Quant WAF
Powerful, flexible, and affordable protection against known and emerging threats.
Full OWASP Core Rule Set support.
Quant's Web Application Firewall (WAF) provides immediate insights into malicious and suspicious traffic, filterable by IP, region, rule, and much more.
With configurable reporting and alerting you can always be aware of anomalous traffic events without the false positives.
Configurable alongside the powerful Quant rules engine to allow for control via a range of options including domain, route, geolocation, cookie names, IP ranges, and much more.
Provides support for the OWASP Core Rule Set with configurable overrides and control. Run in report or block mode.
Advanced DDoS protection, rate limiting, bot protection, global block dictionaries, and third party integrations with security and spam services like Project Honey Pot.
Enable via a checkbox on any
rules proxy configuration
Control configuration depending on domain, route, country, and much more
Email or Slack alerts when certain thresholds are exceeded or anomalous events detected
Enable block dictionaries to block known bad bots, user-agents, referers, and IP addresses associated with bad actors as seen across our network
Block or restrict traffic that exceeds rate limiting thresholds by IP address or certain request headers (e.g. API users)
Full history of events tracked through the WAF including the ability to
filter and search
Learn more about Web Application Firewalls and related concepts.
The OWASP ModSecurity Core Rule Set (CRS) is a set of generic attack detection rules to protect web applications from attacks.
View OWASP docsHttp:BL lets website administrators leverage Project Honey Pot data to keep suspicious and malicious
web robots off their sites.
A dictionary attack is a method of breaking into an account or system by trying every word in a dictionary
as a password.