16 Integrations with AWS WAF

View a list of AWS WAF integrations and software that integrates with AWS WAF below. Compare the best AWS WAF integrations as well as features, ratings, user reviews, and pricing of software that integrates with AWS WAF. Here are the current AWS WAF integrations in 2024:

  • 1
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 2
    Amazon CloudFront
    Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment. CloudFront is integrated with AWS – both physical locations that are directly connected to the AWS global infrastructure, as well as other AWS services. CloudFront works seamlessly with services including AWS Shield for DDoS mitigation, Amazon S3, Elastic Load Balancing or Amazon EC2 as origins for your applications, and Lambda@Edge to run custom code closer to customers’ users and to customize the user experience. Lastly, if you use AWS origins such as Amazon S3, Amazon EC2 or Elastic Load Balancing, you don’t pay for any data transferred between these services and CloudFront. Customize the code you run at the AWS content delivery network (CDN) edge using serverless compute features to balance cost, performance, and security.
  • 3
    SolarWinds AppOptics
    SolarWinds® AppOptics™ is a simple, powerful, and affordable SaaS-based infrastructure & application monitoring tool for custom on-premises, cloud, and hybrid systems. By enabling quick identification of performance problems across the stack from the application, to underlying infrastructure, down to the line of code, AppOptics helps reduce MTTR. AppOptics was thoughtfully designed for simple setup and use by all IT professionals with powerful features to quickly and automatically pinpoint performance issues removing the guesswork from troubleshooting. AppOptics enables you to align infrastructure and application performance objectives side by side with business objectives.
    Starting Price: $9.99/host/month*
  • 4
    Mackerel

    Mackerel

    Hatena

    The server monitoring platform we always wanted. Precisely tuned graphs, role-based architecture, fully customizable notifications, congruency with autoscale, and other innovative features. Driving deep innovation in DevOps and building upon the concept of Infrastructure as Code. With the intuitive UI and effective API of a server monitoring SaaS, building a more automated infrastructure foundation and achieving comprehensive monitoring is fully possible. Finally cut out unnecessary time-eating busy work and get back to focusing on developing great services. Mackerel's got everything you need to make the very most of your resources.
    Starting Price: $6.32 per month per host
  • 5
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
    Starting Price: $16 per month
  • 6
    AWS App Mesh

    AWS App Mesh

    Amazon Web Services

    AWS App Mesh is a service mesh that provides application-level networking to facilitate communication between your services across various types of computing infrastructure. App Mesh offers comprehensive visibility and high availability for your applications. Modern applications are generally made up of multiple services. Each service can be developed using various types of compute infrastructure, such as Amazon EC2, Amazon ECS, Amazon EKS, and AWS Fargate. As the number of services within an application grows, it becomes difficult to pinpoint the exact location of errors, redirect traffic after errors, and safely implement code changes. Previously, this required creating monitoring and control logic directly in your code and redeploying your services every time there were changes.
    Starting Price: Free
  • 7
    EmailAuth.io

    EmailAuth.io

    EmailAuth

    EmailAuth® is a TIER 1 OEM and a market leader in Email Authentication. Available 100% on-premise, or in-country cloud (local cloud) or on AWS/AZURE/GCP globally - We make it easy to unleash the power of email authentication. It is an anti-spoofing, anti-impersonation, and anti-phishing platform that ensures that no one can abuse your domains online. If anyone in the world spoofs your domains, EmailAuth collates data from all across the world to ensure that even a single unauthorized email is caught and rejected by global recipients of the world. It even extracts the IP of the sender, so this threat intelligence can be used to block the attacker across your cyber security fabric (SOAR capable). #StopGettingPhished #BeSpoofProof
  • 8
    NopeCHA

    NopeCHA

    NopeCHA

    AI for automatic captcha recognition. Automatically solve reCAPTCHA, hCaptcha, FunCAPTCHA, AWS WAF, and text CAPTCHA using AI. Free for personal use and works on all websites. We use state-of-the-art deep learning algorithms by Google, Meta, Microsoft, and NVIDIA AI. When you encounter a captcha challenge, it is solved in the cloud, and our active learning pipeline automatically and continuously improves the AI. Simply put, as more users use our extension, our AI gets better at solving captchas. When new captcha types are added, our AI learns to solve them in real time! Browser extension and Token API are undetected on all sites. Increased quota, zero usage restrictions, and 24/7 customer support. All of our revenue goes to AI research and building AI-ASIC data centers worldwide. Compatible with browser automation tools including Selenium, Puppeteer, and Playwright. Swift setup with our browser extension.
    Starting Price: $4.99 per month
  • 9
    AWS Firewall Manager
    AWS Firewall Manager is a security management service which allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organization. As new applications are created, Firewall Manager makes it easy to bring new applications and resources into compliance by enforcing a common set of security rules. Now you have a single service to build firewall rules, create security policies, and enforce them in a consistent, hierarchical manner across your entire infrastructure. Using AWS Firewall Manager, you can easily roll out AWS WAF rules for your Application Load Balancers, API Gateways, and Amazon CloudFront distributions. Similarly, you can create AWS Shield Advanced protections for your Application Load Balancers, ELB Classic Load Balancers, Elastic IP Addresses and CloudFront distributions. Finally, with AWS Firewall Manager, you can enable security groups for your Amazon EC2 and ENI resource types in Amazon VPCs.
  • 10
    AWS Elastic Load Balancing
    Elastic Load Balancing automatically routes incoming application traffic across multiple destinations, such as Amazon EC2 instances, containers, IP addresses, Lambda functions, and virtual appliances. You can control the variable load of your application traffic in a single zone or in multiple Availability Zones. Elastic Load Balancing offers four types of load balancers that have the necessary level of high availability, automatic scalability, and security to make your applications fault tolerant. Elastic Load Balancing is part of the AWS network, with native knowledge of fault limits like AZ to keep your applications available in one region, without requiring Global Server Load Balancing (GSLB). ELB is also a fully managed service, which means you can focus on delivering applications and not installing fleets of load balancers. Capacity is automatically added and removed based on the utilization of the underlying application servers.
    Starting Price: $0.027 USD per Load Balancer per hour
  • 11
    AWS Shield

    AWS Shield

    Amazon

    AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced. All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.
  • 12
    Symantec WAF

    Symantec WAF

    Broadcom

    Symantec Web Application Firewall (WAF) and Reverse Proxy, built on the industry-leading ProxySG platform, secure and accelerate your mobile and web applications. Web and mobile applications are being used for nearly every aspect of business operation and are becoming the trusted environments for mission-critical business applications. Consequently, web server infrastructures are facing an increasing number of complex threats that Intrusion Prevention Systems, Load Balancers and Next-Generation Firewalls can no longer address. Fortunately, Symantec Web Application Firewall (WAF) and Reverse Proxy combat these new challenges head-on, providing robust security with next-generation content nature detection engines, high performance content delivery, and operational simplicity. Built on a secure proxy architecture, our solutions allow organizations to secure and accelerate their web mobile applications to end users, customers, employees and vendors.
  • 13
    MLM Protec

    MLM Protec

    MLM Protec

    MLMProtec has developed a robust, secure, and cloud-based MLM software built with the latest technology to provide the best user experience, tools, compensation systems, user back office, and security for your expanding business operations. Get a free quote and launch your MLM business within 30 days! Our team consists of industry experts, developers and entrepreneurs from top Network Marketing Companies with experience in launching successful start-ups and supporting established growing businesses. We are high-tech and high-touch with solutions for any size company. We offer a robust, secure, and cloud-based MLM software built with 21st-century technology to provide the best user experience, tools, compensation systems, user back office, security, and company admin for your expanding business operations. To provide a turnkey solution to launch, manage and grow your business. We give you 24/7 tech support and access to essential tools needed to support your demands.
  • 14
    Chronicle SOAR

    Chronicle SOAR

    Chronicle

    Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat.
  • 15
    Sekoia.io

    Sekoia.io

    Sekoia.io

    Sekoia.io’s new take reinvents traditional cybersecurity solutions. Anticipation through attacker knowledge is natively associated with the automation capabilities of detection and response to attacks. Sekoia.io gives back the advantage to cyber teams to face attackers. With Sekoia.io SOC platform, detect computer attacks, neutralize their impacts and protect your information system effectively, in real time and 360 degrees. Sekoia.io natively integrates attacker intelligence flows and automation capabilities to identify, understand and neutralize attacks quicker. This innovative approach gives teams time to focus on high value-added tasks. Sekoia.io covers your different environments to remove complexity and natively provides detection capabilities that do not depend on knowledge of the system to be protected.
  • 16
    PerimeterX Bot Defender
    PerimeterX Bot Defender is a behavior-based bot management solution that protects your websites, mobile applications and APIs from automated attacks, safeguarding your online revenue, reducing the risk of data breaches and improving operational efficiency. Automated bots can generate over 50% of the traffic to your website. Malicious bots can take over your users’ accounts, abuse your payment pages, hoard inventory or scrape your pricing and content. In addition to being a security threat, bots can also erode your competitive edge and skew your web analytics, leading to revenue loss and increased customer service costs. Bot Defender combines intelligent fingerprinting, behavioral signals and predictive analysis to detect bots on your web and mobile applications and API endpoints. With industry-leading accuracy, Bot Defender minimizes user friction and ensures a safe customer journey.
  • Previous
  • You're on page 1
  • Next