Enter Title


The threats of web-based attacks from hackers are getting more frequent and more sophisticated. Every web application is at risk—from companies processing billions of dollars in credit card transactions, to those processing very little. Whether you use a commercial application or open source for eCommerce processing, your business is vulnerable.

Protect your web servers and databases from malicious online attacks by investing in a web application firewall (WAF). A network firewall's open port allows Internet traffic to access your websites, but it can also open up servers to potential application attacks (database commands to delete or extract data are sent through a web application to the backend database) and other malicious attacks.

XcellHost's enterprise-grade PCI-certified Web Application Firewall (WAF) ensures that your website or application is always secure and available. Based on Imperva's industry-leading technology and experience and using a "Security as a Service" approach, XcellHost's security experts manage and update the WAF 24x7 to ensure that you are always protected against new and emerging threats. XcellHost's WAF can be set up and configured within a matter of minutes by changing your website's DNS setting.

A WAF is a physical device that sits behind your virtual or dedicated firewall and scans incoming traffic to web servers for any malicious attacks that may affect the web application server. A WAF uses dynamic profiling to learn what kind of traffic and users are normal, and what could potentially be malicious traffic.

  • Provides an extra layer of protection that a network firewall and IDS cannot
  • Can prevent attacks and data exposure before it happens by detecting malicious users and requests for information
  • Dynamic profiling means the WAF can set criteria for accepted traffic based on user behavior
  • Can identify malicious sources to stop automated attacks

Protection against Web Application Vulnerabilities

  • SQL Injection
    SQL injection is a code injection technique that exploits a security vulnerability in the database layer of an application.
  • Illegal Resource Access
    Illegal resource access is a web application attack used to access restricted resources and sensitive pages on your web server.
  • Cross-Site Scripting (XSS)
    Cross-site scripting is a web application attack that exploits vulnerabilities on a visitor's browser, often leading to data theft and potential installation of malicious software on visitors computers.
  • Remote File Inclusion
    Remote file inclusion allows an attacker to include a remote file usually through a script on the web server.

Why You Need A Web Application Firewall

  • Threats are evolving
    Hackers are getting smarter, better financed, more automated and more criminal.
  • Web applications are the low-hanging fruit
    Hackers know exactly what to look for, and in many cases you never even know they were there until the damage is done.
  • Security measures don't prevent attacks
    Common tools like firewalls, intrusion prevention systems, and anti-virus aren't designed for attacks at the application level.
  • Web applications are growing
    Applications are increasingly designed to run on browsers and the cloud, multiplying threats with each passing day.
  • All companies have a lot to lose
    Companies with an online presence are also prime targets for criminals using their sites as a launching pad for scams.

Back to Top