MONITORAPP

Your Preferred MONITORAPP Partner

J&M Eastern Group is a MONITORAPP supplier in Malaysia that specialises in MONITORAPP Products. As one of the top MONITORAPP partner and reseller in Malaysia, we carry a wide range of MONITORAPP products such as Web Application Firewall(WAF) to meet your requirements and quickly respond to the demands of your business. Our team is well experienced with MONITORAPP products, solutions and services.

MONITORAPP Co., Ltd is a company which performs R&D for various application acceleration technology and application security technology based on high performance application proxy technology to ensure fast and safe application delivery.

Looking for MONITORAPP supplier in Malaysia?
As a leading MONITORAPP partner and supplier in Malaysia we specialize in MONITORAPP Products: Application Insight Web Application Firewall (AIWAF).

PRODUCT LINEUP

AIWAF Physical Appliance
AIWAF-VE Virtual Appliance
AIONCLOUD WAF SECaaS

PRODUCT OVERVIEW

The web is vulnerable. Because the HTTP/HTTPS ports must always be open to show the Web to clients, various attacks can be introduced through them. MONITORAPP’s web application firewall, AIWAF is specialized for traffic-based detection of hacking attempts using vulnerabilities in the Web and for controlling access to servers. Web attacks are evolving every day, causing malicious traffic or falsifying request information. Only WAF that does not stop ongoing development to respond to new types of web attacks can do the right thing. The answer is AIWAF in MONITORAPP.

Protect both Application and APIs
As the use of the cloud increases, security issues in web applications and APIs are emerging, and attacks targeting them are increasing.
MONTIORAPP’s web application firewall is evolving from a traditional web security platform to Web Application & API Protection (WAAP), which integrates API security, DDoS protection, and bot management. Secure your business assets against advanced cyber threats with a stronger MONITORAPP AIWAF.

KEY BENEFITS

Complete web server securityEasy management and operation
  • Comprehensive web attack detection through request and response data parsing
    • Request-based attacks such as SQL/LDAP Injection, XSS, CSRF, Web Shell, Overflow, etc.
    • Response-based attacks such as Directory Listing, Error page and comment clocking, etc.
  • Detect Unknown Attacks through Machine Learning & Threat Intelligence
  • Decode double & multi-encoded traffic
  • Prevention of leakage of major server information and personal information
  • Analyze and detect traffic accessed by using Script, Bot, etc.
  • Malware detection and APT response through web server response page analysis
  • Support Full HTTP/2 connection and same security features as HTTP/1.1
  • Full-transparent proxy mode that does not affect the existing network
  • HA (high availability) : active-standby, active-active
  • Integrated dashboard for all or specific website status
  • Differential policy setting and administrator designation for each website
  • Logging request/response data in detection log and highlighting detection grounds
  • Customizing monitoring contents such as ESM and SNMP
  • Web cache and QoS to improve web service quality
  • Server Health check and Traffic Load Balancing
  • Transmit decrypted HTTPS traffic to 3rd party solution

KEY FEATURES

Various network configuration mode

  • In-line: Full Transparent Proxy
  • Out-of-path: Reverse proxy, Mirroring

Passive Mirror

  • Transmit decrypted HTTPS traffic with 3rd party security solution

Threat intelligence Platform

  • Real-time threat information update by AICC
  • Client via Proxy, Black Client, C&C Traffic

Machine Learning

  • Determine attack traffic and presenting predicted probability for each policy

Adaptive Profiling

  • Profile database construction for normal request and response data by self-learning engine
Full HTTP/2 Support

  • Complete HTTP/2 connection and parsing
  • Provides the same security features as HTTP/1.1

ATP attack defense

  • Detect destination/distribution abuse by malicious code
  • Malware detection through response data body analysis

Security optimization

  • Detailed control of each individual security rule and pattern
  • Self-test function for established security policy

Traffic optimization

  • Web Server Load balancing
  • QoS(Bandwidth Limit) setting for each domain
  • URL Rewrite (Request/Response)
Web acceleration

  • Reduce traffic and response time through web caching

Bot detection

  • Malicious Bot used for Brute Force, Scraping, Denial of Inventory, Credential Stuffing, etc.
  • Bot traffic identification through various mechanisms such as Java Script Injection and Human interaction

Multi-Layer Web Attack Defense

  • Comprehensive defense against known web attacks such as OWASP TOP 10 attacks, Injection, XSS and HTTP Application Dos through various detection algorithms such as Signature, Threshold Limit, and Profiling

Pattern Update

  • Monthly pattern update
  • Real-time update and notification of emergency vulnerabilities

AIWAF MODELS & SPECIFICATIONS

It’s written based on AIWAF APPLIANCE’s standard workload, and actual performance can vary greatly depending on workload requirements.

SpecificationAIWAF-100_Y20AIWAF-200_Y20AIWAF-500_Y20AIWAF-1000_Y20AIWAF-2000_Y20AIWAF-4000_Y20AIWAF-8000_Y20
RAM4GB8GB (Max 128GB)16GB (Max 128GB)32GB (Max 2TB)32GB (Max 2TB)64GB (Max 2TB)64GB (Max 2TB)
HDD500G500G500G2TB2TB2TB2TB
MGMT/HA·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

·       Mgmt 1 UTP Port

·       HA 1 UTP Port

Network (Default)1G UTP*21G UTP*41G UTP*4
Network (Option)Slot 1

·       1G UTP 4Port

·       1G Fiber 4 Port

·       10G Fiber 2 Port

Slot 1

·       1G UTP 4Port

·       1G Fiber 4 Port

·       10G Fiber 2 Port

Slot 8

·       1G UTP 4Port

·       1G Fiber 4Port

·       10G Fiber 2Port

Slot 8

·       1G UTP 4Port

·       1G Fiber 4Port

·       10G Fiber 2Port

Slot 8

·       1G UTP 4Port

·       1G Fiber 4Port

·       10G Fiber 2Port

Slot 8

·       1G UTP 4Port

·       1G Fiber 4Port

·       10G Fiber 2Port

CPS HTTP/HTTPS·       5,000

·       1,500

·       30,000

·       10,000

·       55,000

·       15,000

·       130,000

·       35,000

·       200,000

·       50,000

·       250,000

·       70,000

·       350,000

·       100,000

TPS HTTP/HTTPS·       9,000

·       5,000

·       55,000

·       35,000

·       80,000

·       55,000

·       250,000

·       100,000

·       300,000

·       150,000

·       400,000

·       200,000

·       550,000

·       300,000

Throughput HTTP/HTTPS·       400M

·       200M

·       2G

·       1G

·       4G

·       2G

·       10G

·       5G

·       14G

·       8G

·       15G

·       9G

·       16G

·       10G

Get MONITORAPP Pricing

To receive MONITORAPP price, please send us a message >