Open Telekom Cloud for Business Customers

Web Application Firewall (WAF)

Because web applications can be attacked in a variety of ways, a range of different protection mechanisms need to be implemented. Alongside basic security mechanisms on network level and Anti-DDoS, the Open Telekom Cloud also offers a Web Application Firewall.

The Web Application Firewall (WAF) acts as a shield for web apps and websites against multiple attackers such as SQL injection, malicious file execution, cross-site scripting (XSS), and more to keep them stable and secure. The WAF analyzes incoming requests and the response of the corresponding server in the Open Telekom Cloud, intelligently filtering out malicious traffic to safeguard data, ensure fast load times, and maintain uptime.

 A hand holding a smartphone which is displaying a magenta-colored shield.

Reasons for WAF in the Open Telekom Cloud

Icon of a medal with a CPU in the background.

Leading technology

WAF uses the industry-leading semantic and regex engines to help accurately identify threats and significantly improve threat detection rate of hackers and bad actors attempting to bypass application security.

Symbol of a magnifying glass searching for a virus.

Precise identification

WAF precisely identifies malicious traffic to stop attacks based on pre-configured and customized rules.

A virus-infected browser window with a line graph in the background.

Attack pattern detection

Using decoding methods to prevent bypass attempts, WAF detects a wide range of common attack patterns, such as SQL injection or XSS.

Key Features der WAF

Motherboard with a hologram depicting a padlock.

Comprehensive web protection

A built-in extensive database of attack signatures detects and blocks dozens of common web attacks, such as SQL injection, XSS attacks, and webshells. Multi-engine cluster deployment and 24/7 monitoring ensure zero service interruption.

Symbol of computer software with a checkmark

Data Masking

Masks sensitive data during attacks to prevent data leakage.

Symbol of a shield labeled with "cc"

Challenge Collapsar (CC) Attack Protection

Configures rate limiting policies based on IP addresses or cookies to mitigate CC attacks.

Symbol of a shield adorned with a magnifying glass.

Precise Protection

Groups common HTTP fields together to create customized protection policies.

Symbol of a browser window with a checkmark

Web Tamper Protection

Configures specified webpage cache as the returned page during webpage updates.

Symbol of a list which is half covered by shadows

Blacklist and Whitelist

Configures a blacklist or whitelist that can accurately block or allow specified IP addresses.

Symbol of an alarm clock marked by an X.

False Alarm Masking

Handles false alarms by ignoring attack detection rules of specific requests.

Structure and Function

Graphik WAF: Structure and Function

New Features

Web Application Firewall (WAF)View Details
Status Dashboard expandedView Details
Closed Beta Dedicated WAFView Details
General Availability Dedicated WAF View Details

Find out more

Do you have any questions?

Are you interested in WAF or do you have any questions regarding WAF? I will be happy to answer your questions in a free consultation!

T-Systems International GmbH
Tino Fehnle

Tino Fehnle
Please enter a valid phone number!

* required fields

  • Communities

    The Open Telekom Cloud Community

    This is where users, developers and product owners meet to help each other, share knowledge and discuss.

    Discover now

  • Telefon

    Free expert hotline

    Our certified cloud experts provide you with personal service free of charge.

     0800 3304477 (from Germany)

    +800 33044770 (from abroad)

    24 hours a day, seven days a week

  • E-Mail

    Our customer service is available free of charge via E-Mail

    Write an E-Mail