Introduction

[iWSafe Web Guard®] (aliases: [iWSafe All Securities In One®], [iWSafe Super Firewall®] or [iWSafe Web Application Firewall®]) is a creative and amzaing product which can block ALL attacks of Web, File, DNS Game...servers by just ONE product. More...

Functions

Hackers: Totally block ALL hacker instrusions, such as Port Scan, Zero Day, SQL Injection, Web CMS, Trojan and Web Shell... More...

Attacks: Totally block ALL DDoS, Http Attacks, DNS Attacks and Game Attacks DataBas Attacks More...

Features

Innovative: Innovative new type product--[All securities in one®]; Innovative algorithm--[Smarter Network Action Analysis®]; Innovative implementation--[All in Kernel®] More...

Easy: [Plug and Play®]--Plug, deploy or install; then, work well without any setting! More...

Indexes

OS: Windows, Linux and Bsd/Unix More...

Type: Software, Hardware and DIY. More...

Attacks: All known and even future More...

Speed: CPU<10%, Time Delay<1ms More...

Price: $499 only More...

Innovative [All security in one®] product

[iWSafe Web Guard®] (aliases: [iWSafe All Securities In One®], [iWSafe Super Firewall®] or [iWSafe Web Application Firewall®]) is a creative and amzaing product which can block ALL attacks of Web, File, DNS Game, Game...servers by just ONE product. More...

[iWSafe Web Guard®] integrates Anti-Hackers, Anti-DDoS, Anti-Virus, Anti-Zombies, Anti-Trojan...ALL functions in just ONE product, which means clients don't need deploy other products any more. More...

Although integrate so many functions, [iWSafe Web Guard®] still has incrediable awesome performance as well: CPU<10% and delay<1ms even under 10G attacking... More...

[iWSafe Web Guard®] has three product type: Software, Hardware and DIY (Do It Yourself), which can satisfy ALL scenarios with BEST functions, performance and budget. More...

Introduction

Block ALL with just ONE product

[iWSafe Web Guard®] integrates Anti-Hackers, Anti-DDoS, Anti-Virus, Anti-Zombies, Anti-Trojan...ALL functions in just ONE product, which means clients don't need deploy other products any more. More...

Hackers: Totally block ALL hacker instrusions, such as Port Scan, Zero Day, SQL Injection, Web CMS, Trojan and Web Shell... More...

Attacks: Totally block ALL DDoS, Http Attacks, DNS Attacks and Game Attacks DataBas Attacks More...

Virus: Totally block ALL known WannaCry, BitCoin Virus...all virus. More...

Trojan: Totally block ALL known Active Trojan, Rebount Trojan. More...

Functions

[iWSafe Web Guard®]--ONE product, ALL problem

ALL: One product block ALL attacks of Web, File, DNS Game, Game...servers. More...

Innovative Algorythm: Instead of traditional static policy, [iWSafe Web Guard®] use [Smarter Network Action Analysis®], which has much better accuracy and performance. More...

Kernel Implement: Unlike other Web firewall implement filter function in APP level, [iWSafe Web Guard®] implement ALL filter function in deep kernel level. More...

Easy: No matter Software, Hardware and DIY (Do It Yourself), [iWSafe Web Guard®] supports [Plug and Play®]--install software on the machine or plug hardware into the network, then work well without any setting! More...

Feature

Compare MORE, Better MORE

Better functions: Integrates Anti-Hackers, Anti-DDoS, Anti-Virus, Anti-Zombies, Anti-Trojan...ALL functions in just ONE product--ONE is enough for ALL More...

Better performance: CPU<10% and delay<1ms even under 10G attacking...perfect combination of functions and performance More...

Better usage: Just install onto the OS or plug into the topology, then start to work well even without any extra setting -- real [Plug and Play®] More...

Better budget: ONE equal multiple products, software DIY (Do It Yourself) equal to professional hardware device save lots of money More...

Comparison

[Plug and Play®]--So simple!

[iWSafe Web Guard®] supports [Plug and Play®]: More...

Install: Install software on the machine or plug hardware into the network; More...

Choose one typical pre-setting, such as "Web Server Setting", "DNS Server Setting", "Game Server Setting"...or just "NO (Default) Setting"; More...

Work: [iWSafe Web Guard®] will work well to protect target perfectly More...

Manual

Best performance beyond Better functions

Hackers: Totally block ALL hacker instrusions include Port Scan, Zero Day, SQL Injection, Web CMS, Trojan and Web Shell...and even FUTURE's... More...

Attacks: Totally block ALL DDoS, Http Attacks, DNS Attacks and Game Attacks DataBas Attacks...and even FUTURE's... More...

Virus: Totally block ALL known WannaCry, BitCoin Virus...all virus...and even FUTURE's... More...

Trojan: Totally block ALL known Active Trojan, Rebount Trojan...and even FUTURE's... More...

Performance: CPU<10% and delay<1ms even under 10G attacking due to [Smarter Network Action Analysis®] and [All in Kernel®]... More...

Performance

Software, hardware and DIY (Do It Yourself)--ALL scenario with BEST cost

Software: Kernel level software installed onto Windows, Linux and Bsd/Unix OS directly. More...

Hardware: Special designed, specific and high performance hardware device hardware device. More...

DIY: Install DIY (Do It Yourself) version on common X86 or IA64 server to DIY (Do It Yourself) professional hardware device. More...

Cluster: ALL of Software, Hardware and DIY (Do It Yourself) support Cluster which provide BETTER performance and extensibility. More...

Cloud: [iWSafe Cloud Center®] provide Cloud Web-UI Management which help clients capable of "manage ALL anywhere". More...

Type

Best budget -- One cost more than multiple products

Tips: Software supports ALL OS and protects the host directly; Hardware is specifcally designed with extremely high performance; DIY (Do It Yourself) gets hardware product with just software's cost.More...
TypeVersionMonthly PaymentYearly PaymentComments
prod-ss-soft-pro Professional $150 $1499 Most Functions satisfy most of scenarios.More...
prod-ss-soft-adv Advanced $199 $1999 ALL Functions satisfy ALL scenarios.More...
prod-ss-soft-ent Enterprise $399 $3999 ALL Functions + Cluster +[iWSafe Central Cloud®] = ULTIMATE protection, performance and services.More...
Tips: Support ALL Windows, Linux, Unix/FreeBsd 32/64 bits OS. Please download,install windows version and start to protect; Please contact iWSafe Supporters about how to get and install Linux, Unix/FreeBsd version product.More...
TypeVersionMonthly PaymentYearly PaymentComments
prod-ss-diy-pro Professional $499 $4999 Most Functions satisfy most of scenarios.More...
prod-ss-diy-adv Advanced $799 $7999 ALL Functions satisfy ALL scenarios.More...
prod-ss-diy-ent Enterprise $1499 $14999 ALL Functions + Cluster +[iWSafe Central Cloud®] = ULTIMATE protection and services.More...
Tips: : ALL [iWSafe Hardware Firewall®] has ALL Functions and ByPass, Trunk and Cluster support. Moreover, support SNMP, LDAP, BGP...Free update in maintaining period.More...
TypesHardwarePriceMaintenanceComments
prod-ss-hd-4g-4e 4×1G RJ45 Ports, Mainstream CPU, Memory>64G $12999 20% Specific hardware, support ByPass, Trunk and Cluster, Low cost however high performanceMore...
prod-ss-hd-8g-4o 4×1G RJ45+4×1G Optical Ports, High CPU, Memory>128G $14999 20% Support both RJ45 and optical ports, Both SMF (Single Mode Fiber) and MMF (Multiple Mode Fiber)More...
prod-ss-hd-20g-2e 2×10G RJ45, Top CPU, Memory>128G, Special NICs $17999 20% Special NICs (Net Interface Card), Hardware ByPass, Trunk and Cluster, Linear speedMore...
prod-ss-hd-40g-2o 2×10G RJ45+2×10G Optical Ports, Top CPU, Memory>512G, Special NICs $19999 20% Support BGP reroute and filter, Top telecom company's choice due to extremely high qualityMore...
Tips: Buy multiple can have better price, details contactiWSafe Supporters to know more detals.More...
CategoryFunctionsProfessionalAdvancedEnterpriseComments
Hacker Instrusion Port Scanning Yes Yes Yes Port Scanning is the first step of all hacker instrusions (Tips: [iWSafe Smart Port ACL®] can open or close dymatically)More...
SQL Injection Yes Yes Yes The most historic, basic and popular Hacker Instrusion methods, cause FTP or whole OS crashdownMore...
WebShell Yes Yes Yes Through Webshell to upload Trojan, viruses, control or hacker the server totallyMore...
Upload Trojan Yes Yes Yes Whenver the Trojan is uploaded onto the server, which mean the server has been controled by the hacker totallyMore...
XSS None-Persistence XSS Yes Yes Yes Alias Reflect XSS, Upload XSS code through Http POST directly, which is popular and dangerousMore...
Persistence XSS Yes Yes Yes Alias Persistence XSS (Stored XSS) , Upload aand store XSS code onto victim's disk, persistent damageMore...
DOM-XSS No Yes Yes Upload XSS code through Http POST by DOM leaks, and None-Persistence XSS, more difficult to findMore...
Web Tampering Web CMS Instrusions Yes Yes Yes Most common, basic and popular Hacker Instrusion method. Once the Web CMS is intruded, hacker can upload Trojan and control victim server totallyMore...
FTP Instrusion Yes Yes Yes There are lots of leaks in most FTP applications by through which hacker can instrude the victim server totallyMore...
Port Instrusion No Yes Yes Most of OS Management Port (such as RDP 3389, SSH 22 etc.) are easy intruded by hackers which can be solved by [iWSafe Smart Port ACL®] perfectlyMore...
Trojan Protection Upload Trojan Yes Yes Yes Block the upload of any type of Trojan by analyze the Trojan's action and keywordsMore...
Connect to Trojan Yes Yes Yes Block the connection to an existed Trojan which may uploaded beforeMore...
Reflective Trojan No Yes Yes Block Reflective Trojan perfectly though most other can NO find out because connection is from inside to outsideMore...
Anti-DDoS Syn Flooding Yes Yes Yes The most historic, basic and popular DDoS attack, which make a mass of TCP half-connection until exhaust victim server totallyMore...
Ack Flooding Yes Yes Yes Another classic DDoS attack, which damage the victim server more badly even than Syn FloodingMore...
Bad Packet Flooding Yes Yes Yes Elaborately contruct malicious packets, very few some type of which can crashdown the victim server totallyMore...
Link Layer Flooding Yes Yes Yes Specific attacks to Link Layer protocols, include ARP, SSDP, LLAP...which damage NOT ONLY the victim server BUT ALSO the whole LANMore...
ICMP/IGMP flooding Yes Yes Yes ICMP/IGMP is the basic network protocol which may cause system crashdown directly if being attackedMore...
UDP flooding Yes Yes Yes UDP is connection-less protocol, is the most difficult attack of ALL Anti-DDoS FirewallMore...
TCP Connection Flooding Yes Yes Yes Lots of Null-Connection or Useless ConnectionConsume TCP/IP stack (iWSafe unique: Session level block instead of Ip level block, No false-positive)More...
DrDos flooding Yes Yes Yes Notorious Reflect DDoS, amplify the attack traffic, more damageMore...
DNS Attacks DNS Query flooding Yes Yes Yes The most historic, basic and popularDNS Attacksmethod, multiple threads program to send DNS queried frequently to exhaust system resouces (iWSafe Advantage: Better efficience)More...
DNS False Request Attack No Yes Yes Different from traditional DNS Attacks ways, simulate normal Dns requests, very difficult to distinguish (iWSafe Advantage: Some specific attacks, Only iWSafe can protect)More...
Game Attacks Multiple Connection Attacks Yes Yes Yes Lots of Null-Connection or Useless Connectionexchaust system resouces until crashdown (iWSafe unique: Unique [TCP Session Level] protection technology, No false-positive)More...
Game False Request Attack No Yes Yes Specific to Game protocol, simulate normal user's operations, very difficult to identify, high damage, easy to false-positive (iWSafe unique: Unique [Protocol analysis®] protect technology, No false-positive)More...
Http/CC Attacks Http GET/POST flooding Yes Yes Yes The most historic, basic and popularHttp/CC Attacks, Send huge Http request to exhaust victim server's resouces until crashdownMore...
Http/CC Attack Variety No Yes Yes Specific constructed Malicious Http Protocol Packet, very few attack packets can crashdown victim server (iWSafe unique: Some specific Http/CC variety attack, Only iWSafe can protect)More...
Other Attacks None-Ethernet Frame Attacks Yes Yes Yes Malicious Link Layer Frame attacksNone-Ethernet FramePacket exchaust low-label protocol stacks until crashdown (iWSafe unique: Accurately distinguish None-Ethernet Frame, protect accurately)More...
Specific Application Attacks No Yes Yes As to specific usersSpecific Application attacks, specific and extremely accurate (iWSafe unique: Customized development for specific protocols, accuracy, high performance and zero false-positive)More...
Safe Service Safe Check No No Yes Do professional check to find out security risksProfessional Risk Check, find out existed or potential security risks (iWSafe Advantage: Specific to application Professional Security Check, no general)More...
Secure Solution No No Yes Specific to network topology, security risks, applications Professional Secure Solution (iWSafe Advantage: Not only more secure, more efficient, more application)More...
Secure Maintenance No No Yes 7×24 people support , Software Management, maintenance service, periodicallyrisk check, update the system and Software, update settings and apply new settingsMore...
Secure Update No No Yes Connect into [iWSafe Cloud Center®] maintain, once there is new version, note the clients and help to update, Software, and make corresponding settingsMore...

Please access internet to read details of the term