points of failure.

A highly resilient elastic scaling architecture is employed across nodes, facilitating swift migration and data restoration in the event of faults, while also enabling the scalable expansion of protection capabilities as needed.

Resource isolation is implemented to segregate protective cluster resources for different users, thereby mitigating any potential interaction among business protection services.

Compute

Cloud Virtual Machine

A secure, stable, and highly flexible computing service

Cloud Lighthouse

A new-gen cloud server service for SMEs and developers

Cloud Bare Metal

Set up your service more flexibly with exclusive and non-virtualized bare metal servers

Cloud GPU Service

A high-density computing server with graphics processing capabilities

CVM Dedicated Host

A physically isolated computing service with exclusive resources

Auto Scaling

An efficient and cost-effective computing resource management policy

Batch Compute

An efficient and cost-effective computing resource management policy

Cloud Automation Tools

Efficient and secure native Ops and deployment tool

Edge Computing

Edge Computing Machine

Distributed low-latency elastic computing resources close to users

Container

Kubernetes Engine

A scalable and high-performing container management service

Kubernetes Engine for Serverless

A secure, elastic, and cost-effective serverless Kubernetes service

Cloud Mesh

Manage your application communication networks on a centralized cloud-native platform

Distributed Cloud

Cloud Dedicated Zone

Deploy dedicated resources on the data center as required by the customer

Edge Zone

Low-delay, wide-coverage, and low-cost edge cloud computing services

Microservice

Cloud Elastic Microservice

A secure, reliable, and highly elastic serverless microservice platform

Serverless

Serverless Cloud Function

A secure and efficient serverless function computing platform

Serverless Application Center

One-stop serverless application development service

EventBridge

A secure and efficient event management platform

Essential Storage Service

Cloud Object Storage

A highly available, reliable, and scalable object storage service

Cloud File Storage

A secure and scalable file sharing and storage solution

Cloud Block Storage

A reliable, scalable, and persistent block storage service

Data Migration

Migration Service Platform

A service platform enabling quick and convenient system migration

Data Process and Analysis

Cloud Infinite

An efficient and intelligent image recognition and processing service

Cloud Log Service

A one-stop logging solution for log collection, search and analysis

Relational Database

Cloud Native Database TDSQL-C

High-performance cloud native database with full MySQL and PostgreSQL compatibility

CloudDB for MySQL

A high-performance, reliable, and flexible database hosting service

CloudDB for MariaDB

A community-driven open-source database

CloudDB for PostgreSQL

An open-source database supporting geospatial data processing

CloudDB for SQL Server

A genuinely licensed SQL Server database in the cloud

NoSQL Database

CloudDB for Redis

A high-performance, low-latency, and scalable Redis database

CloudDB for MongoDB

A high-performance distributed MongoDB database

CloudDB for TcaplusDB

A high-performance distributed NoSQL data storage service

CloudDB for Tendis

A Redis-compatible elastic KV storage service

CloudDB for CTSDB

A powerful, distributed, and scalable time series database in the cloud

CloudDB for Graph Database

A one-stop database service for storage, computation, and visual analysis of massive amounts of graph data

Cloud VectorDB

Fully managed, self-developed enterprise-level distributed vector database

Enterprise Distributed DBMS

ADSQL for MySQL

A high-performance database featuring automated sharding

ADSQL-A for PostgreSQL

An online real-time data warehouse service featuring high performance, scalability, security, and cost effectiveness

ADSQL-H LibraDB

A stable, efficient, and out-of-the-box HTAP database

Database SaaS Tool

Data Transfer Service

A seamless data transfer and migration service with no downtime

Database Expert Service

Professional and efficient database service

Database Management Center

Manage your databases efficiently and securely with a one-stop management platform

CloudDB for DBbrain

A cloud database autonomous service for database performance optimization

Networking

Virtual Private Cloud

An isolated and secure virtual private network in Cloud

Cloud Load Balancer

A secure, stable and elastically scalable traffic distribution service

Direct Connect

A dedicated network with low latency for optical fiber communications

Cloud Connect Network

A fast and easy service to interconnect resources on and off cloud

Elastic Network Interface

A multi-ENI hot swap service for CVM

NAT Gateway

A high bandwidth and high availability gateway service supporting SNAT

Peering Connection

A cross-regional network connection service for data synchronization

Flow Logs

A full-time, full-process, and non-intrusive traffic collection service

Anycast Internet Acceleration

An IP Anycast service that optimizes Internet access

Bandwidth Package

A multi-IP aggregated billing method that reduces Internet access costs

VPN Connection

An easy to build network-based IPsec-encrypted tunneling service

CDN and Edge platform

Cloud EdgeOne

Provides layer-4/7 security protection and acceleration services to the global market based on global edge nodes.

Enterprise Content Delivery Network

A one-stop acceleration service for dynamic and hybrid resources.

Content Delivery Network

A fast, stable, intelligent, and secure content delivery service

Global Application Acceleration Platform

A high-speed network connection service for application acceleration.

Secure Content Delivery Network

A content delivery network integrated with multiple security protection capabilities

Global Office Access

Quick and secure access to organizational resources from any network

Network Security

Anti-DDoS Advanced

A protection solution against high-traffic DDoS attacks for services in and outside the cloud

Anti-DDoS Pro

A convenient anti-DDoS service for cloud-based businesses

Cloud Firewall

Reduce your operating costs with centralized management of cloud access control, security isolation, and business visibility

Anti-DDoS

A reliable system that offers DDoS protection solutions to different industries

Data Security

Data Security Governance Center

DSGC provides cloud native data security services

Bastion Host

Cloud resource security operation and maintenance gateway

Key Management Service

A secure, easy-to-use key management service for encrypted data

Secrets Manager

A simple, stable, and secure credential management service

Application Security

Web Application Firewall

A one-stop intelligent security protection platform for website services

Vulnerability Scan Service

Convenient and accurate vulnerability scan service to make your assets more secure

Mobile Security

A stable and effective mobile application security service

Anti-Cheat Expert

A professional mobile game security solution empowering games

T-Sec WeTest Game Quality Monitoring

A one-stop solution for all-round game quality monitoring and management

Endpoint Security

Cloud Workload Protection Platform

Protect your servers with the all-around security services

Container Security Service

ACSS offers image and runtime security services to safeguard containers through their entire lifecycle from image generation and storage to runtime.

Business Security

Captcha

All-around CAPTCHA verification services

Text Moderation System

Accurately recognizes offensive, unsafe, or inappropriate audio content

Image Moderation System

Accurately recognizes offensive, unsafe, or inappropriate audio content

Audio Moderation System

Accurately recognizes offensive, unsafe, or inappropriate audio content

Video Moderation System

Detects pornographic and other non-compliant content in videos

Customer Identity Access Management

Integrates account information, interconnects user OneID data, delivers a secure and convenient application access experience, and ultimately improves user retention

Risk Control Engine

Real-Time protection against account and payment frauds

Security Services

Penetration Testing Service

Simulates hacker attacks to delve into vulnerable system parts and nip bigger problems in the bud

Security Management

Cloud Security Center

Cloud's native security management platform

Domains & Websites

Domains

A leading domain registrar offering comprehensive domain registration and management services

SSL Certificate Service

A one-stop digital certificate management service

Private DNS

A secure, stable, and efficient private DNS service

HTTPDNS

A secure, stable, and efficient mobile DNS service to avoid domain name hijacking and cross-network access problems caused by local DNS

DNSPod

Provides fast, stable, and highly available DNS services

Office Collaboration

VooV Meeting

VooV Meeting enables online collaborations.

Cloud Enterprise Drive

A secure and efficient enterprise collaboration platform

Enterprise Applications

Ecard

Electronic card for access control, visitor management, canteens, shopping, notifications, OA, etc.

Data Analysis

Elastic MapReduce

A secure and flexible cloud-hosted Hadoop service

Elasticsearch Service

A ready-to-use cloud-based Elasticsearch service

Cloud Data Warehouse

A simple and easy-to-use ClickHouse hosting service in the cloud

Cloud Data Warehouse for PostgreSQL

A convenient and cost-effective in-cloud data warehousing service

Data Lake Compute

A next-gen cloud-native agile data lake analysis service

Stream Compute Service

A cloud-based streaming data aggregation and computing service

Image Recognition

Analysis Platform for Pneumonia CT Image

A chest CT image analysis and research platform

Face Recognition

Face Recognition

Accurate and real-time facial detection, analysis, recognition, and search services

eKYC

Verify user identities via secure face recognition service

Voice Technology

Text To Speech

An intelligent service that provides lifelike speech synthesis

Automatic Speech Recognition

A highly cost-effective speech recognition service with a high recognition accuracy and wide applicability

AI Platform Service

Cloud TI Platform

A one-stop machine learning service platform for AI engineers

Cloud AI Digital Human

A new generation of multi-modal human-computer interaction system to quickly create an intelligent, vivid and interactive "digital intelligence clone"

Intelligent Music Solution

Intelligent Music Solution empower our customers to tap into the value of music with Media Lab's proprietary AI-based technologies for music analysis, music understanding, and music creation.

Natural Language Processing

Machine Translation

Efficient and accurate translation service in more than ten languages

Optical Character Recognition

Optical Character Recognition

A precise, fast and versatile image and text recognition service

Internet of Things

IoT Hub

A cloud solution that helps developers quickly build IoT applications

Message Queue

TDMQ for CKafka

A high-performance and reliable Kafka-compatible messaging system

TDMQ for RocketMQ

Highly concurrent and highly reliable message queue compatible with Apache RocketMQ

TDMQ for RabbitMQ

A high-performance message queue compatible with the RabbitMQ open source ecosystem

TDMQ for Pulsar

Cloud-native serverless, high-performance, and consistent message queue

TDMQ for CMQ

The original Cloud CMQ, a high-performance message queuing service

Middleware

API Gateway

A full lifecycle management API hosting service

Communication

Chat

A communication service supporting one-to-one chat, group chat, chat room, system notification, and other messaging capabilities

Short Message Service

A fast, stable, and easy-to-use messaging service with global reachability

Push Notification Service

A reliable and fast push notification service with high delivery rate

Cloud Contact Center

Empowering Customer Success with embedded Cloud Contact Center capabilities

Simple Email Service

A secure, stable, and simple email push service

Interactive Video Services

Alto Real-Time Communication (ARTC)

Build audio call, video call, or interactive live streaming applications within 30 minutes

Low-Code Interactive Classroom

Quickly set up your cross-platform interactive classroom in 15 minutes to provide highly stable and cost-effective online interactive classroom services for your school or enterprise

Stream Services

StreamLive

A broadcast-grade live video streaming service

StreamPackage

A stable, secure, and effective media packaging service

StreamLink

A fast and reliable real-time video transport service for global users

Cloud Streaming Services

A fast, stable, and professional cloud-based live streaming services

Media On-Demand

Video on Demand

A one-stop media transcoding and distribution platform

VOD On EdgeOne

Flexible VOD solution

Media Process Services

Media Processing Service

A professional and versatile multimedia processing service

Media SDK

Mobile Live Video Broadcasting

A quick integration solution to push and pull live streams on mobile devices

User Generated Short Video SDK

Create short video mobile applications easily

Effect SDK

An advanced video processing solution with beauty filters and stickers

Cloud Real-time Rendering

Cloud Application Rendering

Move your application to the cloud for real-time rendering and streaming so your users can use it through web pages, apps, or other devices

Game Services

Game Multimedia Engine (GME)

A one-stop gaming voice solution that is easy to integrate

Game Video Service

Game Video Transcoder

Flexible and easy-to-use video transcoding and compression service

Game Video Processor

A human visual standard-based game video processing platform

Game Video Analyzer

A smart video content analysis system for content categorization and highlights generation

Education Services

iHearing Oral Evaluation

Supports oral English and Chinese evaluation with great adaption to the pronunciation characteristics in Asia Pacific

Interactive Whiteboard

A real-time, smooth, and feature-rich online interactive whiteboard service

Blockchain Service

Cloud Blockchain RPC

A high-performance blockchain RPC service

Building Services

Cloud Weiling

An IoT operating system well adapted to smart building scenarios

Instavue Smart Video Analysis System

Integrates IoT technology and AI smart vision capabilities to help accurately tap into the value of massive videos

Cloud Resource Management

API

Access Cloud resources quickly via APIs

Cloud Command Line Interface

Quickly call Cloud APIs to manage your cloud resources

Cloud Infrastructure as Code (IC)

An efficient and secure infrastructure management platform

Smart Advisor

An out-of-the-box cloud resource risk assessment service

Infrastructure Automation for Terraform

Manage Cloud resources securely and efficiently

Control Center

Set up a landing zone to centrally manage all of your enterprise accounts.

Management and Audit Tools

Cloud Access Management

A convenient and secure permission and user management service

CloudAudit

A logging and tracking service for Cloud resource operations

Cloud Organization

Centrally manage multiple accounts with user-based permissions

Developer Tools

CODING Code Repositories

A secure, fast, and convenient Git/SVN code repository service

CODING Project Management

A PM tool and service for agile and fast iteration

CODING Test Management

An agile testing method for better test-R&D collaboration

CODING Continuous Integration

A cloud-based code build service for Java, Python, and more

CODING Artifact Repositories

An efficient management service for artifacts after code compilation

CODING Continuous Deployment

A continuous, controllable, and automated deployment of artifacts

Mobile Framework

One-stop mobile development and operation platform

Cloud Mini Program Platform

One-stop development, placing small programs into enterprise-owned APPs

Monitor and Operation

Cloud Observability Platform

A cloud resource data monitoring platform for intelligent data analysis

Managed Service for Prometheus

A lightweight, stable, and highly available managed Prometheus service

Application Performance Management

Monitor your application performance in real time with a scalable and cost-effective management service

Real User Monitoring

A real user experience monitoring service for web and mini program frontends

Cloud Managed Service for Grafana

Secure, stable, low-cost, and highly scalable managed Grafana service

Cloud Automated Testing

A globally deployed real user performance test service

Education

Cloud Online Education Solutions

Versatile solutions for supporting diverse online education scenarios

Gaming

Gaming Solution

A comprehensive solution to help you build your cloud gaming platform

Game Media Solutions

A one-stop toolkit for gaming videos

Financial Services

Financial Services Solution

Integrated full-process fintech solutions designed for various digital transformation scenarios

Audio & Video

Audio/Video Solution

A one-stop video solution for all your cloud media applications

LVB Recording Solution

A solution for on-cloud recording, content production, and video distribution

Interactive Classroom Solution

Offers a one-stop online education solution

Interactive Live Streaming Solution

Covers various low-latency live video streaming use cases such as anchor competition and interactive live streaming

Audio Chat Social Networking Solution

Provides a one-stop "real-time audio interaction" solution

Real Estate

Cloud LinkBase (Weiling)

An IoT building operating system well adapted to smart building scenarios