Bot Manager Resources

ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค

Protect your applications with Radwareโ€™s AI-powered web application firewall (WAF).

ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค๊ฐ€ ํ•˜๋Š” ์ผ

As the speed and complexity of web application development grow to meet the rising demand for application availability, businesses have become more vulnerable to data breaches and financial losses.

Radwareโ€™s adaptive and automated WAF protects against web application attacks, hacking and other vulnerabilities. Our WAF technology combines negative security model with an AI-powered behavioral-based positive security model that automatically learns the behavior patterns of legitimate user activities and continuously refines security policies to avoid false positives and accurately block any action that deviates from these patterns of legitimate behavior.

"๋ผ๋“œ์›จ์–ด WAF ํด๋ผ์šฐ๋“œ์— ๋Œ€ํ•œ ์ „๋ฐ˜์ ์ธ ๊ฒฝํ—˜์€ ํ›Œ๋ฅญํ–ˆ์Šต๋‹ˆ๋‹ค. ์—ฌ๊ธฐ์—๋Š” POC๋ถ€ํ„ฐ ๊ตฌํ˜„๊ณผ ์ง€์†์ ์ธ ์ง€์›์— ์ด๋ฅด๊ธฐ๊นŒ์ง€ ๋‹ค์–‘ํ•œ ์š”์†Œ๋ฅผ ์•„์šฐ๋ฆ…๋‹ˆ๋‹ค."

๋„คํŠธ์›Œํฌ ์—”์ง€๋‹ˆ์–ด
์šด์†ก ์ธํ”„๋ผ ๋ฐ ์šด์˜

ํƒ€์˜ ์ถ”์ข…์„ ๋ถˆํ—ˆํ•˜๋Š” ์ ์‘ํ˜• ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ํ”„๋กœํ…์…˜

Cloud WAF provides enterprise-grade, continuously adaptive web application security protection. Based on Radwareโ€™s market-leading firewall, it completely covers OWASP Top 10 threats and automatically adapts to evolving threats.

Designed around the unique Radware SecurePathโ„ข architecture, Cloud WAF can be easily deployed as an API-based, out-of-path service across any hybrid or cloud environment to provide frictionless, state-of-the-art security with centralized visibility and management console.

OWASP ๊ณต๊ฒฉ์— ์ „๊ฒฉ ๋Œ€์‘

OWASP Top 10 Attack Coverage

์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ

Protection From Zero-day Attacks

์ƒˆ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ด€๋ จ ์ •์ฑ… ์ž๋™ ์ƒ์„ฑ

Auto-generated Policies for New Applications

๋น„์ƒ ๋Œ€์‘ํŒ€

Unified Portal Fully Managed By Radware ERT

๋ผ๋“œ์›จ์–ด ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค์˜ ๊ฐ•์ 

  • Complete Web and Mobile Application Protection

    Comprehensive coverage includes OWASP Top 10 coverage and protection against advanced and zero-day attacks thanks to both negative and AI-driven behavioral-based positive security models.

  • Reduced Overhead and Lowered MTTR

    AI-powered adaptive protection provides automatic analytics and policy optimization, managed services and 24x7 support through Radware's ERT.

  • Flexible Deployment and Compatibility

    Cloud WAF ensures a consistently high level of protection across any environment, including on-premises, virtual clouds, private clouds, public clouds, multi-clouds, hybrid environments and Kubernetes.

๋งฅ๋ถ

๋Œ€๊ทœ๋ชจ ์ฒจ๋‹จ ๋ณด์•ˆ

OWASP ๊ณต๊ฒฉ์— ์ „๊ฒฉ ๋Œ€์‘

Automated Analytics for Simplified Security Management

Radware's Cloud WAF automated application analytics simplify security event management by taking massive amounts of alerts and consolidating them into a small, manageable set of user activities, providing security professionals with a frictionless operational experience.

์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ

Visibility Into Your Applications

Cloud WAF automated application analytics provides simple explanations of security events, providing context on application behavior, and why certain events are blocked or allowed. This helps security administrators separate good and bad and focus on alerts that matter.

์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ

Auto Cross-module Correlation

Our AI-based cross-correlation engine goes beyond WAF security events to analyze threats generated by other modules within the app protection platform. It compiles a broad attack story and preemptively and automatically blocks malicious sources across apps within the account.

์ œ๋กœ๋ฐ์ด ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ

์™„์ „ ๊ด€๋ฆฌํ˜• ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ์„œ๋น„์Šค

๋ผ๋“œ์›จ์–ด ๋น„์ƒ ๋Œ€์‘ํŒ€(ERT)์ด 24x7 ์ œ๊ณตํ•˜๋Š” ์™„์ „ ๊ด€๋ฆฌํ˜• ์„œ๋น„์Šค๋กœ, ๋ณด์•ˆ ์ •์ฑ… ๊ตฌ์„ฑ๊ณผ ์—…๋ฐ์ดํŠธ๋Š” ๋ฌผ๋ก  ๊ณต๊ฒฉ ํƒ์ง€, ๊ฒฝ๊ณ , ์™„ํ™”์ฑ…์— ๋Œ€ํ•ด ์ „์ ์œผ๋กœ ์ฑ…์ž„์ง‘๋‹ˆ๋‹ค.

WAF(์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐฉํ™”๋ฒฝ)๋ž€?

๋ผ๋“œ์›จ์–ด์˜ ์œ ๋ฆฌ ๋”๋กฏ(Uri Dorot)๊ณผ ํ•จ๊ป˜ํ•˜๋Š” ์ด๋ฒˆ Radware Minute ์—ํ”ผ์†Œ๋“œ๋ฅผ ์‹œ์ฒญํ•˜๋ฉด์„œ ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ฐฉํ™”๋ฒฝ์ด๋ž€ ๋ฌด์—‡์ธ์ง€, ์™œ ์ด ๋ฐฉํ™”๋ฒฝ์ด ์ค‘์š”ํ•œ์ง€ ๊ทธ๋ฆฌ๊ณ  ์ž‘๋™ ๋ฐฉ์‹๊ณผ ๋ฐฉํ™”๋ฒฝ ์„ ํƒ ์‹œ ์ฃผ์˜์‚ฌํ•ญ๋„ ์•Œ์•„๋ณด์„ธ์š”.

"ํด๋ผ์šฐ๋“œ WAF ์†”๋ฃจ์…˜์˜ ๊ธฐ๋ฐ˜ ๊ธฐ์ˆ ์€ ์œ„ํ˜‘์„ ํƒ์ง€ํ•˜๊ณ  ์ฐจ๋‹จํ•˜๋Š” ๋ฐ ๋งค์šฐ ํšจ์œจ์ ์ž…๋‹ˆ๋‹ค. ์ธํ„ฐํŽ˜์ด์Šค๋Š” ์ง„ํ–‰ ์ƒํ™ฉ๊ณผ ๊ด€๋ จํ•˜์—ฌ ์ ์ ˆํ•œ ์ •๋ณด์™€ ํ†ต์ฐฐ์„ ๊ธฐ์ˆ ํŒ€์— ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ์†”๋ฃจ์…˜ ๊ฒฐ๊ณผ๋ฌผ์„ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ œํ’ˆ ๊ธฐ๋Šฅ ์„ธํŠธ๋ฅผ ์ง€์†์ ์œผ๋กœ ๊ฐœ์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค."

๋ณด์•ˆ ๊ด€๋ฆฌ์ž
ํ†ต์‹  ๋ณด์•ˆ ๋ฐ ์œ„ํ—˜ ๊ด€๋ฆฌ

์• ๋„๋ฆฌ์ŠคํŠธ ๋ณด๊ณ ์„œ

KuppingerCole 2024 WAF Leadership Compass Report

Get up-to-date insights into today's WAF market and find the solution that's right for you. This report looks at market segment, vendor service functionality, market share and innovation.

์ž์„ธํžˆ ๋ณด๊ธฐ
๋ฐ์ดํ„ฐ์‹œํŠธ

ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค

๋ผ๋“œ์›จ์–ด์˜ ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค๋Š” OWASP ์ƒ์œ„ 10๋Œ€ ์œ„ํ˜‘์— ๋Œ€ํ•œ ์ „์ฒด ๋ฒ”์œ„๋ฅผ ํฌํ•จํ•˜์—ฌ ์›น ๊ธฐ๋ฐ˜ ๊ณต๊ฒฉ์— ๋Œ€ํ•ด ํƒ€์˜ ์ถ”์ข…์„ ๋ถˆํ—ˆํ•˜๋Š” ์ƒ์‹œ ๋ณดํ˜ธ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ”์—ˆ์œผ๋ฉฐ ์‚ฌ์šฉ์ด ์‰ฝ๊ณ  ๋ฒˆ๊ฑฐ๋กญ์ง€ ์•Š์€ ์„œ๋น„์Šค๋กœ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ๊ธ‰ WAF๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ
์†”๋ฃจ์…˜ ๊ฐœ์š”

๋ผ๋“œ์›จ์–ด ํด๋ผ์šฐ๋“œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณดํ˜ธ ์„œ๋น„์Šค

๋ณธ ์†”๋ฃจ์…˜ ๊ฐœ์š”๋Š” ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํ™˜๊ฒฝ์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ๋ฌธ์ œ ๋ฐ ๋ผ๋“œ์›จ์–ด์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ฐœ์š”๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ
๋ฐฑ์„œ

์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณด์•ˆ์˜ ๊ณผ์ œ(ํ˜„์žฌ ์‚ฌ์šฉ ์ค‘์ธ ์˜จํ”„๋ ˆ๋ฏธ์Šค WAF๊ฐ€ ๋” ์ด์ƒ ์ถฉ๋ถ„ํ•˜์ง€ ์•Š์€ ์ด์œ )

์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ๊ทธ ์–ด๋Š ๋•Œ๋ณด๋‹ค ์ค‘์š”ํ•œ ๋ฐ˜๋ฉด ๋ณดํ˜ธ๋Š” ๋”์šฑ ์–ด๋ ค์›Œ์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋ผ๋“œ์›จ์–ด ํด๋ผ์šฐ๋“œ WAF๊ฐ€ ๊ทธ ๊ฐ„๊ทน๊ณผ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ๋ณด๊ธฐ

30์ผ ๋ฌด๋ฃŒ ํ‰๊ฐ€ํŒ

ํ•œ ๋‹ฌ ๋™์•ˆ ํด๋ผ์šฐ๋“œ WAF ์„œ๋น„์Šค๋ฅผ ํ…Œ์ŠคํŠธํ•˜๋ฉด์„œ ๋ผ๋“œ์›จ์–ด์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณดํ˜ธ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ํ™•์ธํ•˜์‹ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

ํ˜„์žฌ ๊ณ ๊ฐ์ด์‹ญ๋‹ˆ๊นŒ?

๊ธฐ์ˆ  ์ง€์› ๋˜๋Š” ์ถ”๊ฐ€ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”ํ•˜์‹œ๊ฑฐ๋‚˜ ๋‹น์‚ฌ ์ œํ’ˆ ๋ฐ ์†”๋ฃจ์…˜์— ๊ด€ํ•ด ๊ถ๊ธˆํ•˜์‹  ์ ์ด ์žˆ๋‹ค๋ฉด ์ €ํฌ๊ฐ€ ์ฆ‰์‹œ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ์—…์žฅ ์†Œ์žฌ์ง€
์ฆ‰์‹œ ๋‹ต์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์‹ ์ •๋ณด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค
๋ฌด๋ฃŒ ์˜จ๋ผ์ธ ์ œํ’ˆ ๊ต์œก
๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ  ์ง€์›๋ถ€์™€์˜ ์ƒ๋‹ด
๋ผ๋“œ์›จ์–ด ๊ณ ๊ฐ ํ”„๋กœ๊ทธ๋žจ ์ฐธ์—ฌ

์†Œ์…œ๋ฏธ๋””์–ด

์ „๋ฌธ๊ฐ€๋“ค๊ณผ ๊ต๋ฅ˜ํ•˜๊ณ  ๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ ์— ๊ด€ํ•œ ๋Œ€ํ™”์— ์ฐธ์—ฌํ•˜์„ธ์š”.

๋ธ”๋กœ๊ทธ
๋ณด์•ˆ ์—ฐ๊ตฌ ์„ผํ„ฐ
CyberPedia