Sign Up for Webinar

☝️Limited seats available

Tools that would be covered

NGINX

Load balancer

NGINX modules

A variety of open-source modules

ModSecurity

Open Source Web Application Firewall

Elasticsearch

RESTful search and analytics engine

Kibana

Free UI for Elasticsearch data visualization

Fluentd

Open-source data collection software

Elastalert

Framework for alerting 
on anomalies or spikes

Kubernetes

AKS Application Gateway Ingress Controller

Fail2ban

Intrusion prevention software framework

How Wallarm WAF works

Unlike default cloud WAFs, Wallarm automates protection for apps and APIs with no manual tuning and investments into ongoing maintenance allowing the team to focus on different tasks. It scales. It works.

Wallarm protects hundreds of Fortune 500 organizations 

415 Brannan St, San Francisco, CA 94107
(415)940-7077
request@wallarm.com



2020 © Wallarm Inc.

Stepan Iliyn

Co-founder

Stepan is the co-founder of Wallarm, which is a Silicon Valley based company that protects customers’ most critical web applications, APIs, and microservices. By overseeing product and growth, Stepan has brought the company from zero to more than a hundred customers, and in addition, millions of dollars worth of revenue.

Speaker

Alerting and visibility

  • Building a security dashboard to gain visibility of malicious traffic
  • Easy & flexible alerting with NGINX and ElasticSearch
  • Elegant analysis of web server log files for anomalies
  • Mirroring traffic for async analysis with 3rd party tools

APIs and microservices security

  • Mitigating OWASP Top10 threats (SQL injections, XXE, XSS etc.)
  • Up-to-date WAF options overview
  • Proper WAF configurations and reducing false-positives
  • Detecting information data leakage events.
  • Blocking traffic from Tor, data-centers and malicious IP addresses
  • How and why to add a security layer on top of NGINX Ingress controller in cloud-native environments
  • Sidecar deployment

Protecting APIs and microservices in your Kubernetes environments

Wallarm Product Demo

  • Gain visibility and 360-degree protection in your multi-cloud environments
  • Fingerprinting and blocking bots, account take-over attacks and identifying good crawlers (Google bot, etc)
  • Catching scrapers with hidden links and honeypots

Protecting from bots and behavioral attacks

This practical webinar will cover techniques to build a robust security layer for your apps and APIs with a set of open-source or commercial tools. With the set of modules and tricks, everyone can get security visibility and real-time protection against OWASP Top10 attacks, bots, application abuse, and potential data leakage issues. We will provide practical methods that your Dev, Sec and Ops teams can use.

Online Workshop   
July 9th at 11 am PST / 2 pm EST

Protecting 
Cloud-Native Apps 
and APIs in Kubernetes Environments 

Online Workshop  
July 9th at 11 am PST /  2 pm EST

Protecting Cloud-Native Apps and APIs in Kubernetes Environments

Reserve a seat

Web application is one of the top three attack patterns and the number one source of data breach for financial services firms.

2019 Data Breach Investigations Report, Verizon, April 2019

Victor Gartvich

VP of Security Solutions, Wallarm

Seasoned technology professional, in charge of Wallarm's product management. Most recently Victor was leading security and DevOps efforts at Lacework, another emerging Silicon Valley security company. Prior to that Victor spent four years leading product and engineering activities at an AppSec & performance startup, Nuubit.

Share: