We are currently experiencing system connectivity issues, certain parts of this page may not function as intended. We hope to have the issues resolved as quickly as possible. Sorry for any inconvenience.
 
Juniper Networks Elite Partner - Enterprise Solutions Provider

The first web intrusion deception system that prevents web attackers in real time

Junos WebApp Secure leading Web Intrusion Prevention System (WIPS) uses deception to detect, track, profile and prevent hackers in real-time. Unlike legacy signature-based approaches, WebApp Secure is the first technology that inserts thousands of detection points to proactively identify attackers before they do damage – without any false positives.

WebApp Secure disrupts the economics of a hacking attempt and lures the attacker into a trap. This allows customers to profile the hacker and gather valuable information about the threat they pose in real time.

Key Features

Watch Attackers Live and Record the Attack

From the moment the attacker is first detected, they are monitored. Every attempt is visible in real time, giving you time to respond
 

Stop Attackers in Their Tracks

WebApp Secure detects attackers when they are looking for vulnerabilities and instantly prevents the attack.
 

Simple Management

WebApp Secure detects and prevents attackers out of the box. There are no rules to write, no learning mode, and no signatures to create.
 

PCI Compliance

WebApp Secure Web Security protects web applications, and the only portion of PCI that covers web applications is PCI 6.6.
 
 
 

Solution Overview

Detect

Juniper Switches

Detect using deception

WebApp Secure Software’s web Intrusion Deception™ system effectively eliminates false positives because it employs tar traps to detect attacks with certainty. The software inserts detection points into web application code including urls, forms and server files to create a variable minefield.

These traps detect hackers when they manipulate the deception points during the reconnaissance phase of the attack, before they can establish an attack vector.

And because hackers are manipulating code that has nothing to do with the website or web application, the malicious action is certain.

Track

Juniper Wireless

Track attackers beyond the IP address

WebApp Secure captures an attacker’s IP address as one data point for tracking. But many legitimate users could also be accessing the site from the same IP address—for this reason, WebApp Secure goes beyond the IP address and tracks attackers more granularly.
 

Track browser attacks

Attackers using a browser are tracked by injecting a persistent token into their client. The token remains even if they clear their cache or cookies and persists across browsers, including those with privacy control features.
 

Track software and script attacks

Attackers using scripts and tools are tracked using a fingerprinting technique to identify the machine delivering the script.

profile

Juniper Routers

Understand attackers and record their attack

The tracking techniques allow us to profile the attacker and record the attack like a DVR. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.

Respond

Juniper QFabric

Respond to attackers

Once an attack has been detected, an appropriate response—from a warning, to requiring a CAPTCHA, to blocking a user or forcing them to logout, can be deployed manually or automatically in real-time.
 

Download Center

Whitepaper

Understanding and Responding to the Five Phases of Web Application Abuse

Casestudy

Brown Printing Gains Real‐Time Insight into Web Attacks with WebApp Secure Software

Datasheet

Juniper Spotlight Secure

Comparison Factsheet

WebApp Secure Web Intrusion Detection System vs WAF

Datasheet

WebApp Secure
The first Web Intrusion Deception System that prevents Web attackers in real-time.
Download
 
 

Ask an expert engineer

Our highly qualified
engineers are here
to help you find the
best solution.

Chat Now