WEB security protectionsoftware – function list
function name | function description | ||||||||
---|---|---|---|---|---|---|---|---|---|
Process protection | only files in the whitelist are allowed to be created | or files with matching SHA256 values ????are allowed to be created | preventing privilege escalation | ||||||
Function protection | which prohibits the DLL functions in the blacklist from being called | and only allows functions in the whitelist to be called to prevent privilege escalation | |||||||
Memory protection | prevent ShellCode | unknown 0DAY privilege escalation | |||||||
Component protection | prohibit calling specified components to prevent privilege escalation | ||||||||
DLL loading protection | prohibiting specified DLLs from loading specified files to prevent privilege escalation | ||||||||
Port protection | only allow access to specified ports | ||||||||
Remote access protection | blocking illegal URL hijacking website ranking and traffic | ||||||||
File protection | intercepting the creation | modification | movement (renaming) | copying | and deletion of single or multiple files | ||||
Directory protection | intercepting the creation | movement (renaming) | copying | and deletion of single or multiple directories | and the creation | modification | movement (renaming) | copying | and deletion of files under the directory |
Attribute and time protection | intercepting tampering of read-only | hidden | system attributes of files or directories | as well as tampering of creation time and modification time | |||||
Domain name ICP filing inspection | real-time monitoring of whether the domain name is on the record | intercepting unregistered domain names according to the settings and custom settings to intercept the prompt information | which can be switched to control whether to enable | ||||||
Website cookie protection | automatically add HttpOnly | Secure | or not add according to the specified name | ||||||
Website scanning protection | automatic identification of intranet environment | CDN environment | normal search engines | blocking fake search engines or scanners | |||||
Website content protection | matching illegal access according to URL or page content | blocking sensitive word access | |||||||
Website content replacement | replace sensitive words with * signs according to the keyword list | support hundreds of thousands of keyword replacements | high efficiency | and prevent accidental interception according to rules | |||||
Website directory protection | prohibiting the execution of specified types of files in the specified directory to prevent upload vulnerabilities | ||||||||
Website upload protection | even if the website code has loopholes | it can also block the upload of specified suffix files | |||||||
Website extension protection | specified suffix files are prohibited from accessing | such as asa | cer | cdx | etc. | ||||
Background protection of the website | secondary login protection in the background | preventing violent cracking of background passwords | |||||||
Website access protection | allowing only specified IPs or IPs in specified regions and countries to access specified URLs | opening or closing website access during specified time periods | |||||||
Injection protection | intercept Get | Post | Cookie | Header and other injection methods | support wildcards and regular rules | ||||
CC attack protection | automatic identification of search engines | three ways to block CC attacks | |||||||
Website cookie protection | automatically add HttpOnly | Secure | or not add according to the specified name | ||||||
Website scanning protection | automatic identification of intranet environment | CDN environment | normal search engines | blocking fake search engines or scanners | |||||
Website content protection | matching illegal access according to URL or page content | blocking sensitive word access | |||||||
Website content replacement | replace sensitive words with * signs according to the keyword list | support hundreds of thousands of keyword replacements | high efficiency | and prevent accidental interception according to rules | |||||
Website directory protection | prohibiting the execution of specified types of files in the specified directory to prevent upload vulnerabilities | ||||||||
Website upload protection | even if the website code has loopholes | it can also block the upload of specified suffix files | |||||||
Website extension protection | specified suffix files are prohibited from accessing | such as asa | cer | cdx | etc. | ||||
Background protection of the website | secondary login protection in the background | preventing violent cracking of background passwords | |||||||
Website access protection | allowing only specified IPs or IPs in specified regions and countries to access specified URLs | opening or closing website access during specified time periods | |||||||
Injection protection | intercept Get | Post | Cookie | Header and other injection methods | support wildcards and regular rules | ||||
CC attack protection | automatic identification of search engines | three ways to block CC attacks |
Purchase price
Aegis WEB security protection software | purchase period | |||
---|---|---|---|---|
Number of clients | 1 | 2 | 3 | 5 |
1 | 800 | 1600 | 2400 | 4000 |
2 | 1600 | 3200 | 4800 | 8000 |
3 | 3200 | 6400 | 9600 | 16000 |
4 | 6400 | 12800 | 19200 | 32000 |
5 | 12800 | 25600 | 38400 | 64000 |
6 | 25600 | 51200 | 76800 | 128000 |
7 | 51200 | 102400 | 153600 | 256000 |
8 | 102400 | 204800 | 307200 | 512000 |
9 | 204800 | 409600 | 614400 | 1024000 |
10 | 409600 | 819200 | 1228800 | 2048000 |