Want to learn more about our solutions, use cases and best practices for attack defense? In our download area you will find product sheets, fact sheets, white papers and case studies.
This is what the Myra Hyperscale WAF does for you
With dedicated and constantly updated rule sets, Myra also protects against attacks on unprotected/unpatched systems as well as on legacy applications that cannot be secured in any other way. This allows you to secure your web applications in the short term even against zero-day vulnerabilities such as Log4Shell.
Myra experts support you in the optimal adjustment of your WAF rule sets
Fast integration into your IT infrastructure without additional hardware or software
Myra filters, monitors and controls the inbound and outbound HTTP/S traffic of your web applications at content level. Thus, the Hyperscale WAF forms an upstream protection against some of the attack techniques described in the OWASP Top 10 and other attacks.
Included default rule sets are aligned with the OWASP top 10 risks
Easy configuration and rule management via a dashboard (web GUI)
Protection for all web applications and APIs regardless of hosting model
KEY FEATURES
The filtering of HTTP/S requests is ready to use and almost infinitely scalable.
Rule sets managed and constantly updated by Myra protect against the most common attack risks (OWASP Top 10) as well as zero-day exploits. Via editor you can also define your own rule sets with hierarchies or import already existing rule sets from another WAF.
Myra experts will analyze your web resources and assist you in creating customized rule sets.
Myra provides web-based rule management for pre- and post-origin traffic. This gives you complete control over all rule settings, which include numerous conditions and actions for the request or response phase.
You can fully configure and control the Myra Hyperscale WAF via an API.
Adjustments of headers in request and response phases
Header/response rewriting without adjustments to the web application
The Myra Hyperscale WAF supports the delivery of customized error pages that are adapted to your corporate design.
Freely configurable alerting via e-mail, API calls or SMS
Myra protects your web applications from a wide range of threats
Attackers make the user's browser send HTTP requests to the attacked website or web application to trigger unwanted actions.
In an XSS attack, cybercriminals inject malicious code into web applications by exploiting vulnerabilities, for example, to steal sensitive information.
In an SQL injection attack, cybercriminals exploit security vulnerabilities, for example, to inject manipulated commands or malicious code via input masks.
The Open Web Application Security Project (OWASP) maintains a list of the top ten web application security risks. The current 2021 edition includes:
Broken access control
Cryptographic failures
Injection
Insecure design
Security misconfiguration
Vulnerable and outdated components
Identification and authentication failures
Software and data integrity failures
Security logging and monitoring failures
Server-side request forgery (SSRF)
Other Application Security products
Our key benefits at a glance
Our technologies, services and processes are regularly audited and certified to the highest standards.
As a company headquartered in Germany, Myra is legally compliant with the GDPR.
Get professional help from our IT experts from the Myra SOC (Security Operations Center).
Want to learn more about our solutions, use cases and best practices for attack defense? In our download area you will find product sheets, fact sheets, white papers and case studies.
Protect your business now:
Request a non-binding offer
All Myra Services can be implemented at short notice. Contact our 24/7 emergency support so that our team of experts can support you immediately in the event of an attack.
Emergency Form
Our team of experts will be happy to advise you individually and develop a customized solution for your company.
Request consultation now