Cloud WAF
Cloud WAF
Relying on Baishan Canvas, a global edge cloud network, the Baishan Cloud WAF solution is established to provide vulnerability intrusion protection for online services such as Web/API/APP, effectively defending and intercepting attacks such as OWASP, CVE, CNVD, 0day/1day, etc. to economically and efficiently enhance the security, reliability, and connectivity of customer business in government, medical, education, finance, government and enterprises, gaming, and other fields.

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages
More Accurate Protection

More Accurate Protection

The joint protection of rules engine, AI engine, semantic engine, and the integrated global threat intelligence database such as massive botnet, scanner feature library, and crawler library collected by Baishan Canvas global network accurately identify and process illegal requests to protect business security.
More Stable Service

More Stable Service

Based on cloud-native technology and global heterogeneous resource scheduling technique, it realizes distributed multi-active disaster tolerance, tenant-level, and process-level micro-isolation and instantly switches to healthy secure edge node tenant processes when nodes and processes fail, achieving no perception of user access.
Faster Response

Faster Response

By applying edge Cloud WAF capabilities to Baishan globally distributed edge nodes, the first-mile and last-mile access links are significantly shortened to provide quick and secure service to users.
More Reliable Online Business

More Reliable Online Business

Based on intelligent origin backup of remote disaster tolerance, priority response, content analysis, and other techniques, automatically backup of the latest content of the origin, realizing remote disaster backup without origin modification, keeping the business online even when origin fails.
Flexible Capacity Expansion And Reduction, More Economical

Flexible Capacity Expansion And Reduction, More Economical

The service node distribution can be flexibly adjusted according to the business demand to provide a service guarantee for on-demand business capacity expansion and reduction.
More Flexible And Adaptable To Various Cloud Scenarios

More Flexible And Adaptable To Various Cloud Scenarios

Micro-service architecture can adapt flexibly to various cloud scenarios such as public, hybrid, and private clouds.
Product Feature
undefined undefined

Vulnerability Intrusion Protection

Comprehensive coverage of OWASP top 10 Web application vulnerability attacks, effectively defense against SQL injection, cross-site scripting, remote command injection, Webshell upload, vulnerability scanning, and other common Web attacks, and real-time updating 0day vulnerability and rule database.
undefined undefined

Advanced Escape Detection

Our product effectively avoids all forms of WAF bypass by identifying wildcard deformation, multiple encoding, and other advanced attack escape methods.
undefined undefined

Honeypot Trapping

Micro-isolation honeypots can effectively trap hacker attacks and actively identify and intervene in attack methods to avoid damage to real business.
undefined undefined

Intelligent Origin Backup

Intelligent origin backup automatically synchronizes the content of the origin so that the service can still be maintained to the public in case of origin failure or tampering.
undefined undefined

IPv6 Compliance Rebuilding

Self-adaptive IPv6 dual stack helps customers achieve fast compliance.
undefined undefined

Sensitive Data Leakage Prevention

Sensitive data is masked to prevent data leakage.
Application Scenarios

Anti-Vulnerability Intrusion

Security And Compliance

Anti-Vulnerability Intrusion

Security And Compliance

Provide anti-vulnerability intrusion protection for website/APP/API business in government and enterprise, healthcare, education, e-commerce, non-banking finance, portals, etc. Comprehensively detect and intercept common security threats of OWASP, malicious scanners, IPs, Trojan horse, etc., effectively prevent and manage security issues such as sensitive data being dragged from the library and tampered with.

undefined

Our product can help website/APP/API business in government and enterprise, health care, education, e-commerce, non-banking finance, portal, etc., to achieve fast compliance.

undefined
Customer Case