Examples of using Application-layer in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Application-layer monitoring for maximum threat prevention.
Protects web apps from known and zero-day application-layer attacks.
The application-layer protocol defines the basic patterns of the dialogue.
The far better alternative was a zero trust approach leveraging the cloud and application-layer controls.
Application-layer DDoS detection, including GET/POST floods and low and slow attacks.
AppFirewall provides extensive protection against all known attacks and zero-day application-layer attacks.
Integration with network and application-layer security solutions to protect from vulnerabilities and attacks.
The web application firewall includes a rich collection of pre-defined and configurable application-layer firewall rules.
Defend your network from application-layer attacks with Citrix Web App Firewall, a web application firewall(WAF).
Kona DDoS Defender stops attacks by deflecting network-layer attacks and absorbing application-layer attacks at the network edge.
Denial of service, web application-layer attacks, credential abuse, and IoT- these are the attack trends and vectors that make headlines in 2018.
As your company and users increasingly rely on web applications, application-layer attacks pose a greater threat to productivity and security.
Application-layer controls with pre-defined, configurable WAF rules for categories that include request limit violations, protocol violations, HTTP policy violations and others.
A highly scalable Web Application Firewall(WAF) provides additional protection against application-layer attacks in HTTP and HTPS traffic.
The processor 68 may perform application-layer programs(e.g., browsers) and/or radio access-layer(RAN) programs and/or communications.
It's essential to protect web applications and sites from both known and unknown attacks, including all application-layer and zero-day threats.
After the server returns its 101 response, the application-layer protocol switches from HTTP to WebSockets which uses the previously established TCP connection.
This powerful Akamai DDoS mitigation solution deflects network-layer DDoS traffic and absorbs application-layer DDoS traffic at the network edge.
The processor 32 may run application-layer programs(e.g., browsers) and/or radio access-layer(RAN) programs and/or other communications programs.
Kona Site Defender stops distributed denial of service attacks by deflecting network-layer DDoS traffic and absorbing application-layer DDoS traffic at the network edge.
Kona deflects network-layer DDoS traffic and absorbs application-layer DDoS traffic at the network edge to provide highly effective DDoS protection.
Application-Layer Protocol Negotiation(ALPN) is a{{Glossary(“TLS”)}} extension(defined in RFC 7301) for identifying what application-layer protocol is negotiating the encrypted connection.
Kona Site Defender deflects network-layer DDoS traffic and absorbs application-layer DDoS traffic at the network edge to effectively stop attacks.
Application-Layer Controls: pre-defined, configurable application-layer firewall rules let you address categories such as protocol violations, request limit violations, HTTP policy violations and more.
Adaptive rate controls automatically protect against application-layer DDoS and other volumetric attacks by monitoring and controlling the rate of requests against applications.
Kona Site Defender also includes a highly scalable Web Application Firewall(WAF) to fend off SQL injections, cross-site scripting(XSS)and other application-layer attacks in HTTP and HTPS traffic.
Prolexic Application-Based Monitoring detects application-layer DDoS attacks early, proactively notifying your security administrators of a potential attack.
Deployed in distributed locations across the Akamai global content distribution network, our Kona Web Application Firewall detects and blocks potential attacks in HTTP and HTTPS traffic, mitigating application-layer threats within the Akamai platform before they reach your data center.
The solution works through the implementation of network-layer and application-layer controls, and enables the enterprise to customize the defense perimeter for each online environment it protects.
Incorporating sophisticated application-layer controls, our cloud-based WAF enables deep packet inspection of HTTP/S, ensuring the SSL security of your transactions while preventing HTTPS traffic exploits like the BREACH attack.