AWS WAF

AWS WAF

Amazon
+
+

Related Products

  • Cloudflare
    1,948 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • AI Docs
    15 Ratings
    Visit Website
  • 1Password
    16,550 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Retool
    567 Ratings
    Visit Website
  • Feroot
    27 Ratings
    Visit Website
  • Kamatera
    152 Ratings
    Visit Website

About

AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules. With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives.

About

ByteHide is an all-in-one, developer-first application security platform designed to protect code, secrets, data, and runtime environments, while minimizing your dependencies and risk. It integrates seamlessly with your development workflows and communication tools, delivering key security insights and alerts without disrupting productivity. Operating under a zero-knowledge model, ByteHide uses client-side encryption so only you hold the keys, and it never stores your source code. With minimal, typically read-only permissions, you remain fully in control of what repositories and data sources are analyzed. ByteHide’s core tools include Shield for next-generation code obfuscation and anti-tampering, Secrets for AI-powered secret detection and decentralized management, Monitor for real-time runtime threat detection, and Radar for unified SAST/SCA scanning. These tools run in secure, isolated environments and automatically mask sensitive personal data.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone looking to protect their web applications from common web exploits

Audience

DevOps engineers, and security teams requiring a solution to protect code, secrets, runtime, dependencies, and logs without sacrificing control, performance, or developer experience

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

€39.99 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/waf/

Company Information

ByteHide
Spain
www.bytehide.com

Alternatives

Alternatives

AppWall

AppWall

Radware
Dotfuscator

Dotfuscator

PreEmptive
JSDefender

JSDefender

PreEmptive

Categories

Categories

Firewall Features

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Web Application Firewalls (WAF) Features

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
Dashboard
DDoS Protection
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Integrations

.NET
AWS App Mesh
AWS Marketplace
Amazon Data Firehose
Chronicle SOAR
Elastic Observability
EmailAuth.io
HUMAN Bot Defender
Jira
MLM Protec
Mackerel
Microsoft Teams
New Relic
Sekoia.io
Slack
SolarWinds AppOptics
Symantec WAF
Temperstack
Veriti

Integrations

.NET
AWS App Mesh
AWS Marketplace
Amazon Data Firehose
Chronicle SOAR
Elastic Observability
EmailAuth.io
HUMAN Bot Defender
Jira
MLM Protec
Mackerel
Microsoft Teams
New Relic
Sekoia.io
Slack
SolarWinds AppOptics
Symantec WAF
Temperstack
Veriti
Claim AWS WAF and update features and information
Claim AWS WAF and update features and information
Claim ByteHide and update features and information
Claim ByteHide and update features and information