Web Application Firewall (WAF)


Filtering and monitoring HTTP traffic

With the shift to cloud-based systems, more corporate applications are moving to a vendor hosted platform, which requires thought to how these systems are secured and accessed.

A Web Application Firewall helps to protect an organisations application by filtering and monitoring HTTP traffic between the application and the internet.

Web Application Firewalls (WAF) work?

Web Application Firewalls (WAF) analyses the security rules which match a particular transaction and provides the insight in real-time as applications and attack patterns are learned. This application intelligence, paired with intuitive one-click rule customisation, allows WAF to sharply reduce false positives.

WAF gives administrators an important point of security enforcement and intelligence. WAF protects web applications from common vulnerabilities identified by Open Web Application Security Project (OWASP), such as SQL Injection (SQLi) and Cross-site Scripting (XSS), while providing the ability to customise the rule set for each application.

Web Application Firewall (WAF) capabilities:


OWASP Top 10 Protection


Positive security model through application learning


API protection for JSON, XML


Real-time Insights


Application Rate Limiting


L3/L4 ACLs


Input Validation – XSS, SQLi etc


Scripting for application logic flaws - Using Data Scripts


Simplified Policy Definition


Elasticity and Automation


DDoS Protection


L7 Rules/Policies etc


Focussed on business systems integration and world leading vendor alignment, we have deployed many solutions over a prolonged and successful history

Keeping up with continual IT change and expanding a range of technologies, we have become the leading, preferred and often sole IT partner for many South West & Wales businesses.

Technology Investing

We have weathered the commercial storms of recession and made significant personnel investment across all areas of our business. We are proud to continue to strengthen and grow.

Extensive portfolio of products and services

Offering an extensive portfolio of products and services, developed many solutions to suit any type of business.

Service Transitions

Supporting businesses with the transition from Microsoft 2003 server, Exchange 2003 and Windows XP to the newer versions of Microsoft 2008/2012 server.

Best Pricing

Our procurement team have an extensive range of supplier relationships, ensuring the best pricing is gained to offer the most comprehensive solutions.

How can BOM IT Solutions help?

Many organisations only review their cyber security capabilities when a breach has already occurred. Importantly, the cost of a breach can often run into the hundreds of thousands-far outweighing the cost of proactively assessing your level of cyber security.

0800 038 7222

Call for a consultation.


Email BOM IT Solutions.

Contact BOM IT Solutions