Web Server & Cloud Computing Security Solution

WARSS

Real-time website forgery detection and recovery

Website Hacking

Threat actors, taking advantage of various weaknesses in information systems, gain access to a system and launch attacks such as webpage defacement, changing web server source code, data forgery, and/or modifying website content (e.g. image files and videos).

  • Source code and data forgery attacks

  • Website defacement

  • Content alteration (images, video, etc.)

Website attack restoration security solution

Real-Time Web Security Solution

WARSS provides comprehensive and real-time security against website attacks, setting it apart from other methods like web crawling.

WARSS for Cloud

Scale In/Out

Automate detection and registration of detection targets when a web server or WAS is scaled

History Management

View and manage Agent statuses and operation history (installations, pausing, etc.)

Home Directory Detection

Auto-detect and schedule WEB/WAS home directory changes or additions; automatically search for home directories

Event Duplication Management

Prevent duplicate detection events; detected events transmitted in real time

WARSS Operation Diagram

Secure Your Website in Real-Time with WARSS

When WARSS (Website Attack Restoration Security Solution) detects changes to a website’s contents, it restores them back to their original files in real-time

  • Homepage source file/data forgery detection and notification

  • Restoration of real-time original files when forgery is detected

  • Re-designation restored files to the original source in real time

WHY CHOOSE UMV?

Trust

Excellence

Stability

Explore Other UMV Products

What kind of web content can WARSS monitor?

WARSS can monitor and protect all website content, including source code, images, and videos.

Do WSS and WARSS have similar functions?

WSS and WARSS both strengthen web server/WAS security by performing detections in real-time.

WSS detects and quarantines web-based malware, whereas WARSS detects unauthorized additions/changes/deletions to web server/WAS source code files.

How does WARSS respond when an unauthorized change is detected in real-time?

When WARSS detects an unauthorized change to a web server file, the changed file is immediately restored to its original state from a stored backup. Notifications are also sent to an administrator, who can then compare the changed file with the original to analyze the attempted deletions, changes, and additions made to the file’s source code.

I already have multiple agents on my web server/WAS. Won’t adding another slow it down?

WARSS requires the installation of an Agent program onto each web server/WAS that needs to be protected. However, WARSS is extremely lightweight, and is designed to minimize resource usage (i.e. less than 1% CPU), ensuring that no impact is made to your web server/WAS’s normal functions.

How does WARSS compare to an agentless solution in terms of security?

Agentless anti-forgery solutions like scanners are almost always connected to the inernet through external networks. This means that the solutions themselves can introduce further security vulnerabilities to your network. On the other hand, all components of the WARSS system are fully internal, allowing you to retain the highest level of security for your server systems.

Are demos or PoCs available for WARSS?

Yes, we offer PoCs for WARSS. One of our engineers can help you get started and give you a run-down on its features. We can work with you to organize a PoC schedule and provide you with a checklist that allows you to see WARSS in action firsthand and learn how it will fit into your unique IT environment.

Contact us for more information on PoCs.

How much does WARSS cost?

WARSS is available under a variety of different licenses, which can be customized to the needs of our customers. Please contact us for more detailed pricing information.

Sign up to receive updates on blog posts and UMV news!

Go back

Thank you for subscribing to our mailing list.

Warning
Warning.