The WebOrion™ Protector sits in between the visitor and your web server, inspecting all web traffic going in and out of your website.
If the WebOrion™ Protector detects any malicious requests, it will stop the traffic before it reaches your web server, keeping it safe from exploits.
Any blocked requests will show up in the Firewall Event Log, where you can review the detected threats and attack attempts to your website to further blacklist bad IP addresses.
|Web Application Firewall|
| Protection against the OWASP Top Ten and other generic threats|
Protects against SQL injections, XSS, LFI, RFI, RCE attacks.
| Protection against information disclosure|
Prevents display of SQL error messages, directory listings, etc.
|Platform-specific protection (WordPress, Joomla!, Drupal, etc.)|
|Block bad bots and IP addresses|
|Searchable real-time firewall event log|
|Firewall event log retention||7 days||7 days||Contact us|
|Custom WAF whitelisting rules||3 rules||100 rules|
|Custom WebOrion™ Protector rules|
| Basic DDOS - Layer 3 & 4 Protection|
Protects against common attacks such as UDP Flood, Ping of Death, SYN Flood. DDOS attacks will not be counted towards your monthly data transfer
| Advanced DDoS- Layer 3, 4 & 7 Protection|
Protect against Layer 7 HTTP/HTTPS attacks. DDOS attacks will not be counted towards your monthly data transfer
|Contact us||Contact us||Contact us|