Atomic ModSecurity Rules Description

Atomic ModSecurity Rules are a comprehensive WAF set that includes hundreds of ModSecurity WAF Rules to protect applications from web attacks. They are fully supported by expert support.

WAF Rules to Strengthen ModSecurity against:
- SQL injection
- Cross-site scripting
Cross-site request forgery
- Coding abuse
- Protocol abuse
Unicode and UTF-8 Attacks
- HTTP smuggling
- Path recursion
Web spam
Shells
- And many more


* Atomicorp is the creator of the first ModSecurity rules set. They also maintain the largest number active WAF rules that support all server types, from Tomcat and Nginx through IIS, LightSpeed, Apache and IIS.

* Atomic ModSecurity Rules, the most comprehensive WAF rules set in the industry and have the highest quality. Expert support is available.


****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Atomicorp
Year Founded:
2015
Headquarters:
United States
Website:
www.atomicorp.com/atomic-modsecurity-rules/
Update This Listing

Media

Atomicorp ModSecurity Rules - WAF Rules

Atomicorp ModSecurity Rules - WAF Rules

Recommended Products
Passwordless Authentication and Passwordless Security Icon
Passwordless Authentication and Passwordless Security

Identity is everything. Protect it with Duo.

It’s no secret — passwords can be a real headache, both for the people who use them and the people who manage them. Over time, we’ve created hundreds of passwords, it’s easy to lose track of them and they’re easily compromised. Fortunately, passwordless authentication is becoming a feasible reality for many businesses. Duo can help you get there.
Get a Free Trial

Product Details

Platforms
SaaS
Types of Training
Live Training (Online)
Customer Support
Business Hours

Atomic ModSecurity Rules Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Atomic ModSecurity Rules User Reviews

Write a Review
  • Previous
  • Next