High Availability
GP Website Firewall is a distributed network of independent nodes strategically located worldwide. Users are automatically assigned the closest node to their domain hosting for optimal speed and response time. In case of node issue, requests are seamlessly redirected to another node, ensuring uninterrupted service. The firewall system can enter “shadow” mode; during “shadow” mode, the original website security firewall node disconnects from the internet, while another node takes over. This transition occurs regularly, making it nearly impossible to determine the exact location of the firewall data, enhancing privacy and security. GP Website Firewall has multi-level backups with continuous database synchronization. The architecture is provider-independent, and the website and dashboard operate independently: This means that even if one or both of these components experience downtime, it does not impact the functionality of the WAF. With our unique architecture, Genius Plugin is likely the first and only firewall solution that ensures your website remains up even if the firewall goes down. Unlike classic cloud CDN/DNS-based solutions or firewalls hosted on the same server as your application, which can cause downtime for many reasons, our firewall guarantees uninterrupted service. Even if our entire system fails, which is highly unlikely, your website will continue to function seamlessly.
Simulator Mode
It simply allows you to simulate the behavior of your WAF to visitor access. This makes it possible to see live Website Firewall ruleset decision to any given ip. Guru clients can be sure that their complex settings behave exactly as needed. With the simulator, you can assess the potential impact of rule changes on a special ip before applying them for the long term. This allows you to evaluate the risks associated with certain rule adjustments you just made and make informed decisions to maintain the desired security posture. For organizations that need to comply with specific security standards or regulations, the simulator helps in compliance testing.
Live WORLD Cyber Attacks Map
The Live World Cyber Attacks Map provides real-time visualization of website or application access hits in an interactive and graphical format. This powerful tool allows users to stay informed about incoming traffic and potential attacks, helping them to proactively respond and stay ahead of security threats.
The map displays the top 20 new access points, highlighting the 10 latest sources of both legitimate visitors and potential attacks. With its visually appealing Network Operations Center (NOC) view, some customers have even utilized this feature to showcase or communicate their website traffic in an impressive manner. It serves as a comprehensive overview, allowing users to understand the overall picture of their web traffic and take necessary measures to ensure the security and stability of their online presence.
Captcha human challenge
This function can be enabled for visitors which are about to be denied access by your ruleset, but still you give them a chance to visit your website, only if they have not tried to cross your website Security firewall “red lines”. CAPTCHAs are used to weed out bots with a test meant to be easy for humans and hard for bots. We use hCaptcha as it’s the only one with privacy focus and complies with GDPR, LGPD, PIPL, CCPA. It protects your services from scraping, credential stuffing, account takeovers, spam and more with AI technology. It uses simple tasks and takes less time for most users while stopping more bot traffic.
Fingerprint scanner (optionnal)
Website attacks can often leave a “fingerprint” that can be used to identify the type of attack and the techniques used by the attacker.
We use these fingerprints to identify the source of the attack and to take steps to prevent similar attacks in the future. Among the digital trails used:
Access logs: Detailed records about requests made to the website wich provide valuable information the techniques used by the attacker.
Malicious payloads: Some attacks involve sending a payload of malicious code to the website, such as an exploit or a script that leave a distinctive signature.
Traffic patterns: Many attacks involve sending large volumes of traffic to a website in an attempt to overwhelm the server or to disguise the attack as legitimate traffic.
Analytics in deep
We offer an extensive range of statistical graphs and charts that offer valuable insights into the actions taken. These visual representations provide detailed information, including the user’s IP address, country, hosting server, identification as a bad IP, and whether they are flagged as a bot, VPN, or proxy. Additionally, we provide data on authorized search engines and more. GP goes beyond just blocking users; it provides comprehensive information about the reasons behind user blocking, the frequency of web application hits, and the timestamps of their first and last recorded accesses. To make data exploration and analysis even more convenient, our platform features a powerful search engine and advanced filtering options. You can effortlessly locate, organize, and export all the valuable insights in CSV text format for further examination and decision-making.
Intrusion Prevention Intelligence
The GP IPS (Intrusion Prevention System) is a powerful security service designed to protect your website from various types of attacks. Unlike traditional approaches that involve stripping, sanitizing, or filtering input, the GP IPS takes a different approach. It focuses on detecting and recognizing when an attacker attempts to compromise your site and then denies them access.
The GP IPS operates in two modes: ‘Balanced’ and ‘Ironclad’. In ‘Balanced’ mode, it provides a strong level of protection, while in ‘Ironclad’ mode, it offers an even more robust defense. By choosing the appropriate mode, you can mitigate a wide range of attacks, including Cross-Site Scripting (XSS), SQL Injection, Remote File Inclusion (RFI), Local File Inclusion (LFI), Remote Code Execution (RCE), Cross-Site Request Forgery (CSRF), Directory Traversal, Insecure Direct Object References (IDOR), and Command Injection.
One of the key features of GP IPS is its ability to provide detailed information about attacks on your site. It allows you to identify the attackers, analyze their methods, determine the timing and frequency of attacks, and gain valuable insights into their behavior. This information can be crucial in understanding the threat landscape and implementing additional security measures to safeguard your website.
Enhanced Privacy and Data Protection
The Website Firewall is specifically crafted to prioritize privacy, confidentiality, and data protection, offering the best array of features and actions to secure sensitive information.
Contrary to the majority of competitors, clients maintain control over the data sent from the WAF setting console (dashboard) and the plugin code before actual transmission, distinguishing Genius Plugin from its counterparts. Users can selectively activate or deactivate the transmission of various data types, such as POST content, often containing sensitive information. Additionally, they have the ability to enable or disable the sending of HEADER data associated with each request, along with the option to activate or deactivate user intelligence tracking.
Genius Plugin stands out as the first Firewall providing the capability to transparently and directly filter each POST and HEADER variable within the plugin code, offering unparalleled granular user control over the data sent to the firewall.
To ensure privacy compliance, we leverage hCaptcha as our human challenge system. hCaptcha adheres to privacy-focused regulations such as GDPR, LGPD, PIPL, and CCPA, assuring the protection of user data.
A pivotal privacy-enhancing measure is that GP does not retain any POST, HEADER, or user tracking intelligence data. It analyzes the data on the fly, storing only the visitor’s IP and the URL request, minimizing the risk of data exposure. Only a few essential fragments of attacks are retained to empower users to enhance their website protection.
In an additional layer of data safeguarding, rulesets, which may contain fragments of visitor data (IP & URL), are not retained for more than 60 days. This ensures that potentially sensitive information is not stored longer than necessary.
Fast and floating
One of the many unique function is the load average time floating locket.
The locket displays the overall average time spent to respond your web application.
So, we may say as all say, we are fast. Still, we may be the only WAF to provide load time data.
The average time hit request over a month, for hard ruleset takes about 0.2 second. That simply means, as about more than half the ruleset tends to be soft, you are likely to have your requests completed in less than 0.09 second.
You see each visitor request load time along with it’s full moves through your pages.
Each single request is recorded and response load-time is analysed to bring you the best WAF autonomous and reliable system.
My Home Your idendity
Proxies, Tor and VPNs can be used by malicious visitors to hide their identity and carry out nefarious activities online.
In fact, these tools are in almost all cases used by cybercriminals to cover their tracks and avoid detection.
A cybercriminal might use a proxy server to hide their IP address and location when carrying out a phishing attack or
distributing malware. They might use a VPN to encrypt their traffic and avoid detection when carrying out a hacking operation or
stealing sensitive data.
With millions ips we track, they can’t hide to your WAF. This ensure:
• You can deter adversaries from causing trouble in services or applications.
• You can help combat spam and prevent fraud.
• All automatic malicious website attacks are stopped.
• Hacker must reveal his idendity to attack you. Who does it?
• It will strengthen and accelerate your KYC (know your customer) process.
Beyond the crucials
3 crucials facts about firewalls:
• A website or service protected by a firewall of which the entire code can be analysed, is just lines of code that has already been bypassed by hackers.. logic!
• If you rely on a WAF solution that requires you to use a CDN or change your domain nameservers, you could be sending sensitive information such as passwords, client details, invoices, and emails, and relying solely on the trustworthiness and integrity of the WAF provider.
• Security experts shun CDNs as firewalls due to various risks. Avoid being misled by marketing tactics and try to google “public cdn risks” for more details.
GP has released plugins for WordPress, Joomla, Clientexec, WHMCS, etc., covering all sensitive parts of these web applications. This allows you to add protection either globally or on a per-page basis, providing comprehensive security solutions. We have released a universal plugin you can implement on most web application and yes, you may say goodbye to “htaccess” protection, the webarchive, the robot.txt disallow etc..
Red lines ambush
Red lines ambush are hidden limits you set, beyond which, the visitor is simply denied access temporarily or permanently.
How many pages can a human visit per minute? 1, 5, 10, 15.. sure no more.
This is one of the red lines you can trace, so that malicious behaviors are ambushed.
How many times a visitor can try to access pages that does not exist, or that you don’t want him to access to, before you ban him temporarily?
How many times a visitor attempts to make bad requests, you previously determined as being bad requests, for example, because the url address contains prohibited words or requests, before he is denied access?
What is the ultimate number of bad behaviour records, beyond which, the visitor is “killed” permanently?
We made red lines ambush so fast and easy to use, yet so powerful, that you will enjoy seeing malicious persons and robots fell into ambushes.
Regex all web addresses
A regular expression, commonly known as regex, is a powerful tool used to define filters for validating or invalidating specific strings or patterns of text in the URLs (web addresses) of your website. By utilizing regex, you have the ability to accept certain strings while rejecting others based on your defined criteria.
For instance, let’s consider a basic example where you want to deny access to any IP (visitor) attempting to access the web address example.com/admin/ that contains the word “admin.” This easy to use restriction helps enhance the security of your website’s back-office, allowing only specified individuals to access it. This example highlights how regex renders traditional techniques like “htaccess” requirements, password brute force attacks, maintenance pages, and 0-day vulnerabilities obsolete, thereby streamlining and improving the overall protection against such threats.
Impressive visitor tracer
We provide over 60 details for each visitor access, offering valuable information for customer profiling and commercial purposes. Additionally, we provide contact details such as phone numbers and organization emails to address any related abuse. The IP table serves as a robust visitor tracer, enabling you to efficiently filter, order, and search through hundreds of thousands of data entries from your mobile or desktop. With a connected console and a range of commands, you have the ability to take action remotely, including “kill,” deny, allow, trust, etc.. any visitor, wherever you are.
1-click setup
While many concurrent solutions require hours or even days of manual setup to ensure proper firewall configuration, GP Website Firewall offers a seamless and effortless way to secure your website with just 1 click. No reading, choosing, or analyzing is necessary on your part. It is the best Website Firewall that eliminates the hassles of dealing with complex settings. Moreover, it identifies attacks, and denies access to the malicious source. With GP website Security firewall handling your security, you can focus on selling, communicating, and enjoying your life. The 1-click setup is capable of blocking most malicious traffic, and if desired, you can fine-tune your firewall settings with either the Newbie or Guru mode, catering to the best of your level of expertise. The firewall is extremely easy to use.
Anywhere Anytime
Stay free! GP is easy to use, portable, mobile friendly and easy to use from anywhere, on-the-go.
You can quickly check notifications, or make updates while away from your desk, providing you more flexibility and convenience.
You stay informed about your traffic, swiftly set deny rules to address any issues or concerns, and proactively prevent potential attack problems from escalating.
It will also improve collaboration with team members sharing your firewall administration in real-time, anytime anywhere.
Shared Token
Our token-based authentication feature offers a streamlined solution for managing access to your website’s back office. Traditionally, ensuring secure access for multiple administrators, especially those without static IPs or dedicated VPNs, has been a cumbersome task. However, with our token-based system, this process becomes effortless.
Instead of dealing with complex keys or cumbersome access controls, administrators can generate unique tokens—essentially, special links—that grant instant access to the back office. These tokens act as secure gateways, eliminating the need for static IPs or VPNs while maintaining robust security measures.
One of the key advantages of this approach is its simplicity and versatility. Administrators can revoke or regenerate tokens at any time. Administrators can easily share these tokens with team members or collaborators via email, messaging apps, or any preferred communication channel. Each token provides secure access for the recipient, ensuring that only authorized individuals can edit or manage the back office.
Score Fraud Intelligence
4.2% of Web traffic is malicious and about 30 000 Websites are hacked every day. But this is also the ‘fingerprint’. We combine different effective, accurate and reliable security technologies, which makes our fraud detection mechanism, probably, the best reliable service and tracking a large scale of ips on the web. These technologies are relaying on the ip history, location, activity.. we can then set an efficient fraud probability score for each ip address visiting your website. We use a soft scoring; that means that a visitor has to hit a certain probability beyond what, we are almost sure it has to be considered malicious, otherwise we let it go.
Our solution is an easy to use WAF, designed to cater to both beginners and experts in website security. While we offer a wide range of powerful functions and features, we have ensured that it remains incredibly easy, especially for those new to web application security. Our intuitive newbie mode provides a simple setup process, allowing beginners to quickly get started in seconds. On the other hand, our guru mode offers advanced configurations and empowers experienced users to enhance the security of their web applications to the fullest extent.
All packages, including the free version, come with access to almost all the functions and benefits.
Automatic Traffic Filtering | |
---|---|
Enhanced Privacy and Data Protection | |
Custom Firewall rules | |
Front office IP & CIDR whitelisting | |
Front office IP & CIDR blacklisting | |
Back office IP & CIDR whitelisting | |
Back office IP & CIDR blacklisting | |
Front office Geolocation blocking | |
Back office Geolocation blocking | |
Page requests rate limiting by time | |
Front office URLs and requests filtering | |
Back office URLs and requests filtering | |
URLs filtering rate limits by time | |
Search engines & Hosts whitelisting | |
API Front | |
API Back | |
Full API Block | |
WP XMLRPC | |
Search engines & Hosts blacklisting |
Attacks Protection | |
---|---|
XSS (Cross-Site Scripting) protection | |
SQL injection protection | |
File inclusion protection | |
Command injection protection | |
CSP – Content Security Policy | |
CSRF (Cross-Site Request Forgery) protection | |
Web scraping protection | |
MIME type sniffing protection | |
Referrer-Policy | |
HSTS | |
Intrusion Prevention Intelligence (IPS) | |
IPS POST Exclude | |
IPS Header Exclude | |
Captcha human challenge | |
IP obfuscation detection | |
Bind User Agent | |
Bind to IP | |
Absolute Timeout | |
Idle Timeout | |
Score Fraud Intelligence | |
SSL/TLS encryption enforcement | |
Brute force attack mitigation | |
Two-Factor | |
CAPTCHA Challenge Tracker | |
Fingerprint scanner | |
User agent filtering | |
POST size LIMIT | |
Private POST | |
GET size LIMIT | |
HEADER size LIMIT | |
Private Headers | |
Strict Pages View | |
Strict Method(s)/page | |
Strict Key(s) Method(s)/page | |
Strict Key(s) value(s) Method(s)/page |
Security Monitoring and Management | |
---|---|
Real-time traffic monitoring | |
Security event logging export | |
Analytics Export | |
Visitor tracer | |
WAF Profile & Rules Management | |
Logs Watch | |
File Watch | |
Security notifications/alerts | |
Security analytics/reporting | |
Centralized management and monitoring | |
SSL Monitoring | |
DNS Monitoring | |
Major search engines database accuracy | |
IP abuse contacts listing | |
Web application vulnerability scanning | |
Simulator Mode | |
Live world cyber attacks map v.1 | |
Live world cyber attacks map v.2 | |
Token-Based Authentication |
Other Features | |
---|---|
Plugins | |
Custom Lockout message | |
1-click setup | |
Security Assessment Report | |
Security Assessment Score | |
Security Assessment Certification | |
Secure ticketing support 24/7/365 | |
Chat Support | |
Phone support 24/7/365 | |
Manual WAF Rule Review by Experts: 30mn/Month |
Wordpress, Joomla, WHMCS, Clientexec, any php open source or custom script.. GP WAF is designed for everyone.