Cloud Secure

Precept IT Presentation
Cyber Security: Small Business Guide
Microsoft 365 for Business - Brochure
Book A FREE IT Audit

Get A Quote

Precept's Cloud Secure System

The 1st Line of Defense Against Web Application Attacks

Cloud Secure is a set of attack detection rules for use which aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts.

The Cloud Secure Rule Set provides protection against many common attack categories, including:

SQL Injection,
Cross Site Scripting
Local File Inclusion
Injection
Broken Authentication
Broken Authentication
Broken Access Control
Security Misconfiguration

Globally recognized by developers as the first step towards more secure coding

SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Local File Inclusion (LFI)
Remote File Inclusion (RFI)
Remote Code Execution (RCE)
PHP Code Injection
HTTP Protocol ViolationsHTTPoxy
Shellshock
Session Fixation
Scanner Detection
Metadata/Error Leakages
Project Honey Pot Blacklist
GeoIP Country Blocking