
Protection from the Inside: Application Security Methodologies Compared
Applications are a primary target for cyber attacks. Historically, Web Application Firewalls (WAFs) have been a popular choice for protecting production applications from attack. But they have their limitations, and advice on how to bypass a WAF is readily available. Learn how context from within the application allows Runtime Application Self-protection (RASP) to provide additional protection using visibility into application configuration, logic and data flows. In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
