List of Symantec WAF Integrations
This is a list of platforms and tools that integrate with Symantec WAF. This list is updated as of April 2025.
-
1
AWS WAF
Amazon
Protect your web applications with advanced, customizable security solutions.AWS WAF functions as a protective web application firewall aimed at defending your web applications or APIs against common web-based threats that could endanger their availability, security, or lead to excessive resource consumption. The service empowers you to control how traffic interacts with your applications by enabling the creation of security rules that can block standard attack vectors, such as SQL injection and cross-site scripting, alongside custom rules to filter out specific traffic patterns that you may identify. To streamline the setup process, AWS provides Managed Rules for AWS WAF, which consist of pre-configured rule sets curated by AWS or third-party vendors available in the AWS Marketplace. These Managed Rules focus on addressing vulnerabilities, including those highlighted in the OWASP Top 10 security risks, and are regularly updated to respond to emerging threats. Furthermore, AWS WAF includes a robust API that allows for the efficient automation of the creation, deployment, and management of security rules. Notably, AWS WAF operates under a pay-as-you-go pricing structure, meaning you incur charges based on the number of rules you set up and the volume of web requests your application handles. This adaptable pricing strategy gives you the ability to customize your security measures in accordance with your application’s unique traffic and complexities, ensuring that you can effectively protect your digital assets. This comprehensive approach to web security makes AWS WAF an essential tool for modern web applications. -
2
CA Auditor for z/OS
Broadcom
Streamline audits and strengthen security with automated precision.With the advancement of each computer generation, operating systems are becoming increasingly intricate. This heightened complexity has made the auditing process for these systems more challenging and time-intensive. Security vulnerabilities can arise in all types of operating systems, including mainframes, due to improper installations, custom configurations, and ongoing maintenance bugs. CA Auditor emerges as a powerful software solution that automates the technical evaluation of both hardware and software environments, effectively identifying areas at risk for integrity issues. It is adept at uncovering potential security flaws that may result from misconfigured setups, allowing users to conduct a comprehensive assessment of the operating system and its various components. Furthermore, CA Auditor includes features that monitor system usage and safeguard critical system files' integrity. By leveraging CA Auditor, users can effectively tackle major vulnerabilities within the z/OS operating system, which facilitates precise auditing, integrity assessments, and essential verifications aimed at strengthening security protocols. This holistic strategy not only reduces risks but also contributes to cultivating a more secure computing landscape while ensuring compliance with established security standards.
- Previous
- You're on page 1
- Next