Shape Enterprise Defense Deployment Overview

Page 1

Shape Enterprise Defense DEPLOYMENT OVERVIEW

Shape Enterprise Defense can be deployed inline on-premises, in the cloud, or consumed via an API.

1

REVERSE PROXY

2

API-BASED

Reverse Proxy: Shape detects and mitigates threats in real-time. API-Based: Shape detects threats in real-time and the enterprise controls mitigation.

On-Premises

Hosted

Cloud

CDN Agnostic

Client Signals

Shape Protection Manager

Shape Enterprise Defense can be deployed in conjunction with any CDN.

Telemetry signals are collected via JS for desktop and via an SDK deployed on 150M+ devices for mobile.

A collaborative control system and dashboard used by Shape Security analysts and the enterprise to manage the protection policy and operation of the Shape Defense Engine and observe real-time reporting of incidents, efficacy, load, and impact to protected sites.

• Dedicated hardware in enterprise data center(s) • System monitoring and maintenance shared by enterprise and Shape

• Dedicated hardware in Shape data center(s) • System monitoring and maintenance provided by Shape

shapesecurity.com | sales@shapesecurity.com | +1 (650)-399-0400

• On-demand scalability in a Shape-managed public cloud • System monitoring and maintenance provided by Shape

API

• No network element • Not inline with traffic • Synchronous or Asynchronous API


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.