Get a free application, infrastructure and malware scan report - Scan Your Website Now

Indusface Blog

Calender IconMarch 17, 2015
Clock Icon 6 min Read
NGFWs vs WAF [Guide]

How many types of firewalls are there? Is a single firewall enough to all your problems? Find out answers to most common firewall questions with Indusface

Read More...
Calender IconMarch 13, 2015
Clock Icon 3 min Read
Businesses Lose Money and Time by Blocking Genuine Traffic

Traffic is valuable for sales, opportunities and prospects. What if you security mechanism is unknowingly blocking real-traffic. Find out more about it.

Read More...
Calender IconMarch 11, 2015
Clock Icon 4 min Read
Online Payments Security: Loopholes That Can Bring You Down

In online transactions, security is the only way to win customers in the business. Find the problems that should be resolved with online payment security.

Read More...
Calender IconMarch 9, 2015
Clock Icon 3 min Read
FREAK Vulnerability

It’s the twisted, forgotten nightmare. A security loophole from the early 90s, which nobody really remembers, has come back to haunt around 33% of all the websites and servers across the world

Read More...
Calender IconMarch 4, 2015
Clock Icon 4 min Read
2014 Browser Vulnerability Review

Earlier this year, French security firm VUPEN netted a whopping $400, 000 in the HP Tipping Point’s Zero Day Initiative as annual hacking contest .

Read More...
Calender IconMarch 3, 2015
Clock Icon 6 min Read
OWASP Top 10 Vulnerabilities Security Guide for Every Website

The OWASP Top 10 web vulnerabilities SQL injection and Cross Site Scripting (XSS) battle for positioning as the worst of the worst.

Read More...
Calender IconFebruary 19, 2015
Clock Icon 3 min Read
The Cost of Cybercrimes for Businesses

Businesses simply cannot afford to wait for cybercrime to happen. Learn about the risks and ways to mitigate them before it’s late.

Read More...
Calender IconFebruary 11, 2015
Clock Icon 4 min Read
PM’s Digital India Vision: The Security Challenges

Prime Minster Narendra Modi’s Digital India Campaign has the potential to be one of the most transformative programs launched in recent times.

Read More...
Calender IconFebruary 9, 2015
Clock Icon 6 min Read
7 Common Website Security Mistakes

We are sharing with you a list of top 7 security mistakes that if avoided by coders, can save many a sleepless nights. With no ulterior intentions whatsoever,

Read More...
Calender IconJanuary 30, 2015
Clock Icon 3 min Read
All you need to know about Ghost Vulnerability

CVE-2015-0235 is being called the GHOST Vulnerability as it exploits glibc’s GetHOST functions. It basically affects Linux glibc or GNU C library on versions prior to glibc-2.18. Now, GNU C Library is a core part of the Linux operating system in glibc 2.2 to glibc 2.17

Read More...
Calender IconJanuary 12, 2015
Clock Icon 5 min Read
This New Year not only your resolutions, but your PCI Requirements also needs to be updated

Payment Card Industry Data Security Standards (PCI DSS) guidelines- Often seen as just another mandatory list to be checkmarked, PCI 3.0 is here to make that change.

Read More...
Calender IconDecember 12, 2014
Clock Icon 3 min Read
Gandhi and Web Application Security: What and How?

Gandhi and application security? Here are some of his Indusface favorites that can inspire security in your organization.

Read More...
Managed WAF

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Get Started for Free Request a Demo

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.

A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™

The reviews and ratings are in!