Enter your details and we will get back to you
or call 03-9204600

דף הבית » en » waf-services

Triple C offers Radware’s WAF service that provides a firewall to protect websites and web-based applications against hacker attacks and malicious activity by automatic bots. Hacker attacks and the malicious activity of automatic bots may cause a lot of damage in the form of information theft, defacement of the website, and the use of the website to hack into the computers of the users of the application. The WAF cloud service is built from advanced and innovative technologies capable of adapting to the evolving threats of the market. This service, based on Radware's world-leading WAF technology, meets the strictest information security standards in the world: PCI v.3.1–DSS standard, the quality standards for information security ISO27001, ISO27032, ISO28000, and certified by ICSA Labs.

Interested? You can buy it!

Enter our online cloud store and purchase
from the range of solutions offered by Triple C!

Service Capabilities

  • Complete blocking of all types of existing hacker attacks, including SQL Injection attacks to steal or corrupt the database, attacks by forging cookies to break into the website without legal authorization, attacks to recover information, blocking the ability to illegally download credit card numbers from the website, and more.
  • A unique ability to identify and block zero-day web attacks that exploit new loopholes that are discovered on a regular basis, and for which there are no protection signatures yet.
  • Unique ability to block hacker attacks and malicious activity of automatic bots that change their IP addresses dynamically (to avoid IP Blacklisting) by digital fingerprinting of the computer they use (IP-agnostic Device Fingerprinting).
  • A unique ability to automatically build an optimal Protection Policy for new applications.
  • The service is activated through a simple DNS change, without additional hardware or software installation.
  • The service includes a unique smart system that learns and remembers the normal usage patterns of the website or application, and blocks non-routine malicious activities that deviate from the normal usage patterns.
  • This service is capable of analyzing potential weaknesses of the system and assign the ideal protection solution.
  • The service enables real-time monitoring and detection of hacker attacks and malicious or unusual activity on web-based websites or applications.
התקפות סייבר, הגנת מידע, הגנת סייבר, תקיפה, אירועי סייבר

How It Works?

Extra Services

Trend Micro

Trend Micro's protection service provides complete protection against viruses, hackers, spyware, dangerous websites and data theft.

For self-purchase in our online cloud store– click here

For more details 🡪

Dedicated backup service

The Synology Backup Service of Triple C is a dedicated backup service for the customer installed in the Triple C facility intended for backing up large volumes

For more details 🡪

Firewall

Triple C Firewall services are offered in three configurations: basic, advanced and professional, which are basically included in every machine or virtual environment in the Triple C cloud.

For self-purchase in our online cloud store – click here