Tools that would be covered


Load balancer

NGINX modules

A variety of open-source modules


Open Source Web Application Firewall


RESTful search and analytics engine


Free UI for Elasticsearch data visualization


Open-source data collection software


Framework for alerting 
on anomalies or spikes


AKS Application Gateway Ingress Controller


Intrusion prevention software framework

How Wallarm WAF works

Unlike default cloud WAFs, Wallarm automates protection for apps and APIs with no manual tuning and investments into ongoing maintenance allowing the team to focus on different tasks. It scales. It works.

Wallarm protects hundreds of Fortune 500 organizations 

415 Brannan St, San Francisco, CA 94107

2020 © Wallarm Inc.

Stepan Iliyn


Stepan is the co-founder of Wallarm, which is a Silicon Valley based company that protects customers’ most critical web applications, APIs, and microservices. By overseeing product and growth, Stepan has brought the company from zero to more than a hundred customers, and in addition, millions of dollars worth of revenue.


Alerting and visibility

  • Building a security dashboard to gain visibility of malicious traffic
  • Easy & flexible alerting with NGINX and ElasticSearch
  • Elegant analysis of web server log files for anomalies
  • Mirroring traffic for async analysis with 3rd party tools

APIs and microservices security

  • Mitigating OWASP Top10 threats (SQL injections, XXE, XSS etc.)
  • Up-to-date WAF options overview
  • Proper WAF configurations and reducing false-positives
  • Detecting information data leakage events.
  • Blocking traffic from Tor, data-centers and malicious IP addresses
  • How and why to add a security layer on top of NGINX Ingress controller in cloud-native environments
  • Sidecar deployment

Protecting APIs and microservices in your Kubernetes environments

Wallarm Product Demo

  • Gain visibility and 360-degree protection in your multi-cloud environments
  • Fingerprinting and blocking bots, account take-over attacks and identifying good crawlers (Google bot, etc)
  • Catching scrapers with hidden links and honeypots

Protecting from bots and behavioral attacks

This practical webinar will cover techniques to build a robust security layer for your apps and APIs with a set of open-source or commercial tools. With the set of modules and tricks, everyone can get security visibility and real-time protection against OWASP Top10 attacks, bots, application abuse, and potential data leakage issues. We will provide practical methods that your Dev, Sec and Ops teams can use.

Online Workshop   
July 9th at 11 am PST / 2 pm EST

Cloud-Native Apps 
and APIs in Kubernetes Environments 

Online Workshop  
July 9th at 11 am PST /  2 pm EST

Protecting Cloud-Native Apps and APIs in Kubernetes Environments

Reserve a seat

Web application is one of the top three attack patterns and the number one source of data breach for financial services firms.

2019 Data Breach Investigations Report, Verizon, April 2019

Victor Gartvich

VP of Security Solutions, Wallarm

Seasoned technology professional, in charge of Wallarm's product management. Most recently Victor was leading security and DevOps efforts at Lacework, another emerging Silicon Valley security company. Prior to that Victor spent four years leading product and engineering activities at an AppSec & performance startup, Nuubit.


Watch a webinarDownload Demo Deck