Knowledge Director at Alert Logic
Thank you for submitting your idea Dean! I've passed this feature request on to our Product Management team.
Alert Logic is always evaluating the requirements of our customers to find security standards to support. With the shifting landscape of compliance and security standards, we review our list of sup...
Alert Logic® encourages Community members to share their cloud security and compliance knowledge for the benefit of all. When engaging with us and each other, it is important to be respectful. Dos ...
Other than the base rule set, which is quite vast and covers the OWASP Top 10 plus many known vulnerabilities, you can add regex-based, URL-based, and/or path-based detection rules. It all depends ...
This depends on the deployment type and severity of the attack. If deployed in AWS, then any DOS protection would be handled by AWS or Route 53, if used.For VM or Hardware, WSM has DOS Mitigation f...
WSM and WSM Premier can be configured for HA as either an Active-Passive or Active-Active pair. In an Active-Passive setup, one appliance serves all requests while the passive appliance drops the ...
Alert Logic® Web Security Manager (out-of-band) and Alert Logic Web Security Manager Premier (inline) can be deployed in a variety of platforms and scenarios. They are currently supported in physic...
Out of Band Web Security Manager (WSM) does not do any blocking. It does take advantage of the learning engine, which helps in learning the difference between good and bad traffic within your envir...
Threat Manager requires the Alert Logic Appliance (physical or virtual) in every deployment in which we engage. The Alert Logic Agent is required in public and private cloud environments on any hos...
Yes, the traffic between the agent and appliance is encrypted, but not by default. Refer to our Is traffic between the agent and appliance encrypted? knowledge base article for further and up-to-da...