Cloud Secure | Precept IT

Precept IT Presentation
Cyber Security: Small Business Guide
Microsoft 365 for Business - Brochure
Book A FREE IT Audit

    Request Callback or IT Audit

    Precept's Cloud Secure System

    The 1st Line of Defense Against Web Application Attacks

    Cloud Secure is a set of attack detection rules for use which aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.

    The Cloud Secure Rule Set provides protection against many common attack categories, including:

    SQL Injection,
    Cross Site Scripting
    Local File Inclusion
    Injection
    Broken Authentication
    Broken Authentication
    Broken Access Control
    Security Misconfiguration

    Globally recognized by developers as the first step towards more secure coding

    SQL Injection (SQLi)
    Cross-Site Scripting (XSS)
    Local File Inclusion (LFI)
    Remote File Inclusion (RFI)
    Remote Code Execution (RCE)
    PHP Code Injection
    HTTP Protocol ViolationsHTTPoxy
    Shellshock
    Session Fixation
    Scanner Detection
    Metadata/Error Leakages
    Project Honey Pot Blacklist
    GeoIP Country Blocking