Our products

WAF technology at the heart of an offer adapted to all your use cases, to protect all your applications and APIs.

UBIKA WAAP Gateway / On Prem Edition

Protect your critical applications and APIs from advanced cyber threats with powerful custom worflows.

UBIKA WAAP Gateway / Cloud Edition

Protect your cloud-deployed applications and APIs from advanced cyber threats with powerful custom workflows.

UBIKA Cloud Protector

Protect your web applications and APIs in SaaS mode in a few clicks.

UBIKA WAAP Container-V7

Future product to help you deliver native cloud applications, which embed protection into their own code.

What differentiates us

Trustworthy. European. Sovereign

  • Sovereign solution – ensures your data stays in the EU.
  • RGPD compliant – ensures data privacy for every customer in the EU.
  • Not subject to extraterritorial laws like the Cloud Act.
  • The technical support team is responsive.
  • We guarantee quality hosting, in one of the leading European data centers OVH, with a highly secure infrastructure.

20 years of recognized expertise

For over 20 years, we have been securing applications, APIs and data. Protect your applications with our security engines, signature matching, rate limiting, two-factor authentication, geolocation and IP reputation.

We also enable enterprises to secure their cloud-native applications by building security into the development phase.

Multi-deployment

An application can be deployed on-premises, in the cloud, or both, by the customer and even offered in SaaS mode. Our web application firewall portfolio includes a set of comprehensive solutions based on your needs. They use the same technologies based on 20 years of proven expertise, with different form factors, to meet your challenges.

  • Presence in the marketplaces of major cloud providers (AWS, Azure, GCP).
  • Cloud automation and cloud agnostic.
  • Security integration at DevOps speed and into your CI/CD pipeline.

Benefits of our solution

  • Protection against the most common attacks
  • Good balance between false positive and false negative rate
  • Scalability in web traffic peaks
  • Reduced total cost of ownership (TCO)
  • Integration with your DevSecOps approach
  • High availability and application performance

Our flagship modules

White list - Open API3

Are you concerned about the security of your APIs? Do you want to implement your API security policy easily? Do you want to protect your organisation against the most common API attacks?

  • Improve the security of your APIs.
  • Apply a security whitelist.
  • Enable collaboration between your development teams.
  • Easy, human-readable generation: OpenAPI 3 allows you to define your API endpoints, parameters and responses in a machine-readable format that is easily converted and human-readable
  • .

WebSockets flow security

Securing WebSockets is essential to protect against security threats such as cross-site scripting (XSS), injection attacks and data breaches.

  • Secure WebSocket traffic.
  • Block WebSockets messages completely.

API encryption

The API Encryption module strengthens the protection of the integrity of APIs owned and used by customers. This functionality is directly integrated into UBIKA WAAP Gateway using the same worflow configuration.

  • Advanced filtering of XML and JSON APIs.
  • Jeton Web JSON to integrate industry standards for authentication
    API authentication standards (OAuth, OpenID Connect).
  • Validation of JSON / XML schemas (checking data content conformity).
  • Obfuscation, filtering and manipulation of JSON / XML data.
  • XML encryption, signing and XSLT.

UBIKA Responsible Vulnerability Disclosure

At UBIKA, we prioritize the security of our users and systems. As part of our ongoing commitment to transparency and collaboration, we have implemented a Vulnerability Disclosure Policy (VDP) at https://vdp.ubikasec.com.

What is VDP?

VDP is a mechanism that allows security researchers to responsibly report any vulnerabilities they may discover on our platforms. This initiative aims to enhance our security posture by leveraging the knowledge of the research community.

How to Participate?

If you discover a vulnerability on our site, we encourage you to inform us responsibly by following the guidelines outlined in our Vulnerability Disclosure Policy on https://vdp.ubikasec.com