Shape Enterprise Defense DEPLOYMENT OVERVIEW
Shape Enterprise Defense can be deployed inline on-premises, in the cloud, or consumed via an API.
1
REVERSE PROXY
2
API-BASED
Reverse Proxy: Shape detects and mitigates threats in real-time. API-Based: Shape detects threats in real-time and the enterprise controls mitigation.
On-Premises
Hosted
Cloud
CDN Agnostic
Client Signals
Shape Protection Manager
Shape Enterprise Defense can be deployed in conjunction with any CDN.
Telemetry signals are collected via JS for desktop and via an SDK deployed on 150M+ devices for mobile.
A collaborative control system and dashboard used by Shape Security analysts and the enterprise to manage the protection policy and operation of the Shape Defense Engine and observe real-time reporting of incidents, efficacy, load, and impact to protected sites.
• Dedicated hardware in enterprise data center(s) • System monitoring and maintenance shared by enterprise and Shape
• Dedicated hardware in Shape data center(s) • System monitoring and maintenance provided by Shape
shapesecurity.com | sales@shapesecurity.com | +1 (650)-399-0400
• On-demand scalability in a Shape-managed public cloud • System monitoring and maintenance provided by Shape
API
• No network element • Not inline with traffic • Synchronous or Asynchronous API