Owasp 2

You might also like

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 2

OWASP top 10

SANS top 25 OWASP top 10 OWASP top 10 OWASP top 1


Free ssl certificate SANS top 25 SANS top 25 SANS top 25
Zero day vulnerability protection Free ssl certificate Free ssl certificate Free ssl certific
IP reputations and blacklist and whitelist
Zero day vulnerability protection
Zero day vulnerability protectionZero day vulnerability
Geo-location based blacklist and whitelist
IP reputations and blacklist and IPwhitelist
reputations and blacklist and IPwhitelist
reputations and blacklis
URL whitelisting and blacklisting
Geo-location based blacklist and Geo-location
whitelist based blacklist and Geo-location
whitelist based blackli
Rate limiting URL whitelisting and blacklisting
URL whitelisting and blacklistingURL whitelisting and b
Advanced- ip based rate limiting Rate limiting Rate limiting Rate limiting
Virtual patching based on vuln scans Advanced- ip based rate limitingAdvanced- ip based rate limiting Advanced- ip based ra
Bot Mitigation Virtual patching based on vulnVirtual
scans patching based on vulnVirtual
scans patching based o
layer 7 ddos protection Bot Mitigation Bot Mitigation Bot Mitigatio
Behavioural rules layer 7 ddos protection layer 7 ddos protection layer 7 ddos prote
Self-learning rule engine Behavioural rules Behavioural rules Behavioural ru
Custom rules Self-learning rule engine Self-learning rule engine Self-learning rule e
Machine fingerprinting Custom rules Custom rules Custom rules
Automated report generations from Dashboard Machine fingerprinting Machine fingerprinting Machine fingerpri
Automated report generations Automated
from Dashboard
report generations Automated
from Dashboard
report generations
OWASP top 10
SANS top 25
Free ssl certificate
Zero day vulnerability protection
putations and blacklist and whitelist
location based blacklist and whitelist
URL whitelisting and blacklisting
Rate limiting
Advanced- ip based rate limiting
tual patching based on vuln scans
Bot Mitigation
layer 7 ddos protection
Behavioural rules
Self-learning rule engine
Custom rules
Machine fingerprinting
ted report generations from Dashboard

You might also like