The Pulse Secure Blog

Exploring and Discussing Secure Access Trends and Technologies

Virtualized Application Security with Pulse Secure Web Application Firewall (WAF)

Today, software development has become a race where software engineers strive to build bigger and better applications, but this comes at a cost. With many deadlines and deliverables to meet, the quality of software development has decreased and the focus is placed on who delivered, who released the application first and creating apps that generate revenue the fastest. With aggressive development timelines, basic programming practices are ignored, and weak architectural design tends to be become inevitable. On a monthly basis, new security vulnerabilities are reported, and such attacks can be very costly as it triggers system downtime, information data leakage, denial of service attacks, and eventually could result in a company’s loss of brand credibility.

In today’s race to development, applications can be protected by Pulse Secure Virtual Web Application Firewalls (vWAF). With Pulse Secure vWAF, applications are protected against known and unknown attacks at the Application layer while meeting the latest OWASP Top 10 compliancy, PCI-DSS compliance requirements and increases application security posture.

Pulse Secure vWAF can be deployed in three different form factors: (1) as a standalone WAF, (2) as a distributed WAF (separate Enforcer, Decider and Administration modules) or (3) integrated with Pulse Virtual Traffic Manager (vTM). Pulse vWAF can be deployed in virtual or cloud platforms, and also offers a bare metal deployment option. With Pulse Secure vWAF, you can rest assured that your applications are protected from the latest and current security vulnerabilities such as cross-site scripting (XSS), Injection Flaws, SQL Injection, Cross-Site Request Forgery (CSRF) and many other known vulnerability attacks. The time is now to build robust applications with best-in-breed Secure Access. Learn more at