<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Meir+Michaeli</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Meir+Michaeli"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Meir_Michaeli"/>
		<updated>2026-04-23T22:19:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81279</id>
		<title>Web Application Firewall</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81279"/>
				<updated>2010-04-13T12:58:18Z</updated>
		
		<summary type="html">&lt;p&gt;Meir Michaeli: /* Important Selection Criteria */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Countermeasure}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)]] and [[SQL Injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&lt;br /&gt;
&lt;br /&gt;
A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia]&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Protection Against OWASP Top Ten!&lt;br /&gt;
* Very Few False Positives (i.e., should NEVER disallow an authorized request)&lt;br /&gt;
* Strength of Default (Out of the Box) Defenses&lt;br /&gt;
* Power and Ease of Learn Mode&lt;br /&gt;
* Types of Vulnerabilities it can prevent.&lt;br /&gt;
* Detects disclosure and unauthorized content in outbound reply messages, such as credit-card and Social Security numbers.&lt;br /&gt;
* Both Positive and Negative Security model support.&lt;br /&gt;
* Simplified and Intuitive User Interface. &lt;br /&gt;
* Cluster mode support.&lt;br /&gt;
* High Performance (milliseconds latency).&lt;br /&gt;
* Complete Alerting, Forensics, Reporting capabilities.&lt;br /&gt;
* Web Services\XML support.&lt;br /&gt;
* Brute Force protection.&lt;br /&gt;
* Ability to Active (block and log), Passive (log only) and bypass the web trafic.&lt;br /&gt;
* Ability to keep individual users constrained to exactly what they have seen in the current session&lt;br /&gt;
* Ability to be configured to prevent ANY specific problem (i.e., Emergency Patches)&lt;br /&gt;
* Form Factor: Software vs. Hardware (Hardware generally preferred)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also use [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls Best Practices: Use of Web Application Firewalls] to find out where and when to use a WAF and/or you may find &lt;br /&gt;
the [http://www.webappsec.org/projects/wafec/ Web Application Firewall Evaluation Criteria] useful for evaluating the performance and other characteristics of a WAF.&lt;br /&gt;
&lt;br /&gt;
The [[London Chapter WAF event]] held in 2006 has some comparative info amongst the WAF Vendors that participated in the event.&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application.&lt;br /&gt;
&lt;br /&gt;
==Well Known Open Source Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight]&lt;br /&gt;
* [http://www.modsecurity.org/ Breach - ModSecurity] &lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www.artofdefence.com/en/hyperguard/hyperguard.html art of defence - hyperguard]&lt;br /&gt;
* [http://www.breach.com Breach - WebDefend]&lt;br /&gt;
* [http://www.denyall.com/produits.html?set_lang=en Deny All - rWeb]&lt;br /&gt;
* [http://fortifysoftware.com/products/defender/ Fortify Software - Defender]&lt;br /&gt;
* [http://www.imperva.com/products/securesphere/web_application_firewall.html Imperva - SecureSphere™]&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.applicure.com Applicure - DotDefender]&lt;br /&gt;
* [http://www.radware.com/Solutions/Enterprise/Security/WebApplicationFirewall.aspx Radware AppWall]&lt;br /&gt;
* [http://www.armorlogic.com/ Armorlogic - Profense]&lt;br /&gt;
* [http://www.barracudanetworks.com/ns/products/web-application-controller-overview.php Barracuda Networks - Application Firewall]&lt;br /&gt;
* [http://www.bee-ware.net/en/product/i-sentry/ Bee-Ware - iSentry]&lt;br /&gt;
* [http://binarysec.com/ BinarySec - Application Firewall] &lt;br /&gt;
* [http://www.bugsec.com/index.php?q=WebSniper BugSec - WebSniper]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/ps9586/index.html Cisco - ACE Web Application Firewall]&lt;br /&gt;
* [http://www.citrix.com/English/ps2/products/product.asp?contentID=25636 Citrix - Application Firewall]&lt;br /&gt;
* [http://www.eeye.com/html/products/secureiis/index.html eEye Digital Security - SecureIIS]&lt;br /&gt;
* [http://www.f5.com/products/big-ip/product-modules/application-security-manager.html F5 - Application Security Manager]&lt;br /&gt;
* [http://forumsys.com/ Forum Systems - Xwall, Sentry]&lt;br /&gt;
* [http://www.webscurity.com/products.htm mWEbscurity - webApp.secure]&lt;br /&gt;
* [http://www.phion.com/INT/products/websecurity/Pages/default.aspx Phion / Visonys - Airlock]&lt;br /&gt;
* [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS  - Web Application Firewall]&lt;br /&gt;
* [http://www.xtradyne.com/ Xtradyne - Application Firewalls]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[Category: Control]]&lt;/div&gt;</summary>
		<author><name>Meir Michaeli</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81278</id>
		<title>Web Application Firewall</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81278"/>
				<updated>2010-04-13T12:57:51Z</updated>
		
		<summary type="html">&lt;p&gt;Meir Michaeli: /* Important Selection Criteria */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Countermeasure}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)]] and [[SQL Injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&lt;br /&gt;
&lt;br /&gt;
A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia]&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Protection Against OWASP Top Ten!&lt;br /&gt;
* Very Few False Positives (i.e., should NEVER disallow an authorized request)&lt;br /&gt;
* Strength of Default (Out of the Box) Defenses&lt;br /&gt;
* Power and Ease of Learn Mode&lt;br /&gt;
* Types of Vulnerabilities it can prevent.&lt;br /&gt;
* Detects disclosure and unauthorized content in outbound reply messages, such as credit-card and Social Security numbers.&lt;br /&gt;
* Both Positive and Negative Security model support.&lt;br /&gt;
* Simplified and Intuitive User Interface. &lt;br /&gt;
* Cluster mode support.&lt;br /&gt;
* High Performance (millisecond latency).&lt;br /&gt;
* Complete Alerting, Forensics, Reporting capabilities.&lt;br /&gt;
* Web Services\XML support.&lt;br /&gt;
* Brute Force protection.&lt;br /&gt;
* Ability to Active (block and log), Passive (log only) and bypass the web trafic.&lt;br /&gt;
* Ability to keep individual users constrained to exactly what they have seen in the current session&lt;br /&gt;
* Ability to be configured to prevent ANY specific problem (i.e., Emergency Patches)&lt;br /&gt;
* Form Factor: Software vs. Hardware (Hardware generally preferred)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also use [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls Best Practices: Use of Web Application Firewalls] to find out where and when to use a WAF and/or you may find &lt;br /&gt;
the [http://www.webappsec.org/projects/wafec/ Web Application Firewall Evaluation Criteria] useful for evaluating the performance and other characteristics of a WAF.&lt;br /&gt;
&lt;br /&gt;
The [[London Chapter WAF event]] held in 2006 has some comparative info amongst the WAF Vendors that participated in the event.&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application.&lt;br /&gt;
&lt;br /&gt;
==Well Known Open Source Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight]&lt;br /&gt;
* [http://www.modsecurity.org/ Breach - ModSecurity] &lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www.artofdefence.com/en/hyperguard/hyperguard.html art of defence - hyperguard]&lt;br /&gt;
* [http://www.breach.com Breach - WebDefend]&lt;br /&gt;
* [http://www.denyall.com/produits.html?set_lang=en Deny All - rWeb]&lt;br /&gt;
* [http://fortifysoftware.com/products/defender/ Fortify Software - Defender]&lt;br /&gt;
* [http://www.imperva.com/products/securesphere/web_application_firewall.html Imperva - SecureSphere™]&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.applicure.com Applicure - DotDefender]&lt;br /&gt;
* [http://www.radware.com/Solutions/Enterprise/Security/WebApplicationFirewall.aspx Radware AppWall]&lt;br /&gt;
* [http://www.armorlogic.com/ Armorlogic - Profense]&lt;br /&gt;
* [http://www.barracudanetworks.com/ns/products/web-application-controller-overview.php Barracuda Networks - Application Firewall]&lt;br /&gt;
* [http://www.bee-ware.net/en/product/i-sentry/ Bee-Ware - iSentry]&lt;br /&gt;
* [http://binarysec.com/ BinarySec - Application Firewall] &lt;br /&gt;
* [http://www.bugsec.com/index.php?q=WebSniper BugSec - WebSniper]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/ps9586/index.html Cisco - ACE Web Application Firewall]&lt;br /&gt;
* [http://www.citrix.com/English/ps2/products/product.asp?contentID=25636 Citrix - Application Firewall]&lt;br /&gt;
* [http://www.eeye.com/html/products/secureiis/index.html eEye Digital Security - SecureIIS]&lt;br /&gt;
* [http://www.f5.com/products/big-ip/product-modules/application-security-manager.html F5 - Application Security Manager]&lt;br /&gt;
* [http://forumsys.com/ Forum Systems - Xwall, Sentry]&lt;br /&gt;
* [http://www.webscurity.com/products.htm mWEbscurity - webApp.secure]&lt;br /&gt;
* [http://www.phion.com/INT/products/websecurity/Pages/default.aspx Phion / Visonys - Airlock]&lt;br /&gt;
* [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS  - Web Application Firewall]&lt;br /&gt;
* [http://www.xtradyne.com/ Xtradyne - Application Firewalls]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[Category: Control]]&lt;/div&gt;</summary>
		<author><name>Meir Michaeli</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81277</id>
		<title>Web Application Firewall</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81277"/>
				<updated>2010-04-13T12:39:08Z</updated>
		
		<summary type="html">&lt;p&gt;Meir Michaeli: /* Other Well Known Commercial Tools Of This Type */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Countermeasure}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)]] and [[SQL Injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&lt;br /&gt;
&lt;br /&gt;
A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia]&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Very Few False Positives (i.e., should NEVER disallow an authorized request)&lt;br /&gt;
* Strength of Default (Out of the Box) Defenses&lt;br /&gt;
* Power and Ease of Learn Mode&lt;br /&gt;
* Types of Vulnerabilities it can prevent&lt;br /&gt;
* Ability to keep individual users constrained to exactly what they have seen in the current session&lt;br /&gt;
* Ability to be configured to prevent ANY specific problem (i.e., Emergency Patches)&lt;br /&gt;
* Form Factor: Software vs. Hardware (Hardware generally preferred)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also use [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls Best Practices: Use of Web Application Firewalls] to find out where and when to use a WAF and/or you may find &lt;br /&gt;
the [http://www.webappsec.org/projects/wafec/ Web Application Firewall Evaluation Criteria] useful for evaluating the performance and other characteristics of a WAF.&lt;br /&gt;
&lt;br /&gt;
The [[London Chapter WAF event]] held in 2006 has some comparative info amongst the WAF Vendors that participated in the event.&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application.&lt;br /&gt;
&lt;br /&gt;
==Well Known Open Source Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight]&lt;br /&gt;
* [http://www.modsecurity.org/ Breach - ModSecurity] &lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www.artofdefence.com/en/hyperguard/hyperguard.html art of defence - hyperguard]&lt;br /&gt;
* [http://www.breach.com Breach - WebDefend]&lt;br /&gt;
* [http://www.denyall.com/produits.html?set_lang=en Deny All - rWeb]&lt;br /&gt;
* [http://fortifysoftware.com/products/defender/ Fortify Software - Defender]&lt;br /&gt;
* [http://www.imperva.com/products/securesphere/web_application_firewall.html Imperva - SecureSphere™]&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.applicure.com Applicure - DotDefender]&lt;br /&gt;
* [http://www.radware.com/Solutions/Enterprise/Security/WebApplicationFirewall.aspx Radware AppWall]&lt;br /&gt;
* [http://www.armorlogic.com/ Armorlogic - Profense]&lt;br /&gt;
* [http://www.barracudanetworks.com/ns/products/web-application-controller-overview.php Barracuda Networks - Application Firewall]&lt;br /&gt;
* [http://www.bee-ware.net/en/product/i-sentry/ Bee-Ware - iSentry]&lt;br /&gt;
* [http://binarysec.com/ BinarySec - Application Firewall] &lt;br /&gt;
* [http://www.bugsec.com/index.php?q=WebSniper BugSec - WebSniper]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/ps9586/index.html Cisco - ACE Web Application Firewall]&lt;br /&gt;
* [http://www.citrix.com/English/ps2/products/product.asp?contentID=25636 Citrix - Application Firewall]&lt;br /&gt;
* [http://www.eeye.com/html/products/secureiis/index.html eEye Digital Security - SecureIIS]&lt;br /&gt;
* [http://www.f5.com/products/big-ip/product-modules/application-security-manager.html F5 - Application Security Manager]&lt;br /&gt;
* [http://forumsys.com/ Forum Systems - Xwall, Sentry]&lt;br /&gt;
* [http://www.webscurity.com/products.htm mWEbscurity - webApp.secure]&lt;br /&gt;
* [http://www.phion.com/INT/products/websecurity/Pages/default.aspx Phion / Visonys - Airlock]&lt;br /&gt;
* [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS  - Web Application Firewall]&lt;br /&gt;
* [http://www.xtradyne.com/ Xtradyne - Application Firewalls]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[Category: Control]]&lt;/div&gt;</summary>
		<author><name>Meir Michaeli</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81276</id>
		<title>Web Application Firewall</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Firewall&amp;diff=81276"/>
				<updated>2010-04-13T12:36:01Z</updated>
		
		<summary type="html">&lt;p&gt;Meir Michaeli: /* Other Well Known Commercial Tools Of This Type */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Countermeasure}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as [[Cross-site Scripting (XSS)]] and [[SQL Injection]]. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&lt;br /&gt;
&lt;br /&gt;
A far more detailed description is available at [http://en.wikipedia.org/wiki/Application_firewall Wikipedia]&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses==&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Very Few False Positives (i.e., should NEVER disallow an authorized request)&lt;br /&gt;
* Strength of Default (Out of the Box) Defenses&lt;br /&gt;
* Power and Ease of Learn Mode&lt;br /&gt;
* Types of Vulnerabilities it can prevent&lt;br /&gt;
* Ability to keep individual users constrained to exactly what they have seen in the current session&lt;br /&gt;
* Ability to be configured to prevent ANY specific problem (i.e., Emergency Patches)&lt;br /&gt;
* Form Factor: Software vs. Hardware (Hardware generally preferred)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also use [https://www.owasp.org/index.php/Category:OWASP_Best_Practices:_Use_of_Web_Application_Firewalls Best Practices: Use of Web Application Firewalls] to find out where and when to use a WAF and/or you may find &lt;br /&gt;
the [http://www.webappsec.org/projects/wafec/ Web Application Firewall Evaluation Criteria] useful for evaluating the performance and other characteristics of a WAF.&lt;br /&gt;
&lt;br /&gt;
The [[London Chapter WAF event]] held in 2006 has some comparative info amongst the WAF Vendors that participated in the event.&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/Category:OWASP_Stinger_Project OWASP Stinger Project] is not a full blown WAF, but it is a strong Java/J2EE input validation filter that can be put in front of your application.&lt;br /&gt;
&lt;br /&gt;
==Well Known Open Source Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.aqtronix.com/?PageID=99 AQTronix - WebKnight]&lt;br /&gt;
* [http://www.modsecurity.org/ Breach - ModSecurity] &lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www.artofdefence.com/en/hyperguard/hyperguard.html art of defence - hyperguard]&lt;br /&gt;
* [http://www.breach.com Breach - WebDefend]&lt;br /&gt;
* [http://www.denyall.com/produits.html?set_lang=en Deny All - rWeb]&lt;br /&gt;
* [http://fortifysoftware.com/products/defender/ Fortify Software - Defender]&lt;br /&gt;
* [http://www.imperva.com/products/securesphere/web_application_firewall.html Imperva - SecureSphere™]&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.applicure.com Applicure - DotDefender]&lt;br /&gt;
* [http://www.radware.com Radware AppWall]&lt;br /&gt;
* [http://www.armorlogic.com/ Armorlogic - Profense]&lt;br /&gt;
* [http://www.barracudanetworks.com/ns/products/web-application-controller-overview.php Barracuda Networks - Application Firewall]&lt;br /&gt;
* [http://www.bee-ware.net/en/product/i-sentry/ Bee-Ware - iSentry]&lt;br /&gt;
* [http://binarysec.com/ BinarySec - Application Firewall] &lt;br /&gt;
* [http://www.bugsec.com/index.php?q=WebSniper BugSec - WebSniper]&lt;br /&gt;
* [http://www.cisco.com/en/US/products/ps9586/index.html Cisco - ACE Web Application Firewall]&lt;br /&gt;
* [http://www.citrix.com/English/ps2/products/product.asp?contentID=25636 Citrix - Application Firewall]&lt;br /&gt;
* [http://www.eeye.com/html/products/secureiis/index.html eEye Digital Security - SecureIIS]&lt;br /&gt;
* [http://www.f5.com/products/big-ip/product-modules/application-security-manager.html F5 - Application Security Manager]&lt;br /&gt;
* [http://forumsys.com/ Forum Systems - Xwall, Sentry]&lt;br /&gt;
* [http://www.webscurity.com/products.htm mWEbscurity - webApp.secure]&lt;br /&gt;
* [http://www.phion.com/INT/products/websecurity/Pages/default.aspx Phion / Visonys - Airlock]&lt;br /&gt;
* [http://www.protegrity.com/WebApplicationFirewall Protegrity - Defiance TMS  - Web Application Firewall]&lt;br /&gt;
* [http://www.xtradyne.com/ Xtradyne - Application Firewalls]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
[[Category: Control]]&lt;/div&gt;</summary>
		<author><name>Meir Michaeli</name></author>	</entry>

	</feed>