Highly configurable rules to automatically detect and block users or bots exceeding normal request thresholds.
Automatic protection against more than 10 common threats like SQL injection, Cross-site scripting and OS Command Injection.
Manually allow or block incoming requests on the basis of request parameters like IP, headers, URL, query parameters, country and many more.