Web applications can expose critical systems to threats from internal and external sources. Application firewalls are specialized tools that are designed to increase security in web applications.
The ICSA Labs audit report additionally highlighted DefensePro’s ability to detect and mitigate 30 different scenarios in 8 sections ranging from application-layer DoS/DDoS floods to mitigating brute force, to handling SSL and other application misuse. In every case, the attack was detected and mitigated by the inline DefensePro.
We go to great lengths to ensure Canary is as secure as possible. That’s why we’re proud to be the first device to receive IoT Security Certification from ICSA Labs. Read Canary's blog:
The video-driven home security startup Canary, maker of Canary, the all-in-one security solution with HD camera, siren and air monitor, passed rigorous testing to attain the first Internet of Things security certification from ICSA Labs.
The video-driven home security startup Canary, maker of Canary, the all-in-one security solution with HD camera, siren and air monitor, passed rigorous testing to attain the first Internet of Things (IoT) security certification from ICSA Labs, a leading third-party testing and certification body and an independent division of Verizon.
|10 Year Award||5 Year Award|
|Imperva||Comodo Security Solutions|
|ThreatTrack Security||MicroWorld Technologies|
|VarioSecure||Palo Alto Networks|
|Zebra Technologies||Quick Heal Technologies|
On March 24, 2016, experts from ICSA Labs, an ONC-Authorized Certification Body and Accredited Test Lab, provided education on the certification testing requirements for some of the new 2015 Edition criteria. In this webinar, the System Design (g)(3)-(5) and Application Access Criteria (g)(7)-(9) were discussed.
The Mirai botnet was used to carry out a DDoS attack in late October against one of the Internet’s domain name service (DNS) providers, Dyn, resulting in an Internet disruption for many. It wasn’t the first time this botnet, comprised of Internet of Things (IoT) devices, was used in a DDoS attack...
In light of the recent attacks that exploited Internet of Things (IoT) devices, it seems timely to reinforce the importance of IoT security.