antoni_300741
Dec 05, 2016Nimbostratus
ASM Policy Deployment Approach?
Hi All,
Need your ASM insights if it is possible that we already block all signatures (in the first place) while learning the composition of the websites automatically?
Note: We asked this because our understanding about ASM signatures is that this is already a well-known attack.*
Based on above, may we know what ASM deployment approach can address our above concern?
Appreciate your urgent reply. Thanks