In order to give you better service we use cookies. By continuing to use our website, you agree to the use of cookies as described in our Cookie Policy

Are you a Kong Gateway user? We'd love your feedback. Take the Survey

Kong Logo
  • Get Started
  • Products
    • kong-enterprise Kong Enterprise
      • Kong Enterprise

        End-to-end connectivity platform

      • Kong Mesh

        Universal service mesh

      • Kong Studio

        Empower your developers

      • Dev Portal

        Accelerate innovation

      • Kong Manager

        Manage all your services

      • Kong Immunity

        Autonomously identify issues

      • Kong for Kubernetes

        Native Kubernetes Ingress Controller

      • Enterprise Plugins

        Instantly implement policies

      • Kong Vitals

        Monitor your Kong Enterprise

      • Get Started
    • Built on an Open-source Foundation
      • kong-gateway Kong Gateway

        API Gateway

      • kuma Kuma

        Service Mesh

      • insomnia Insomnia

        API Design and Testing

      • Install
    • Kubernetes & Subscriptions
      • Kubernetes Ingress Controller

        Ingress and CRDs

      • Subscriptions

        Kong Gateway and Enterprise features

  • Solutions
    • Use Cases
      • Decentralize Apps and Services

        Accelerate your journey into microservices

      • Secure and Govern APIs

        Empower teams to provide security, governance and compliance

      • Create a Developer Platform

        Rapidly design, publish and consume APIs and services

    • Deployment Patterns
      • API Gateway

        Take control of your microservices with the world’s most popular API gateway

      • Kubernetes

        Own your Kubernetes cluster by using Kong as an Ingress Controller

      • Service Mesh

        Build, secure and observe your modern Service Mesh

  • Plugins
  • Open Source
    • Install Kong Gateway
    • Kong Community
    • Kubernetes Ingress
    • Kuma
    • Insomnia
  • Docs
    • Documentation
      • Kong Gateway
      • Kong Enterprise
      • Kong Mesh
      • Kong Studio
      • Plugins Hub
  • Resources
    • Learning
      • eBooks
      • Webinars
      • Briefs
      • Blog
    • Community
      • Community
      • Kong Nation
      • Kong Summit
      • GitHub
    • Support
      • Enterprise Support Portal
      • FAQS
      • Kong Professional Services
      • Kong University
  • Company
    • About
    • Customers
    • Investors
    • Careers
    • Partners
    • Press
    • Contact
  • Get Started
header icon

Wallarm

  • Back to Kong Plugin Hub
  • githubEdit this page
  • report-issueReport an issue
  • Installation
About this Integration
Made by Wallarm
Categories
  • Security
Legal
  • Terms of Service
Compatibility
    Kong Enterprise
  • 0.33-x
    Kong Community
  • 0.14.x
Community Integration: This plugin is developed, tested, and maintained by a third-party contributor.

Wallarm AI-Powered Security Platform automates application protection and security testing. Its NG WAF module seamlessly integrates with API gateway and protects APIs and microservices from OWASP Top 10, bots and application abuse with no manual rule configuration and ultra-low false positives.

  • Protects all types of REST, XML, SOAP and other HTTP APIs from XSS, XXE, SQL Injections, RCE and other OWASP Top 10 threats
  • Detects the microservice’s logic and payload boundary from stateless HTTP traffic analysis — without access to the code inside the container
  • Works well with CI/CD by updating security rules automatically
  • Provides visibility on malicious requests and uses vulnerability verification to cut down on the noise and false positives
  • Learns and decodes all the data formats including nested and encoded custom API protocols, such as JSON inside Base64 encoding.

More details on Wallarm NG WAF: https://wallarm.com/products/ng-waf.

Free Wallarm trial license is available at https://my.wallarm.com/signup?utm_source=konghub.

“Wallarm implementation was one of many steps to migrate our application iMedNet to AWS. Ensuring the ability to monitor and secure our web-based APIs and to meet HIPAA guidelines for PHI compliance were important in the decision to go with Wallarm”, said Gary Johnson, Infrastructure Architect at MedNetStudy.

“Wallarm offers an adaptive security platform including an integrated Web vulnerability scanner and NG-WAF solution with automatically generated security rules based on AI”, said Chris Rodriguez, Senior Security Analyst, Frost & Sullivan

Installation

Wallarm is easy to deploy as a Kong module. Specific module installation instructions with complete OS-specific installation instructions provided here: https://docs.wallarm.com/en/admin-en/installation-kong-en.html

Thank you for your feedback.
Was this page useful?
  • Kong
    THE CLOUD CONNECTIVITY COMPANY

    Kong powers reliable digital connections across APIs, hybrid and multi-cloud environments.

    • Company
    • Customers
    • Events
    • Investors
    • Careers Hiring!
    • Partners
    • Press
    • Contact
  • Products
    • Kong Gateway
    • Kong Enterprise
    • Get Started
    • Subscriptions
  • Resources
    • eBooks
    • Webinars
    • Briefs
    • Blog
    • API Gateway
    • Microservices
  • Open Source
    • Install Kong Gateway
    • Kong Community
    • Kubernetes Ingress
    • Kuma
    • Insomnia
  • Solutions
    • Decentralize
    • Secure & Govern
    • Create a Dev Platform
    • API Gateway
    • Kubernetes
    • Service Mesh
Star
  • Terms•Privacy
© Kong Inc. 2021