
DDoS attacks: what do they consist of?
DDoS attacks are now some of the most common ways to destabilize an IT system, resulting in heavy losses for businesses: financial, time, loss of trust in the company, reputation,...

Provide protection for your webservices and applications that you host on the Internet.
Ask for a quote
| Description | ITH Security M-WAF Standard | ITH Security M-WAF Premium | Dedicated package |
|---|---|---|---|
| SLA | The solution is configured and implemented within the framework of the customer's individual needs. | ||
| Implementation by ITH | |||
| Providing an environment for WAF | |||
| Configuration of security policies | |||
| Optimization of WAF performance in monitoring mode | |||
| Manual WAF optimization (without learning phase, after traffic monitoring phase) | |||
| Conduct WAF acceptance testing | |||
| Update signature databases | |||
| Management and maintenance | |||
| Update signature databases | |||
| TLS / SSL traffic protection | |||
| Cyclical reports | (max 1 per month) | (max 1 per month) |
The price of the ITH Managed WAF service depends on the selected package - Standard or Premium - and the bandwidth of the WAF-protected link, standard from 10Mbps to 1Gbps.

WAF (Web Application Firewall) is an application firewall that protects web applications from threats and attacks that exploit vulnerabilities in their code or operation.

DDoS attacks are now some of the most common ways to destabilize an IT system, resulting in heavy losses for businesses: financial, time, loss of trust in the company, reputation,...
