Latest Stories

Stay up-to-date with everything at Approach

Publication

Web Application Firewalls: where do we stand?

Publication date

13.03.2019

Approach has been invited by ISACA Belgium to write a technical briefing about the WAF technology. Download the Tech Brief!

Following the Open Forum about Web Application Firewalls,  Approach has been invited by ISACA Belgium to write a technical briefing and give some clarifications and highlights about the WAF technology.
“With the right methodology, organisations can be protected almost 95% of the time against zero-day exploits without having to deploy a new security rule on a WAF.  This is not only true for government or finance-related applications, but also for start-up SaaS ones”.
Marc Stern, our expert in WAF implementation since 2001.

Download the Tech Brief and get answers to the following key questions:

  • Do I really need a Web Application Firewall?
  • Isn’t it better to invest in securing the development of my application instead of investing in a WAF?
  • If I have a WAF, am I safe?
  • What solutions are available?
  • How many WAFs do I need?
  • What methodologies exist to configure a WAF?
  • How to succeed in a WAF project?

Front Page of the Technical Brief “Web Application Firewalls. Where do we stand?”

“We have drawn on our in-depth cyber security expertise and methodology to develop an innovative and unique Web Application Firewall that provides proven effective security at limited license cost.”

Learn more about our WAF solution

OTHER STORIES

While Belgian organizations have been navigating the complexities of NIS2 compliance, a new regulatory wave is already on the horizon. The European Union’s Cyber Resilience Act (CRA) entered into force on December 10, 2024, and will fundamentally reshape how businesses approach cyber security for products with digital elements. Unlike NIS2, which focuses on organizational security measures, the CRA targets the products themselves – from smart home devices to industrial IoT systems.
In 2025, the secure development landscape is at a turning point. Critical regulations like the EU’s Cyber Resilience Act are forcing organisations to shift from optional best practices to mandatory secure-by-design strategies. But are organisations truly ready? Drawing from OWASP SAMM benchmark data, this paper assesses where different industries stand, the influence of organisational size on maturity, and what it takes to build security programs that are both effective and compliant.
Threat modeling isn’t just a technical step, it’s a mindset. It empowers development teams to think like attackers, ask the right questions early, and embed security from the start. By making security collaborative, practical, and developer-friendly, it lays the foundation for resilient, trusted software delivery.

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?