Signal Sciences Recognized as a Visionary in Gartner Magic Quadrant for Web Application Firewalls Two Years in a Row

We’re thrilled to announce that Gartner has named Signal Sciences a Visionary in the 2020 Magic Quadrant for Web Application Firewalls (WAF)1 for the second year running. Last year was our first entrance in the 2019 Gartner Magic Quadrant for…
The post… Continue reading Signal Sciences Recognized as a Visionary in Gartner Magic Quadrant for Web Application Firewalls Two Years in a Row

The Inside-Out Application Security Opportunity with RASP

Digital transformation projects demand that developers continually roll out new applications to fuel those efforts. These new applications and APIs can surface sensitive data and must be protected in production: RASP (runtime application self protectio… Continue reading The Inside-Out Application Security Opportunity with RASP

Evaluating WAF solutions? Know the Key Considerations for Replacing Legacy WAF

We hear often from customers who replace a legacy web application firewall (WAF) with Signal Sciences next-gen WAF about why they made the switch. Almost always, those reasons are a variation on the following themes: Legacy WAF costs too much…
Th… Continue reading Evaluating WAF solutions? Know the Key Considerations for Replacing Legacy WAF

Signal Sciences Introduces Advanced Rate Limiting for Fast, Easy Protection Against Advanced Web Attacks

Signal Sciences is excited to announce the availability of new advanced rate limiting features that extend our customers’ ability to detect and stop abusive behavior at the application and API layer. Over the past several weeks as part of our&#82… Continue reading Signal Sciences Introduces Advanced Rate Limiting for Fast, Easy Protection Against Advanced Web Attacks

Cyberattacks Are Changing: Here’s How

Cyberattacks are changing. Exponential increases in how businesses and consumers engage with technology on a daily basis has unleashed an ever-expanding array of attack surfaces and vectors. And we’re feeling the heat. The “we” in this case, are the i… Continue reading Cyberattacks Are Changing: Here’s How