Security

We provide Firewall Service with AWS WAF & Shield as well as KYC Compliance
and Risk Score Management

Firewall To Protect Your Data.

AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. We block common attack patterns, such as SQL injection or cross-site scripting using WAF.

Cutting Edge Security Features

Admin protection

Block external access to exposed admin pages. This may be useful if you are running third-party software or would like to reduce the risk of a malicious actor gaining administrative access to your application.

Anonymous IP list

Block requests from services that allow obfuscation of viewer identity. This can include request originating from VPN, proxies, Tor nodes, and hosting providers. This is useful if you want to filter out viewers that may be trying to hide their identity from your application.

Linux operating system

Block request patterns associated with exploitation of vulnerabilities specific to Linux, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which the attacker should not have had access.

Core rule set

Contains rules that are generally applicable to web applications. This provides protection against exploitation of a wide range of vulnerabilities, including those described in OWASP publications.

Known bad inputs

Block request patterns that are known to be invalid and are associated with exploitation or discovery of vulnerabilities. This can help reduce the risk of a malicious actor discovering a vulnerable application.

SQL database

Block request patterns associated with exploitation of SQL databases, like SQL injection attacks. This can help prevent remote injection of unauthorized queries.

What is AWS Shield?

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. We use AWS Shield Advanced, which provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall.

KYC Compliance

The process of verifying the identity of your customers, either before or during the time that they start doing business with you. We verify ID Documentation, Email Address and Phone Number after a user has earned any bonuses.

Prevent Credit Card Fraud

Our credit card fraud prevention technology has screened 3+ billion transactions per year and has identified 5+ million high-risk transactions per year. Get a transaction and IP risk score plus over 50 data points on IPs, emails, devices, payment cards, and more. Once you know the riskiness of an IP or transaction, block the transactions you don’t want.