So he rewrote the rules.

"Too unfiltered," Aris muttered.

Aris leaned back. "We pick both. Write a new story." The first instinct was the Bypass Rule . Every security engineer has used it. When an application doesn't fit the firewall’s model, you create a policy that says: If traffic is destined for FileCatalyst server on port 443, let it pass without inspection.

filecatalyst web application firewall

Filecatalyst Web Application Firewall ✪ [EXCLUSIVE]

So he rewrote the rules.

"Too unfiltered," Aris muttered.

Aris leaned back. "We pick both. Write a new story." The first instinct was the Bypass Rule . Every security engineer has used it. When an application doesn't fit the firewall’s model, you create a policy that says: If traffic is destined for FileCatalyst server on port 443, let it pass without inspection. filecatalyst web application firewall