Shielding-with-a-service

RedShield addresses the problem of how to use security tools effectively in a model called “with-a-service”. Using custom shields, deployed on a function as a service (FaaS) platform and serviced by supervised AI that does all of the heavy lifting, we deliver effective security as an outcome.

Shielding plans

Shielding application vulnerabilities is our superpower, and we offer two simple shielding plans that scale with your needs. Each plan also comes complete with our standard infrastructure, platform, and services features.

Shielding levels and inclusions

  • Standard shields to protect apps from common web attacks

  • Advanced shields to fix common vulnerabilities identified in penetration tests. 

  • Custom shield development

Shielding vulnerabilities in detail
product_badge_shield

Shield

Shield is ideal for smaller organizations that want to block bots and malicious traffic without disrupting legitimate traffic. Complete with our standard features, Shield provides advanced security and improved performance so you can move forward with confidence.
Standard shields to protect apps from common web attacks
Advanced shields to fix common vulnerabilities identified in penetration tests. 
-
Custom shield development
-
Talk to us
product_badge_shield_plus

Shield +

Shield + is ideal for larger enterprises. Our supercharged shields remove the risk of vulnerabilities at speed and scale, with custom shield development being available for any unique vulnerabilities that may be discovered.

Standard shields to protect apps from common web attacks
Advanced shields to fix common vulnerabilities identified in penetration tests. 
Custom shield development
Additional uplift
Talk to us

Standard RedShield platform and service inclusions

Every shielding plan comes complete with our standard platform and service inclusions. This provides further protections for your applications. It’s the foundation upon which we build the ideal program of work for your organization.

WAF tuning & operation

  • Accurate and efficient WAF configuration through custom-built AI
  • Policy tuning for false positive reduction
  • Any remaining false positives resolved by expert security analysts within 15 minutes

DDoS protection

  • Volumetric DDoS mitigation up to 12 Tbps capacity
  • Application layer DDos mitigation
  • Annual DDoS simulation testing (Additional Uplift)
  • DDoS resistant connectivity to your content server (Additional Uplift)

Advanced bot protection

  • Signature and heuristics based bot determination 
  • Heuristics based bot determination
  • Dynamic challenging & rate limiting

Reporting, visibility & additional services

  • Vulnerability scans, monitoring, risk scoring, audit and analysis
  • Vulnerability management via our portal
  • Visibility of blocked and alerted attacks
  • 24/7 Analyst, engineer & developer helpdesk for emergency shield creation and deployment

How to get started

  • 1. Provide application details

    Provide us with the details of your application.
  • 2. Provide SSL certificate

    Provide an SSL certificate or let us generate one for you.
  • 3. Cutover DNS

    Change your DNS to direct incoming traffic through RedShield.

  • 4. Lockdown firewall

    You lock your firewall down to only accept traffic from our IP addresses, so you can be sure we've secured your applications.
  • 5. You're protected

    You're in path and secure. We continue to monitor for compatibility issues, scan for and assess vulnerabilities, and work with you to achieve the best possible results.

See how we can shield your web applications and APIs

Get your free trial or talk to one of our experts.

Free trial
or
Talk to us