AWS re:Invent 2017: Wallarm Delivers its AI-enabled NG-WAF and scanner to AWS Customers

We are thrilled to be sponsoring this year’s AWS re:INVENT in Las Vegas. With many of our customers using AWS infrastructure it is critical for us to provide a frictionless way to protect APIs, applications and micro-services in AWS environments.

Filtering nodes for Wallarm’s NG-WAF with Active Threat Verification mode are listed in the AWS Marketplace since July and used by the customers across different verticals. Get Wallarm AMI from the AWS Marketplace or just deploy Wallarm Nodes on top of EC2/ECS with a variety of options.

These are the features customer especially love about using Wallarm in AWS:

  • multi-tenant support for dozens and hundreds of applications and APIs— with no manual configuration and learning
  • self-adapting rules — as web apps are stood up, migrated, turned off
  • DevOps-ready deployment — automated/orchestrated with the current DevOps stack and a variety of options (AMI, Linux package, Docker Containers, modules for NGINX)

We believe that the technology partnership between Wallarm and AWS presents a promising opportunity for DevOps teams that use AWS infrastructure for their production workloads and want to incorporate application security into the application development and deployment processes.

“Truckerpath chose Wallarm application security because its architecture is a good fit for our dynamic AWS-based infrastructure. In 15 month that we have been using the solution, we have seen already low false positive rates come down even further and no security breaches.”

Andrey Neverov, Head of Engineering, TruckerPath.

Recent Posts

From Agent2Agent Prompt Injection to Runtime Self-Defense: How Wallarm Redefines Agentic AI Security

Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator…

2 weeks ago

CISO Spotlight: Lefteris Tzelepis on Leadership, Strategy, and the Modern Security Mandate

Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure…

3 weeks ago

2026 API and AI Security Predictions: What Experts Expect in the Year Ahead

This is a predictions blog. We know, we know; everyone does them, and they can…

4 weeks ago

Update on React Server Components RCE Vulnerability (CVE-2025-55182 / CVE-2025-66478)

The attack landscape has been dynamic following the disclosure of the React Server Components RCE…

1 month ago

2025 in Review: A Year of Smarter, Context-Aware API Security

As the year draws to a close, it’s worth pausing to look back on what…

1 month ago

Wallarm Halts Remote Code Execution Exploits: Defense for Vulnerable React Server Component Workflows

On December 3, 2025, React maintainers disclosed a critical unauthenticated remote code execution (RCE) vulnerability…

1 month ago