-
Graphically integrated in cPanel/WHM®: The firewall is seamlessly integrated into the cPanel/WHM control panel, allowing for easy access and management of firewall settings through a user-friendly graphical interface.
-
Realtime HTTP Upload Inspector: The firewall includes a real-time inspection system for HTTP file uploads. It actively monitors and scans files being uploaded via HTTP, ensuring that malicious files are detected and blocked immediately.
-
Realtime FTP Upload Inspector: Similar to HTTP, the firewall also features a real-time inspection system for FTP file uploads. It scans files being transferred via FTP in real-time to prevent any malicious content from entering the server.
-
HTTP Firewall: The firewall provides a robust layer of protection for web applications by filtering and monitoring HTTP traffic. It can detect and block malicious HTTP requests, preventing attacks such as SQL injection and cross-site scripting (XSS).
-
More than 4.000.000 of Virus Definitions: The firewall maintains a vast database of over 4 million virus definitions. These definitions are regularly updated to identify and quarantine known viruses, malware, and other threats.
-
Mod Security Additional Rules: This feature enhances the ModSecurity module by adding custom rules that further bolster security. These rules help protect against specific threats and vulnerabilities not covered by standard rules.
-
Heuristic & Polymorphic Recognitions: The firewall employs heuristic analysis and recognizes polymorphic threats. Heuristic analysis involves identifying suspicious patterns or behavior, while polymorphic recognition deals with detecting malware that constantly changes its code to evade detection.
-
Advanced Code Analysis: The firewall conducts in-depth code analysis to identify potentially malicious code or scripts. It examines the code for patterns, behaviors, or characteristics commonly associated with malware.
-
WordPress & Joomla Brute Force Protection: Specifically designed for popular content management systems like WordPress and Joomla, this feature guards against brute force attacks on login pages. It limits the number of login attempts and blocks IP addresses attempting unauthorized access.
-
Phishing Blocks: The firewall includes mechanisms to detect and block phishing attempts. It can identify and prevent websites or content that impersonates legitimate entities to steal sensitive information.
-
Automatic Scans: The firewall performs automatic scans of the server and its contents at regular intervals. These scans check for any signs of compromise or malicious activity, allowing for proactive threat detection and mitigation.
-
Automatic New File Scans: Whenever new files are added to the server, the firewall automatically scans them for potential threats. This ensures that any newly introduced files are immediately checked for malicious content.