Hyperscale WAF

Protect your web applications from malicious requests and known vulnerability exploits:

Attackers systematically exploit vulnerabilities in web applications to infiltrate vulnerable systems and manipulate, steal or delete data. The Myra Hyperscale Web Application Firewall (WAF) blocks malicious requests before they reach your servers.

This is what the Myra Hyperscale WAF does for you 


Security for vulnerable systems

With dedicated and constantly updated rule sets, Myra also protects against attacks on unprotected/unpatched systems as well as on legacy applications that cannot be secured in any other way. This allows you to secure your web applications in the short term even against zero-day vulnerabilities such as Log4Shell.

  • Myra experts support you in the optimal adjustment of your WAF rule sets

  • Fast integration into your IT infrastructure without additional hardware or software  


Protection against data theft, account takeover and sabotage

Myra filters, monitors and controls the inbound and outbound HTTP/S traffic of your web applications at content level. Thus, the Hyperscale WAF forms an upstream protection against some of the attack techniques described in the OWASP Top 10 and other attacks.

  • Included default rule sets are aligned with the OWASP top 10 risks   

  • Easy configuration and rule management via a dashboard (web GUI)

  • Protection for all web applications and APIs regardless of hosting model  

Myra Hyperscale WAF


HTTP/S request filtering

The filtering of HTTP/S requests is ready to use and almost infinitely scalable. 

Comprehensive rule sets

Rule sets managed and constantly updated by Myra protect against the most common attack risks (OWASP Top 10) as well as zero-day exploits. Via editor you can also define your own rule sets with hierarchies or import already existing rule sets from another WAF. 

Managed WAF

Myra experts will analyze your web resources and assist you in creating customized rule sets. 

Web-based rule management

Myra provides web-based rule management for pre- and post-origin traffic. This gives you complete control over all rule settings, which include numerous conditions and actions for the request or response phase. 

Configuration via API

You can fully configure and control the Myra Hyperscale WAF via an API. 


Header modification

Adjustments of headers in request and response phases 

Header rewriting

Header/response rewriting without adjustments to the web application 

Custom error pages

The Myra Hyperscale WAF supports the delivery of customized error pages that are adapted to your corporate design.


Freely configurable alerting via e-mail, API calls or SMS

Myra protects your web applications from a wide range of threats 


Cross-site request forgery (CSRF)

Attackers make the user's browser send HTTP requests to the attacked website or web application to trigger unwanted actions.


Cross-site scripting (XSS)

In an XSS attack, cybercriminals inject malicious code into web applications by exploiting vulnerabilities, for example, to steal sensitive information.


SQL injection

In an SQL injection attack, cybercriminals exploit security vulnerabilities, for example, to inject manipulated commands or malicious code via input masks.



OWASP Top 10

The Open Web Application Security Project (OWASP) maintains a list of the top ten web application security risks. The current 2021 edition includes:

  • Broken access control

  • Cryptographic failures

  • Injection

  • Insecure design

  • Security misconfiguration

  • Vulnerable and outdated components

  • Identification and authentication failures

  • Software and data integrity failures

  • Security logging and monitoring failures

  • Server-side request forgery (SSRF)

Other Application Security products

DDoS Protection

Product in detail

High Performance CDN

Product in detail

Video Streaming

Product in detail

Analytics Data Lake

Product in detail

Deep Bot Management

Product in detail

Multi Cloud Load Balancer

Product in detail

Certificate Management

Product in detail

Why Myra Security?

Our key benefits at a glance

Comprehensive certification

Our technologies, services and processes are regularly audited and certified to the highest standards.

Made in Germany

As a company headquartered in Germany, Myra is legally compliant with the GDPR.

Local 24/7 Support

Get professional help from our IT experts from the Myra SOC (Security Operations Center).

Protect your business now: 
Request a non-binding offer 


All Myra Services can be implemented at short notice. Contact our 24/7 emergency support so that our team of experts can support you immediately in the event of an attack.

Emergency Form


See for yourself:  
Arrange a free consultation

Our team of experts will be happy to advise you individually and develop a customized solution for your company.

Request consultation now
Price request for the following Myra services


All information on data processing can be found in our privacy policy.