Protect applications from within
Application risk reduction
RASP protects your application from vulnerabilities so that your teams can focus on business logic, without leaving your application exposed to potential exploitation
Security as business transforms
With fading controls and ephemeral workloads, cloud native applications need more than just perimeter security. RASP provides security from within and goes wherever your application goes
RASP Attack Detection
Built into the application runtime environment, RASP is capable of detecting and preventing attacks real-time
- Protection against zero-day attacks.
- No tuning, highly-accurate out-of-the-box.
- Protects against OWASP top 10 vulnerabilities.
What does RASP protect against?
Attacks
- Clickjacking
- HTTP Response Splitting
- HTTP Method Tampering
- Large Requests
- Malformed Content Types
- Path Traversal
- Unvalidated Redirects
- Software Supply Chain Attacks
Injections
- Command Injection
- Cross-Site Scripting
- Cross-Site Request Forgery
- CSS & HTML Injection
- Database Access Violation
- JSON & XML Injection
- OGNL Injection
- SQL Injection
Weaknesses
- Insecure Cookies & Transport
- Logging Sensitive Information
- Unauthorized Network Activity
- Uncaught Exceptions
- Vulnerable Dependencies
- Weak Authentication
- Weak Browser Caching
- Weak Cryptography
WAF + RASP = Defense in Depth
WAF
For known exploit payloads
Attacks
DDoS, malicious bots, script kiddies
Threats
External/untrusted
RASP
For unknown payloads
Attacks
Obfuscated, context-dependent, Zero-day
Threats
External/untrusted, Trusted insider, partners
Attack Visibility
Logging & Visibility
- Pre-correlated Intelligence Everything in one place.
- Attack Classification Category, Event, Severity
- Network HTTP Request, HTTP Response, IP Addresses, Hosts Info
- Application User session, code execution, Filename, Line Number
- Operating System File reads/writes, Process Execution
- Database Query Execution, Modified Rows via Exeuction


Supported Platforms
Runtimes

Databases
Insights & SIEMs
-
Active Applications
-
Legacy Applications
-
3rd Party Applications
-
APIs & Microservices
-
Cloud Applications
-
Container & VMs


See how we can help you secure your web applications and data