Continent WAF

Web application security system with automated business logic analysis

Continent WAF

Explored and unknown attack prevention for web applications

A multi-layered traffic inspection system blocks a wide range of attacks targeting web applications and prevents database theft, malware placement on websites and unauthorized changes to website content.

Benefits of traditional and innovative protection methods

Artificial intelligence analyzes application behavior models, significantly simplifying the creation of a security policy. As such, implementing Continent WAF requires only minimum time.

Compliance with GIS working requirements already confirmed

The system records user access privileges and can be used as an already certified superimposed means of web application protection against unauthorized access

Analysis of traffic encrypted by GOST algorithms

The integrated use of Continent WAF and Continent TLS facilitates strengthened protection and – without affecting the performance of either device – checks even encrypted application traffic as it enters the corporate network.

Analysis of various types of traffic and data

HTTP validation

SSL tunnel data analysis

Parsing requests and responses

User behavior deviation analysis

Operation in several modes

Traffic mirroring

Real-time protection

Audit of web server activity logs

  • HTTP requests per second up to 3 000
  • Form factor: 1U

The Continent WAF model range offers virtual and software-hardware versions and a choice of hardware platforms with a set of interfaces tailored to your needs.

Continent WAF IPC-3000L

Continent WAF IPC-3000L

Form factor: 1U
Network interfaces: 1 x 10/100/1000BASE-T RJ45
4 x 10G SFP+

Performance of the device:

Operation mode Performance
HTTP requests per second up to 3 000
Continent WAF IPC-R1000

Continent WAF IPC-R1000

Form factor: 1U
Network interfaces: 8 x 10/100/1000BASE-T RJ45
4 x 10G SFP+

Performance of the device:

Operation mode Performance
HTTP requests per second up to 1 000

Continent WAF (Virtual appliance)


Operating system Ubuntu 20.04 Server
Astra Linux Special Edition 1.6 «Smolensk»
Processor x86_64 with 4 cores, at least 2.2 GHz
RAM Minimum - 16 GB
HD Minimum - 500 GB
Network adapter at least 2x Gigabit Ethernet for active mode;
1x Gigabit Ethernet for passive mode
Web-browser Google Chrome 88 or later;
Mozilla Firefox 85 or later

Continent WAF Documentation

Information contained in these documents may be changed by the developer without special notice; such changes do not violate the developer’s obligations to the user.



Available versions

Hardware Appliance

A set of hardware platforms with installed Continent WAF software.

A combination of software and hardware supplied by the vendor guarantees optimal and stable system operation.

Virtual appliance

Virtual machine with Continent WAF software.

Deployed on the customer's hardware platform which determines system performance.

Editions

Professional Corporate

No limit on the number of protected applications.

Yes Yes

Standard model for parsing transaction data (or optimized for a specific framework within the package).

Yes Yes

Creation of proprietary verification settings for checking HTTP protocol.

Yes Yes

ModSecurity open signature format-based Signature detection method, automatic suppression of false positives on signatures.

Yes Yes

The ability to create individual parsing models for transaction data.

Yes Yes

Customizable business logic models (actions and sessions).

Yes Yes

False positive suppression based on transaction data parsing models and business logic.

Yes Yes

Creation of distributed fault-tolerant configurations with centralized management.

Yes Yes

Possible integration with external systems (SIEM, IDM, analytical systems, etc.).

Yes Yes

Database high availability.

Yes Yes

Hosting all WAF components on one node.

Yes Yes

Performance of the node up to 1000 RPS.

Yes Yes

Performance of the node up to 3000 RPS.

Yes Yes

Performance of the node up to 5000 RPS (Virtual appliance only).

No Yes

Automatic construction of request routing models, business logic, and application activity parameters.

No Yes

Integration into SDLC processes (dedicated API, licenses for the test zone – free-of-charge).

No Yes

Active-Active balancing.

No Yes

Multitenancy.

No Yes