WAAP pricing

WAAP

Contact
  • Costs are calculated as follows : - Clean data transfer, minimum 1TB/month
    - Subscription features.
Contact me now
Service package Costs are calculated as followsPrice
WAAP - Clean data transfer, minimum 1TB/month
- Subscription features.
Contact

Core features of WAAP

Costs are calculated as follows - Clean data transfer, minimum 1TB/month
- Subscription features.
CDN & DDoS Protection
DNSSECStrengthen authentication in DNS using digital signatures based on public key cryptography.
Smart RoutingChoose the optimal path to the origin so that content is delivered to end users using the fastest and most reliable route.
SSL/TLSSupport SSL/TLS protocols to ensure that data exchanged between two parties are secure and cannot be intercepted by attackers.
Load BalancerDetect and redirect traffic to different origin servers based on various conditions, such as origin domain, origin IP address, and user IP address to keep application and service remains available to users.
Anti-HotlinkingMaintain hotlinking protection by applying rules to accept or block requests.
Rate LimitingLimit the number and frequency of HTTP requests to reduce risks of brute-force and other automated attacks.
Access ControlConfigure blacklist or whitelist based on IP address, HTTP header, and other parameters to avoid web application attacks.
L3/L4 DDoS MitigationProtect against L3/L4 DDoS attack, such as SYN flood, ACK flood, and UDP flood.
L7 DDoS MitigationProtect against HTTP and HTTPS floods, low and slow attacks, and other Layer 7-based DDoS attacks.
Preset Protection PoliciesProvide three preset protection modes so customers can choose the onebest suited for addressing DDoS attacks.
WAF & API Security
IP Repeated ViolationsBlock IP addresses to prevent repeated WAF violations.
HTTP Protocol ValidationBlock requests that do not comply with the formatting standards specified in the RFC for HTTP.
Built-In WAF RulesOffer more than 1,000 built-In WAF rules to protect web applications against the security risks.
OWASP Core RulesetsHelp organization address the Top 10 vulnerabilities identified by the Open Web Application Security Project (OWASP).
Zero-day ProtectionDeploy a “virtual patch” to prevent Zero-day attacks when such vulnerabilities are discovered
Flexible Response ActionsOffer custom protection actions, such as block, log, off, and bypass
WAF Intelligent Analysis ServiceAutomaticly generate recommended exceptions for WAF rules to reduce the false positive intelligently.
Custom WAF RulesAllow customers to create custom WAF rules base on their business needs.
Threat IntelligenceIdentify and protect mainstream IDC intelligence and open source intelligence.
API InventoryDefine API resources, control API lifecycles online and offline, monitor privacy status, and more.
Consumer ManagementIdentify the source of requests based on a unique consumer ID to manage API assets.
API DiscoveryDiscover unknown API resources using advanced log analysis technology
API AuthenticationVerify the credibility of API requests by detecting dynamic authentication tokens in the requests.
Compliance DetectionRefine and verify the body or parameters of requests to identify and intercept illegal request effectively.
Bot & Risk Management
Bot IntelligenceDefine the action to take for known bot types, such as bypass SEO bots or block bots.
Bot Detction (Bot Feature Verification)Detect and identify normal users and bots by cookie, JavaScript, other browser features and user behavior.
Fingerprint AnalysisGenerate browser fingerprints for analysis and correlation with IP addresses.
Captcha VerificationRespond to the captcha verification page to verify the legitimacy of client requests.
Flexible Response ActionsCustomize actions of protection, such as block, flag, log, captcha, Slow/Delay etc.
Customized BotSupport adding, deleting, enabling of custom bots known to be “good.”
Bot Management for Mobile AppOffer enhanced App. protection for native mobile apps by integrating the bot management SDK into IOS and Android applications.
Workflow AnalysisIdentify and analyze the workflow of access requests from websites and APIs to detect and block abnormal access behaviors.
AI AnalysisDetect known and unknown bot behavior accurately and work with other strategies to proactively combat ever-changing bot attacks before they have a chance to strike.
Account TakeoverIdentify and block attacks designed to hijack account through credential stuffing and brute force.
Fraud ProtectionPrevent and detect fraudulent activities to minimize the risk of financial loss and damaged reputations damage caused by fraudulent activities.
Data Analysis
SIEM SupportHelp organization push attack logs such as Syslog and Splunk to the SIEM platform in real-time to improve security operation efficiencies.
DashboardDisplay attack information (such as attack trending data, attack details, attack type and source of attack) in real-time.
Reporting & AnalyticsAllow organizations to export security service report on console, which inlcudes securiy overview, attack incident analysis via the console.
Basic Log & Incident investigation toolsDisplay incident logs in detail, including the attacker IP address, attacked domain name, and trigger policy.
Professional Log & Incident Investigation toolsSupport Kusto Query Language (KQL) statements to retrieve logs according to actual log query requirements; provide a quick analysis of log fields to filter the fields for further analysis.
L4 & L7 DDoS Dashboard and Log ServiceProvide real-time visibility into all network and application layer attacks trend and attack type.
Incident Log DownloadSupport incident log downloads on console.
Security Services
Onboarding AssistanceProvide a guided onboarding experience along with an expert tuning workshop and guidance on security and performance configurations.
Professional Reporting ServiceVProvide security analysis reports for an organization’s website and propose ways to optimize security policies.
Vulnerability Scanning ServiceProvide a vulnerability scanning service to discover cyber security weaknesses in host systems and web applications to safeguard against attacks and avoid costly data breaches.
Penetration Testing ReportConduct a penetration testing exercise and generate a detailed report with information about vulnerabilities and weaknesses that were identified during testing, along with recommendations for remediating and mitigating the vulnerabilities found.
Platform Capabilities
Deploy HistoryAllow organizations to query the configuration history and related record changes.
Custom Block PageAllow organizations to customize the page displayed to clients when an event is blocked.
Attack AlertNotify customers by instant message or email when an attack triggers a customer-defined alarm rule.
API AccessAllow customers to configure security rules, query incident logs and search security dashboard data via APIs.
Open API SupportProvide API quick searching, API online calling, troubleshooting, and documentation to enhance the customer’s programming experience
Compliance CertificationsComply with industry-standard security compliance certifications and regulations, including ISO/IEC 27001, SOC 2 Type II, PCI DSS 3.2, K-ISMS
Account IAM ControlProvide role-based account control, read-only user access, and multi-user administrative access for Identity and Access Management control.
Control Groups of DomainsAllow customers to create control groups in different domains to simplify administration of subaccounts.

Key benefits of WAAP for businesses

bao ve toan dien

Comprehensive, Centralized Protection Experience

WAAP provides an integrated protection model, bringing together multiple layers of security such as WAF, API security, and Bot management within a single platform. This centralized approach makes it easier for businesses to monitor and deploy protection measures for web applications and APIs.

nang cao hieu suat

Enhanced Application Performance and User Experience

WAAP solutions are designed to handle legitimate traffic while mitigating the impact of threats. This allows applications to maintain more stable responsiveness for end users.

tiet kiem

Cost Savings for IT Infrastructure and Maintenance

Using WAAP on a cloud platform reduces the need for businesses to invest in separate hardware and security systems. Operation and maintenance processes are simplified, optimizing costs by eliminating the need to manage multiple separate solutions.

quan ly an ninh mang

Enhancing Cybersecurity Management Efficiency

WAAP enables security management through a unified interface, supporting threat monitoring, configuration, and response. This reduces manual workload for IT teams and increases consistency in security management.

kinh doanh lien tuc

Ensuring Business Continuity

By minimizing risks from attacks on web applications and APIs, WAAP contributes to limiting service disruptions. This helps businesses maintain stable operations in the digital environment.

bao ve thuong hieu

Protecting Brand Reputation

Minimizing security incidents and service disruptions can help businesses avoid negative impacts on their brand image. WAAP is considered an additional layer of protection to reduce the risk of losing trust from customers and partners.

Why choose VinaHost WAAP solution?

Unified Platform for Web Application and API Protection

Instead of the old approach of using multiple separate, overlapping products, VinaHost’s Cloud Security 2.0 platform combines AI technology with a shared threat intelligence library. This platform reorganizes security capabilities into 5 General Modules and 4 Scenario-Based Protection Modules.
This solution leverages the power of VinaHost’s global network of over 200 PoPs and 17 years of security experience, providing comprehensive protection for Web Applications and APIs.
waap

Adaptive Protection Based on Big Data & ML

VinaHost applies big data analytics, machine learning, and threat intelligence to automatically build, recommend, and deploy security policies. This solution increases protection accuracy, reduces false positives, and optimizes operating costs.
Key Features:
  • Adaptive DDoS Protection: AI automatically creates DDoS protection rules when it detects attack traffic affecting the origin server.
  • Intelligent Analysis & Recommendation: Automatically analyzes logs, optimizes WAF policies, reduces false alarms, and supports whitelists tailored to each service model (website, API, etc.).
  • Advanced Bot Identification: AI behavioral models help score and effectively block sophisticated and persistent bots.
  • Automated API Discovery: AI detects traffic and automatically identifies active APIs.
waap

Robust Threat Intelligence Processing & Analysis

VinaHost’s intelligence data primarily comes from its own platform, alongside third-party libraries. This data is more accurate and up-to-date than third-party libraries. By leveraging an AI engine, we continuously transform this expertise into feature engineering, association analysis, and risk classification to optimize our intelligence scoring mechanism. This is achieved by labeling and managing the risk scores of attacking IPs and applying them directly to protection, improving the accuracy and effectiveness of our website protection products.
waap

Scenario-Based Protection

  • DDoS Protection: VinaHost’s WAAP protects origin against large-scale DDoS attacks (SYN, UDP, HTTP Flood…) and sophisticated attacks like Slowloris thanks to its adaptive protection mechanism.
  • Cloud WAF: Utilizing a Dual WAF Engine (AI + Rule), it continuously updates zero-day rules, reducing false positives and improving security accuracy.
  • Bot Management: Applying ML and Big Data to block malicious bots, allowing legitimate bots and providing effective defense against advanced bots.
  • API Protection: Automatically discovers APIs throughout their lifecycle and detects attacks in real time, preventing risks before they reach origin.
waap

Unified Visibility

The Cloud Security 2.0 platform is a comprehensive suite of solutions that provides a holistic view of your website’s security. It offers detailed insights into the security measures being applied to your domains while keeping you updated on the latest product developments. Through a range of dashboards, it provides real-time data on DDoS attacks, blocked IPs, and website request trends, helping organizations better manage potential threats.
waap

Professional Support Services

VinaHost is committed to providing 24/7 support with a fast response time of within 15 minutes via Livechat, Ticket, Email, and Hotline. Furthermore, the system is capable of integrating SIEM logging and supporting APIs, making infrastructure management secure and efficient.
waap

VinaHost's Security Implementation Experience

VinaHost possesses over 17 years of experience in implementing security solutions for businesses in Vietnam and internationally, ensuring system security, service stability, and compliance with global security standards.
ngan chan tan cong mang

3,336,701,369

Average daily number of
cyberattack mitigation

ten mien waf

90%

More than 90% of WAF domains
are in block mode

ky luc cao diem xu ly ddos

34.7M RPS

L7 DDoS Mitigation Peaked Record

ky luc cao diem xu ly ddos

2.09Tbps

L3/4 DDoS Mitigation Peak Volume Record

ky-luc-cao-diem-xu-ly-ddos

1 Billion+

Threat Intelligence Data Scale

chuyen gia dam bao tinh on dinh

100+ Security Experts

Ensure business stability and security

VinaHost's WAAP solution certifications have been achieved.

iso

ISO/IEC 27001:2013

VinaHost’s WAAP meets international standards for information security management systems, ensuring it fulfills stringent requirements for security, risk management, and data protection.

WAAP VinaHost đạt chứng nhận bảo mật dành cho môi trường xử lý thẻ thanh toán

PCI DSS (Payment Card Industry Data Security Standard)

Security certification for payment card processing environments helps businesses protect card data and meet security requirements for electronic transactions.

WAAP VinaHost đã được kiểm định theo quy trình chặt chẽ, đảm bảo tính liên tục và an toàn cho hệ thống.

ISMS (Information Security Management System)

We affirm that our information security management system is built, operated, and controlled according to strict procedures, ensuring the continuity and security of the system.

WAAP VinaHost đạt chứng nhận tin cậy của hệ thống dựa trên các tiêu chí bảo mật, sẵn sàng, toàn vẹn xử lý và bảo mật dữ liệu khách hàng.

SOC 2

Certification assesses the reliability of a system based on criteria such as security, availability, processing integrity, and customer data protection.

What do customers say about VinaHost's WAAP solution?

star rating

VinaHost’s WAAP – Web Application and API Protection solution helped us upgrade our cloud security 2.0 with DDoS attack protection and a stable Web Application Firewall (WAF). The system detects and blocks attacks early and effectively without affecting the user experience.

Anh Nguyễn Minh Tuấn là Giám đốc CNTT (CTO) hài lòng
Nguyen Minh Tuan Chief IT Officer (CTO)
star rating

VinaHost’s Cloud WAAP provides a multi-layered security solution for web application security and API security. Intelligent WAF features and real-time anomaly detection significantly reduce the risk of vulnerability exploitation.

Anh Trần Hoàng Nam là trưởng phòng An ninh thông tin rất hài lòng về giải pháp Cloud Security 2.0 của VinaHost
Tran Hoang Nam Head of Information Security
star rating

We chose VinaHost’s WAAP for our web application and API protection solution because of its automation and flexible scalability on the cloud. The WAF combined with DDoS protection ensures the system is always ready for large-scale attacks.

Chị Lê Thu Hà là IT Manager đã tin dùng giải pháp WAAP VinaHost và cảm thấy rất hài lòng
Le Thu Ha IT Manager
star rating

WAAP effectively meets the API Security needs in our microservices environment. The Web Application and API Protection mechanisms, along with behavioral analysis, help detect bots and sophisticated attacks more accurately.

Anh Phạm Quang Huy là Head of Engineering đã sử dụng WAAP VinaHost hơn 1 năm
Pham Quang Huy Head of Engineering
star rating

After deploying Cloud WAAP, system stability has significantly improved thanks to the multi-layered security solution. The web application firewall (WAF) and DDoS attack protection are working effectively, significantly reducing downtime.

Chị Đỗ Ngọc Anh là Giám đốc Vận hành (COO) đã sử dụng giải pháp WAAP cho hệ thống bảo mật của doanh nghiệp
Do Ngoc Anh CEO
star rating

VinaHost’s WAAP is a comprehensive web application security platform for modern businesses. The combination of WAF, API security, and cloud security 2.0 helps us proactively defend against new threats.

vo-thanh-long
Vo Thanh Long Security Architect

Frequently Asked Questions about WAAP

What is Web Application and API Protection (WAAP)?

WAAP is a comprehensive security solution that protects web applications and APIs against modern threats such as DDoS attacks, exploits, malicious bots, and API risks, based on Cloud Security 2.0.

What is the difference between WAAP and WAF?

WAF focuses on protecting web applications, while WAAP is more extensive with API security, bot management, multi-layered DDoS protection, and intelligent behavioral analysis, suitable for cloud and microservices systems.

How is WAAP pricing calculated?

WAAP costs are calculated based on traffic volume, number of applications/APIs, level of protection, and deployed features (WAF, API Security, DDoS, Bot Management, etc.).

Where should I subscribe to WAAP?

Businesses should choose reputable providers like VinaHost, which has a strong cloud infrastructure, a team of security experts, and deployment experience in Vietnam and internationally.

Can I try the WAAP solution?

You can try VinaHost’s WAAP solution. However, the trial depends on the target audience and the legal requirements of the business (not applicable to individuals). Please contact us for detailed advice.

See more btn-down