{"id":106,"date":"2005-07-19T00:00:00","date_gmt":"2005-07-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/19\/checklist-brings-clarity-to-web-application-firewalls\/"},"modified":"2021-12-30T11:36:32","modified_gmt":"2021-12-30T11:36:32","slug":"checklist-brings-clarity-to-web-application-firewalls","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/19\/checklist-brings-clarity-to-web-application-firewalls\/","title":{"rendered":"Checklist brings clarity to Web Application Firewalls"},"content":{"rendered":"<p>IT managers will now be capable of choosing the best security solution for their needs, with the publication of Secure Application Delivery checklist, industry&#8217;s first comprehensive guide for IT professionals to evaluate and compare products offered in the secure application delivery market.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NetContinuum has created the checklist in order to help IT managers focus and prioritize the needs of IT management by identifying 27 distinct operations, covering both traffic delivery and security inspection including enforcement operations that are potentially applied to every transaction hitting a website.<\/p>\n<p>&#8220;The Secure Application Delivery Checklist offers guidance to help them understand all the steps in the HTTP transaction lifecycle required to fully secure and manage application traffic and determine the product that best fits their needs,&#8221; Mr. Abrams added.<\/p>\n<p>http:\/\/www.ebcvg.com\/articles.php?id=808<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-106","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=106"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/106\/revisions"}],"predecessor-version":[{"id":2593,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/106\/revisions\/2593"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}