Most of us rely on web applications for, well, just about everything, which is why a distributed denial-of-service (DDoS) attack or other Domain Name System (DNS)-related outage can have such a negative impact on a business. Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

Essential to web security are web application firewalls (WAFs), which protect web applications by analyzing HTTP/HTTPS data — as opposed to a regular firewall, which is designed to block transmissions based on other factors, such as IP addresses. However, a recent study conducted by Ponemon Institute and sponsored by Cequence Security found that a majority of users are dissatisfied with the effectiveness of these firewalls, and that opens the organization to greater security risks.

Dissatisfaction With Current Web Application Firewalls

A WAF is considered a critical tool because it adds web application security in ways that traditional firewalls and other security tools cannot. Web applications open the network to a wider range of vulnerabilities than other applications — such as SQL injections and cross-scripting — and they are designed to discern legitimate HTTP traffic before it reaches the application.

Yet according to the Ponemon study, only 40 percent of respondents said they are very satisfied with their WAF. This could be because they aren’t using the WAF to its full potential, as 43 percent admitted they only use it to generate alerts, rather than to actually block malicious activity. Sixty-five percent of respondents said a web application attack bypassed their WAF within the past year.

One possible reason behind this dissatisfaction with WAFs is that they are complex and managing them is time-consuming, essentially requiring someone to monitor them on a full-time basis. WAFs are costly as well, adding hundreds of thousands of dollars to the security budget.

In addition to the expense and management complexities, WAFs also have limitations that can add to that lack of satisfaction among users. For example, while they are effective at monitoring for HTTP-specific attacks, they are unable to protect from zero-day attacks or the rise of automated botnets. This is because WAFs are set up to detect preconfigured patterns, which a zero-day exploit bypasses. They also don’t fix vulnerabilities within the application. Hence, for the price and the time commitment, their function in the security system, while critical, doesn’t do enough.

Improve Web Application Security With AI and Consolidated Functions

So, as important as having a WAF is, you need other security tools in place to support and complement the firewall. The solution may be found in artificial intelligence (AI)-powered automation and a consolidation of application security functions.

“[Our customers] rely on web, mobile, and API-based applications to link customers, partners, and suppliers across their digital ecosystem,” said Franklyn Jones, CMO of Cequence Security, in a formal statement. “And they need an intelligent, integrated application security solution that can protect them against a broad range of sophisticated attacks.”

Integrating WAFs with other critical security tools can simplify your IT architecture and improve latency. One problem with legacy WAFs is that they are difficult to scale as needs change. Integration and consolidation of application security functions should address some of these issues without requiring larger, more expensive appliances.

With AI-powered solutions, organizations can put custom algorithms in place to better detect the threats not currently addressed by legacy WAFs. This is especially critical with the rise of internet of things (IoT)-based DDoS attacks, as AI-based WAFs can help detect the multipurpose botnets responsible for these attacks.

Automated web application security scanners can run scans across apps and websites to look for possible vulnerabilities. Like with penetration tests, there are black box — a blind scan — and white box — where the scan has access to the source code — approaches. White box scanning requires skilled staff, specifically someone familiar with the code. Black box scanning can typically be controlled by anyone on the IT or security team.

Web applications are a necessary part of doing business, meaning web application security has to be a top priority. A single exploit that sets up a DDoS attack or lets malware into your network could take you offline, make you more vulnerable to data breaches and hurt your company’s reputation. A web application firewall is a crucial but untrusted and underutilized security tool. If this tool is going to meet critical needs, organizations need to introduce new automated and consolidated technologies into the web app security system.

More from Data Protection

Data Privacy: How the Growing Field of Regulations Impacts Businesses

The proposed rules over artificial intelligence (AI) in the European Union (EU) are a harbinger of things to come. Data privacy laws are becoming more complex and growing in number and relevance. So, businesses that seek to become — and stay — compliant must find a solution that can do more than just respond to current challenges. Take a look at upcoming trends when it comes to data privacy regulations and how to follow them. Today's AI Solutions On April…

Defensive Driving: The Need for EV Cybersecurity Roadmaps

As the U.S. looks to bolster electric vehicle (EV) adoption, a new challenge is on the horizon: cybersecurity. Given the interconnected nature of these vehicles and their reliance on local power grids, they’re not just an alternative option for getting from Point A to Point B. They also offer a new path for network compromise that could put drivers, companies and infrastructure at risk. To help address this issue, the Office of the National Cyber Director (ONCD) recently hosted a…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…

How the CCPA is Shaping Other State’s Data Privacy

Privacy laws are nothing new when it comes to modern-day business. However, since the global digitization of data and the sharing economy took off, companies have struggled to keep up with an ever-changing legal landscape while still fulfilling their obligations to protect user data. The challenge is that there is no one-size-fits-all solution regarding data privacy's legal requirements. Depending on the location and jurisdiction, data privacy laws can vary significantly in terms of scope and enforcement. But while the laws…