AWS re:Invent 2017: Wallarm Delivers its AI-enabled NG-WAF and scanner to AWS Customers

We are thrilled to be sponsoring this year’s AWS re:INVENT in Las Vegas. With many of our customers using AWS infrastructure it is critical for us to provide a frictionless way to protect APIs, applications and micro-services in AWS environments.

Filtering nodes for Wallarm’s NG-WAF with Active Threat Verification mode are listed in the AWS Marketplace since July and used by the customers across different verticals. Get Wallarm AMI from the AWS Marketplace or just deploy Wallarm Nodes on top of EC2/ECS with a variety of options.

These are the features customer especially love about using Wallarm in AWS:

  • multi-tenant support for dozens and hundreds of applications and APIs— with no manual configuration and learning
  • self-adapting rules — as web apps are stood up, migrated, turned off
  • DevOps-ready deployment — automated/orchestrated with the current DevOps stack and a variety of options (AMI, Linux package, Docker Containers, modules for NGINX)

We believe that the technology partnership between Wallarm and AWS presents a promising opportunity for DevOps teams that use AWS infrastructure for their production workloads and want to incorporate application security into the application development and deployment processes.

“Truckerpath chose Wallarm application security because its architecture is a good fit for our dynamic AWS-based infrastructure. In 15 month that we have been using the solution, we have seen already low false positive rates come down even further and no security breaches.”

Andrey Neverov, Head of Engineering, TruckerPath.

Recent Posts

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

2 weeks ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

4 weeks ago

Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems

AI systems are no longer just isolated models responding to human prompts.  In modern production…

1 month ago

Everyone Knows About Broken Authorization – So Why Does It Still Work for Attackers?

Broken authorization is one of the most widely known API vulnerabilities.  It features in the…

1 month ago

From Shadow APIs to Shadow AI: How the API Threat Model Is Expanding Faster Than Most Defenses

The shadow technology problem is getting worse.  Over the past few years, organizations have scaled…

2 months ago

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen…

2 months ago