{"_id":"55dc98abc755b63700dc840f","parentDoc":null,"version":{"_id":"55db8f901a91690d007ad978","project":"55db8f8f1a91690d007ad975","__v":17,"createdAt":"2015-08-24T21:41:36.034Z","releaseDate":"2015-08-24T21:41:36.034Z","categories":["55db8f901a91690d007ad979","55db9856b3d6540d00886426","55dc751b00a8811900c230e3","55dc766255be9f21004ee250","55dc769200a8811900c230ed","55e4c701177b6e0d003330fa","55f4915caf0bc71900a53130","55f491b2be9c2b2100f0635d","560b22739c7be70d00100bd8","57488c53e8c6a420000b729c","574cefd95953e20e00f40f9f","5798edfd7700d30e00ad250c","579ac88234b5fd0e00b9e140","57c81c6d690c200e0047b72e","57d9b8fbda17c30e003897f1","57d9b90e608ea00e00f358d8","57d9b91cda17c30e003897f4"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"category":{"_id":"55db8f901a91690d007ad979","__v":10,"project":"55db8f8f1a91690d007ad975","version":"55db8f901a91690d007ad978","pages":["55db8f911a91690d007ad97b","55db92ffade8080d00c73833","55dc71fa7fa0290d00559111","55dc728900a8811900c230d1","55dc75a700a8811900c230e5","55dc764400a8811900c230eb","55dc7a2f6f16451700843e25","55dc977f6cce01230001ec4b","55dc98abc755b63700dc840f","55dc9aa9c755b63700dc841d"],"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-08-24T21:41:36.606Z","from_sync":false,"order":0,"slug":"general","title":"Getting Started"},"githubsync":"","user":"55dc702d7fa0290d00559106","__v":17,"project":"55db8f8f1a91690d007ad975","updates":["55e49626de0d360d0027bc58","5b7d1f6c57d29600034f3c01"],"next":{"pages":[],"description":""},"createdAt":"2015-08-25T16:32:43.797Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":0,"body":"[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/cg3vCa4RUG8Qt4Ncrwmw_IMMUNIO_LOGO.png\",\n        \"IMMUNIO_LOGO.png\",\n        \"759\",\n        \"604\",\n        \"#fc7404\",\n        \"\"\n      ],\n      \"caption\": \"\"\n    }\n  ]\n}\n[/block]\nIMMUNIO is a Runtime Application Self-Protection (RASP) technology that provides real-time application security as a service. When IMMUNIO is properly deployed, threats to your web applications will be detected and protected against, minimizing your risk.\nDetermined attackers are continuously running scanners against your site, creating malicious user accounts, fuzzing various elements, triggering exceptions along the way, and attempting to run exploitation tools. They do this with several goals in mind: \n* Take over customer or administrative accounts\n* Execute code on your server\n* Steal sensitive data stored on your servers.\nBy embedding IMMUNIO in your web applications, you will receive alerts as soon as attackers begin conducting scans and attacks. You can address each event manually, or you can configure IMMUNIO to react automatically to these attackers, stopping them in their tracks before any damage is done.​\n[block:api-header]\n{\n  \"type\": \"basic\",\n  \"title\": \"Use Cases\"\n}\n[/block]\nApplication security is hard. To do it well, you must develop secure coding and SDLC expertise and practices in house. You need to do security code reviews, run static source code scanners, conduct penetration testing, and ensure all the software components that make up your application are up-to-date. Even with all of the above, the world’s largest technology companies still find hundreds of vulnerabilities when they crowd-source bug hunting challenges.\nIt’s not surprising that the web attack vector has emerged as the #1 source of data record breaches. Moreover, none of the above expertise or practices relates to the secure operation of the application! You still need to understand if the web app is under attack, by whom, and how, as well as respond to the threat in real time.\nIMMUNIO will improve your application security by instantly giving you real-time detection of, and protection against threats without requiring any code changes. \nIMMUNIO secures:\n* Critical internet-facing web applications and APIs\n* Applications with known vulnerabilities that cannot be addressed immediately\n* Applications that are difficult to monitor and/or manage - For example, if you have hundreds of web applications running on an internal network\n\n© 2017 IMMUN.IO Inc.","excerpt":"","slug":"welcome","type":"basic","title":"Introduction"}
[block:image] { "images": [ { "image": [ "https://files.readme.io/cg3vCa4RUG8Qt4Ncrwmw_IMMUNIO_LOGO.png", "IMMUNIO_LOGO.png", "759", "604", "#fc7404", "" ], "caption": "" } ] } [/block] IMMUNIO is a Runtime Application Self-Protection (RASP) technology that provides real-time application security as a service. When IMMUNIO is properly deployed, threats to your web applications will be detected and protected against, minimizing your risk. Determined attackers are continuously running scanners against your site, creating malicious user accounts, fuzzing various elements, triggering exceptions along the way, and attempting to run exploitation tools. They do this with several goals in mind: * Take over customer or administrative accounts * Execute code on your server * Steal sensitive data stored on your servers. By embedding IMMUNIO in your web applications, you will receive alerts as soon as attackers begin conducting scans and attacks. You can address each event manually, or you can configure IMMUNIO to react automatically to these attackers, stopping them in their tracks before any damage is done.​ [block:api-header] { "type": "basic", "title": "Use Cases" } [/block] Application security is hard. To do it well, you must develop secure coding and SDLC expertise and practices in house. You need to do security code reviews, run static source code scanners, conduct penetration testing, and ensure all the software components that make up your application are up-to-date. Even with all of the above, the world’s largest technology companies still find hundreds of vulnerabilities when they crowd-source bug hunting challenges. It’s not surprising that the web attack vector has emerged as the #1 source of data record breaches. Moreover, none of the above expertise or practices relates to the secure operation of the application! You still need to understand if the web app is under attack, by whom, and how, as well as respond to the threat in real time. IMMUNIO will improve your application security by instantly giving you real-time detection of, and protection against threats without requiring any code changes. IMMUNIO secures: * Critical internet-facing web applications and APIs * Applications with known vulnerabilities that cannot be addressed immediately * Applications that are difficult to monitor and/or manage - For example, if you have hundreds of web applications running on an internal network © 2017 IMMUN.IO Inc.