APPLICATION Security The Platform
TR7 ASP® provides both Positive Security and Negative SecurityModels withwebservices And applications
for protection provides. Brute Force, SQL Injection, Cross-Site Scripting, Cross Site Request Forgery,
Parameter Tampering, Session High-Jacking, Buffer Overflows, Cookie Manipulation,Enconding
Attacks, Broken Access Control, Forceful Browsing, Hidden Fields Manipulation, Request Smuggling,
Remote File Inclusion, Directory Traversal, EvasionAttacks, Sensitive Information Leakage, Scanner
Attacks, Field FormatAndField Consistency Checklike to attacks opposite protection can provide.
WAAP (API)Security
TR7 ASP®, webservices And applications for different control areas with your wishes bodyParsedoes
AndAPIfor Structural Validity Control, BodySize,Authorized And Compulsory Variable Controls,Key
Validity,The argument Control,IncorrectAPIRequests for arrangeable contents page AndOWASPsignatures
with security provides.
DNS / FKMManagement
TR7 ASP®, GTMmodule withAuthoritative DNSservice, DNS Forwardingservice, FKMservice to ensure
It is possible.Disaster instantlywebservices And applications traffic other data to their centers
to direct or webto their services incoming Requests different data to their centers weight to the rate according to
to direct And uninterrupted One service to ensure for It is designed.
L3, L4, L7Load Balancing
TR7 ASP®One physically hardware or virtual device aspect positioned in the networksLayer 3, Layer 4And
Layer 7protocols user physically hardware or virtual to servers wisely load balancing
can do.TodayOne ArmTopology, Two Arms (CoupleArm)Topology, DirectServer
Returnlike known all Load Balancing to their topologiesTR7 ASP®devices simple One in this way
can be positioned.TR7 ASP®devices located in the networks cable like actingInlineIn the mode
incan be positioned.
