What if a Targeted Cyber Attack Never Reached Your Site?

A web application security breach can have devastating consequences, often leading to the loss of critical data or theft of confidential information. The most effective way to avoid these kinds of attacks? Stop the attack from reaching your site in the first place! This is exactly what a WAF does… building a fence on the outside your WordPress borders – monitoring, filtering, and blocking malicious HTTP traffic BEFORE it ever hits your server/site.

25% Faster Than The Leading Plugin-Based Firewall (We Tested it!)

Unlike many other providers, our WAF is completely free to use with our hosting and is already tuned for WordPress. It also uses fewer server resources by not running in PHP and doesn’t need to touch a line of code – meaning it won’t significantly affect your site’s performance.

In fact, our testing puts it around 25% faster than the leading WordPress plugin based firewall! Also, many firewalls are not optimized specifically for WP, either have most rules off by default or cause false alarms.

Another advantage our WAF has over cloud firewalls is that it’s difficult to prevent attackers from bypassing a cloud firewall completely. As a result, most people skip this crucial step, leaving your site vulnerable.

Armed With Over 300 Highly Optimized, Managed Firewall Rules (Updated Daily)

Our WAF comes armed with a highly optimized, managed ruleset, containing more than 300 firewall rules (or policies). These policies combine rule-based logic, parsing, and signatures, enabling them to detect and prevent a range of web application attacks.

Our firewall is always learning, and updated every day with new rules. Additional rules are added based on the usage and intelligence of our internal network of sites. This means every new threat (or false alarm) allows your WAF to grow smarter and stronger – ensuring optimal protection, and improved accuracy.

OWASP Attacks Are Your WAFs Specialty

Included as part of our WAFs 300+ ruleset, is protection against common “OWASP” top 10 attacks – including cross-site request forgeries, cross-site-scripting (XSS), file inclusions, SQL injections, and more.