bots can be fended off in DDoS attacks.
malicious Layer 7 requests are blocked by Myra on average per customer per year.
Service Level Agreement (SLA) for service availability.
“97 % of DACH companies reported at least one cyber incident in the past year.” - Deloitte Global Future of Cyber Survey 2024
Key features
Whether you run your web applications in your own data centre, at a hosting service provider or in public/private cloud instances, the Myra Hyperscale WAF serves as an upstream protective wall in all deployment scenarios – efficiently and cost-effectively.
Filtering of HTTP/S requests is ready to use with the Web Application Firewall from Myra and is almost infinitely scalable. WAF rules are defined based on simple comparisons or regular expression (regex).
If you wish, the Myra experts can support you in analysing your web resources and creating customized rules – benefit from the best possible protection without sacrificing productivity.
The Myra Hyperscale WAF supports the display of individual error pages that are adapted to your corporate design. Provide your customers with concrete added value through further details and maintenance information.
WAF rules managed and constantly updated by Myra protect against the most frequent attack risks (OWASP Top 10) and zero-day exploits. The defence against XSS, CSRF, SQL injection, and directory traversal is provided by included rule sets.
The Myra Web Application Firewall allows header/response rewriting without adjustments to the application. Likewise, adjustments to the headers in request and response phases are possible.
You can either configure the Myra Hyperscale WAF via an easy-to-use web interface or control the protection solution completely via an API in your existing system landscape.
Stay informed – the Myra Web Application Firewall automatically informs you about incidents via freely configurable alerting by email, API calls or SMS.
Myra offers web-based rule management for pre- and post-origin traffic. This gives you complete control over all rule settings, which include numerous conditions and actions for the request or response phase.
Our comprehensive security solutions protect your business from the latest threats.
Get the solution that is perfectly tailored to your needs.
You can expect a response within 24 hours.
Our cloud approach means our products can be set up in no time.
WAF security solutions protects web applications from attacks via the Hypertext Transfer Protocol (HTTP/S). Unlike classic firewalls and intrusion detection systems (IDS), a WAF service examines communication directly at the application level. Incoming requests and the responses of the web server are examined and checked for suspicious patterns. Requests that are classified as harmful are blocked by the protection solution – this ensures protection of the applications without the need for adjustments to the application itself.
The cost of solutions for WAF cyber security varies depending on the deployment model, provider and required number of domains to be protected. WAF solutions are available either as a Security-as-a-Service solution from the cloud or as self-managed software or hardware appliance for operation in a company's data center. For most companies, security-as-a-service models for WAF solutions are generally more favourable than in-house solutions in their own data center. In this case, the WAF providers take over the initial implementation of the protection solution as well as the continuous operation and necessary configuration adjustments. If desired, cybersecurity companies can also create customized rule sets to establish the highest level of security for the customer's domains. In contrast, the use of in-house solutions (whether software- or hardware-based) requires the necessary technical expertise within the company to ensure efficient implementation and configuration of the protection solution. Incorrectly configured systems for WAF network security offer attackers weak points for their attacks and can limit the functionality of the behindlying web applications. Accordingly, the required skilled personnel must either be available or hired, which is associated with high costs due to the tight job market and can delay the commissioning. According to Bitkom, 137,000 positions for IT experts across all sectors are unfilled in Germany (as of Nov. 2022). On average, it takes seven months to find suitable candidates for vacancies.
A web application firewall protects web servers from attacks that occur via the Hypertext Transfer Protocol (HTTP/S). By monitoring the traffic, a web application firewall closes various general and customer- or application-specific security gaps of the web application such as addressable risks from the OWASP Top 10, zero-day exploits, SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), file inclusion, and directory traversal.