Skip to content

Caution

The software described in this manual is supplied under a license agreement and may only be used in accordance with the terms of that agreement.

What is DeepFinder?

A Web Application Firewall is a system designed to build a more secure web service environment by detecting and blocking web hacking attempts that exploit web vulnerabilities in real time, thereby preventing the leakage of critical information and protecting web servers and applications.

The DeepFinder Web Application Firewall (hereafter referred to as DeepFinder) is a next-generation security software that provides innovative features to detect, analyze, and respond to intrusions through web applications, preventing damage from attacks.

DeepFinder includes various tools and technologies necessary to collect attack information, analyze attacks, and implement appropriate countermeasures.

DeepFinder is a web application firewall for web servers or web application server software, designed to detect and prevent attacks without degrading server performance.


Copyright ⓒ Secuon Cloud Co.,Ltd. All Rights Reserved.

Shina Building, 277 Jungdae-ro, Songpa-gu, Seoul

The copyright for the DeepFinder technical documents published by Secuon Cloud is owned by Secuon Cloud.

This technical manual is distributed to the user "as is" and makes no warranties of any kind regarding its accuracy or use. The user assumes all risks for any damages that may arise from the use of this manual or the information contained within it.

This manual may contain technical issues, other inaccuracies, and typographical errors. Secuon Cloud reserves the right to make changes to the manual without prior notice.

No part of this manual may be reproduced in whole or in part without the express written permission of Secuon Cloud.


Cautions Regarding Viewing the Administrator's Manual

Warning

This manual must only be accessed by security administrators or a few authorized users involved in related tasks. If the administrator's manual is accessed by malicious users, there is a risk that it could be misused to acquire internal system information for hacking purposes, which requires careful management and attention.