Tag

Cloud Computing

Browsing

We are thrilled to be sponsoring this year’s AWS re:INVENT in Las Vegas. With many of our customers using AWS infrastructure it is critical for us to provide a frictionless way to protect APIs, applications and micro-services in AWS environments. Filtering nodes for Wallarm’s NG-WAF with Active Threat Verification mode are listed in the AWS Marketplace since July and used by the customers across different verticals. Get Wallarm AMI from the AWS Marketplace or just…

Wallarm Next Gen WAF with threat verification delivers continuous application security for cloud workloads and enables security integration into CI/CD The technology partnership between Wallarm and AWS presents a promising opportunity for DevOps teams that use AWS infrastructure for their production workloads and want to incorporate application security into the application development and deployment processes. The collaboration between the two companies further supports the commitment from Wallarm to enable application security in the cloud. “Truckerpath chose…

Many of the developers we speak to are interested in taking advantage of Google Compute Cloud for developing and hosting their web applications. The advantages are many from reasonable costs to built in scalability to high level of availability built right into the platform. However, the developers are faced with a question: if my application runs in dynamic instances within Compute Cloud and I only have limited control of the routing, how do I make…