Ergon Informatik

Airlock WAF test

Web Application Firewall · Category 6. Network Security · Tier 2
CL Listed — Visible
Methodology v3.5 · OLIR Schema
Avril 2026
Evaluation Tier: Visible (Listed) Verified (CAE) Enterprise (EEE) Layer 1-2 only · Documentary assessment · All capabilities vendor-claimed
Executive Summary 30 seconds

What it is

Enterprise web application firewall and API gateway combining reverse proxy architecture with deep traffic inspection. Airlock WAF protects web applications and APIs against OWASP Top 10 attacks, zero-day exploits, and bot traffic while providing centralized identity and access management integration.

Best for

OWASP Top 10 runtime protection (PCI DSS Req. 6.4), PCI DSS Req. 1.3/6.6 (network segmentation & WAF), DORA Art. 9 (ICT systems protection). Ideal for enterprises with customer-facing web applications and APIs requiring inline traffic protection and regulatory compliance.

What it does NOT do

No source code analysis (SAST/DAST), no endpoint detection, no email security, no SIEM functionality, no vulnerability scanning, no data masking. Not an application security testing tool — provides runtime protection, not vulnerability discovery.

CL Recommendation

Airlock WAF is a Swiss-engineered enterprise WAF with strong reverse proxy architecture and integrated API gateway. Critical for PCI DSS 6.6, DORA Art. 9, and NIS2 Art. 21 compliance. Combine with SAST/DAST (Cat. 9), SIEM (Cat. 12), and DDoS protection for complete web application defense. Trusted by European banks and government institutions.

Regulatory Fit Per regulation verdict
PCI DSS v4.0
~20% of requirements
✔ Strong — Req. 1.3, 6.4, 6.6 (WAF & network segmentation)
DORA
~17% of obligations
✔ Strong — Art. 9 protection of ICT systems, Art. 10 detection
NIS2
~15% of Art. 21
● Moderate — Art. 21(2)(b) incident handling, (c) business continuity
GDPR
~9% of articles
● Moderate — Art. 32 (security of processing), Art. 25 (DPbD)
HIPAA
~5% of provisions
△ Supporting only — §164.312(e) transmission security
CCPA/CPRA
~8% of provisions
● Moderate — Sec. 1798.150 reasonable security measures
▼ Show detailed regulatory mapping (OLIR format)
PCI DSS v4.0 (PROPRIETARY)
FocalObligationOLIR Rel.Hub RefRationale
Req. 6.4.1Public-facing web app attack protectionEquivalentSC-7 / PR.DS-01Syntactic
Req. 6.4.2Automated WAF for public web appsEquivalentSC-7 / PR.DS-01Syntactic
Req. 1.3.1Inbound traffic restriction to DMZDirectSC-7 / PR.AC-05Functional
Req. 11.6.1Detect unauthorized changes to HTTP headersContributingSI-7 / DE.CM-09Semantic
DORA (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 9(1)Protection of ICT systems and toolsDirectSC-7 / PR.DS-01Functional
Art. 9(2)Network security managementDirectSC-7 / PR.AC-05Functional
Art. 10(1)Detection of anomalous activitiesContributingSI-4 / DE.CM-01Semantic
Art. 11(1)ICT incident response and recoveryContributingIR-4 / RS.RP-01Semantic
NIS2 (OPEN_GOV)
FocalObligationOLIR Rel.Hub RefRationale
Art. 21(2)(b)Incident handlingContributingIR-4 / RS.RP-01Semantic
Art. 21(2)(c)Business continuity and crisis managementContributingCP-2 / PR.IP-09Semantic
Art. 21(2)(a)Risk analysis and information system securityDirectSC-7 / PR.AC-05Functional

Articles without contribution omitted. Full OLIR mapping available in Audit Pack export.

🎯 Buyer Guidance Decision support

✔ Consider When

  • + PCI DSS Req. 6.4/6.6 web application firewall compliance required
  • + Customer-facing web applications and APIs need runtime protection
  • + European regulatory requirements (DORA, NIS2, GDPR) are primary drivers
  • + Centralized reverse proxy architecture needed for web traffic management
  • + Need combined WAF and API gateway in a single solution
  • + Swiss data residency or European sovereignty requirements apply

❌ Avoid When

  • Need application security testing (SAST/DAST) — Airlock is runtime protection only
  • Cloud-native microservices with service mesh already in place
  • Looking for CDN-integrated WAF (Cloudflare, AWS CloudFront model)
  • Small-scale deployment with fewer than 5 web applications
  • Need built-in DDoS protection at network layer (L3/L4)
  • Budget-constrained — enterprise appliance pricing model
Capabilities 20 claimed · 4 groups · DR-2 Quality Tiers + Config Modifiers
WAF Core Protection 5✓ 0● 0✗
OWASP Top 10 protection
SQL injection, XSS, CSRF, SSRF, and all OWASP Top 10 attack categories
Specific Obl.Out-of-Box
Bot detection and mitigation
Automated bot traffic identification and blocking
Control FamilyConfig Change
Virtual patching
Temporary protection for known CVEs without application changes
Specific Obl.Config Change
SSL/TLS termination and inspection
Full HTTPS decryption, inspection, and re-encryption
Control FamilyOut-of-Box
Custom WAF rules
User-defined rule sets for application-specific protection
Control FamilyConfig Change
API Gateway 4✓ 1● 0✗
API traffic management
Rate limiting, throttling, and quota enforcement for APIs
Specific Obl.Config Change
OpenAPI/Swagger validation
Schema-based request validation against API specification
Specific Obl.Config Change
JSON/XML payload inspection
Deep content inspection for injection and oversized payloads
Specific Obl.Out-of-Box
GraphQL protection
Query depth limiting and introspection control
Control FamilyConfig Change
API versioning and routing
Centralized API lifecycle management and traffic routing
Generic ControlConfig Change
Identity & Access 5✓ 0● 0✗
SSO integration (SAML, OIDC)
Centralized authentication via SAML 2.0 and OpenID Connect
Control FamilyConfig Change
Multi-factor authentication enforcement
MFA step-up enforcement at the WAF layer
Control FamilyConfig Change
Session management
Centralized session handling, timeout, and cookie protection
Specific Obl.Out-of-Box
OAuth 2.0 token validation
Token introspection and JWT validation at gateway level
Control FamilyConfig Change
IP reputation and geo-blocking
Block traffic from known malicious IPs and restricted geographies
Generic ControlConfig Change
Monitoring & Compliance 4✓ 1● 0✗
Real-time attack dashboard
Live visualization of blocked attacks and threat trends
Generic ControlOut-of-Box
SIEM integration (syslog, CEF)
Forward security events to Splunk, QRadar, Elastic
Control FamilyConfig Change
PCI DSS compliance reporting
Pre-built WAF compliance evidence for Req. 6.4/6.6
Specific Obl.Out-of-Box
Audit logging
Full request/response logging for forensic analysis
Specific Obl.Out-of-Box
Automated threat intelligence feeds
Integration with external threat intelligence for rule updates
Control FamilyConfig Change
🛡 MITRE ATT&CK Mapping Layer 4 — Derived via SP 800-53
M1050
Exploit Protection
Full (claimed)
M1031
Network Intrusion Prevention
Full (claimed)
M1037
Filter Network Traffic
Full (claimed)
M1035
Limit Access to Resource Over Network
Full (claimed)
M1016
Vulnerability Scanning
Partial (claimed)

Score: 4.0 / 5.0 (80%) — All vendor-claimed. Techniques addressed: T1190, T1189, T1071, T1595, T1499 (web exploitation & network family).

▼ Show ATT&CK techniques detail
TechniqueNameHow AddressedProvenance
T1190Exploit Public-Facing ApplicationWAF rules block known exploit patterns and zero-day attack signatures in real timeDERIVED via M1050
T1189Drive-by CompromiseContent inspection and script injection prevention via response filteringDERIVED via M1031
T1071Application Layer ProtocolDeep HTTP/HTTPS inspection blocks malicious application-layer trafficDERIVED via M1037
T1499Endpoint Denial of ServiceRate limiting and bot mitigation prevent application-layer DoS attacksDERIVED via M1035
📄 Evidence Pack DR-2 §5.1 — Proof of value
WAF block/allow logs
Detailed request logs with rule match information. Exportable via syslog/CEF.
PCI DSS 6.4/6.6 compliance report
Pre-built WAF compliance evidence for PCI auditors.
Attack trend dashboards
Real-time and historical attack visualization. Screenshot/PDF export.
SSL/TLS configuration report
Cipher suite and certificate management evidence.
Third-party penetration test
Independent validation of WAF effectiveness against OWASP Top 10.
Threat intelligence integration evidence
Feed subscription and rule update documentation.

Evidence level: Documentary review only (CL Listed). For verified evidence, upgrade to CAE (Examine + Interview) or EEE (+ Test).

Operational Metrics & Anti-Hype DR-2 §5.1 + §9.2
MetricAirlock Gateway (Single App)Airlock Enterprise (Multi-App)Airlock Suite (WAF + IAM + API)
Implementation1-2 weeks4-8 weeks8-16 weeks
FTE Required0.25 FTE0.5-1 FTE1-2 FTE
Time to first valueDay 1-3 (first web application protected behind WAF reverse proxy)
Time to productionMonth 1-3 (all applications onboarded, WAF rules tuned, false positives minimized)
Anti-Hype: Marketing vs. Reality
Swiss-engineered security
Accurate. Developed and operated from Switzerland (Zurich). Relevant for European data sovereignty requirements.
Verified
Zero-day protection out of the box
Positive security model provides some zero-day coverage, but advanced evasion techniques may bypass default rules. Requires ongoing tuning.
Partial
Complete API security platform
Strong API gateway with rate limiting and schema validation, but lacks API discovery and API-specific vulnerability testing (not a DAST tool).
Partial
No performance impact on applications
Inline WAF adds 1-5ms latency in optimal conditions. Complex rule sets and deep content inspection can add more. Requires performance tuning.
Misleading
Integrated identity and access management
Airlock IAM is a separate product that integrates well with WAF. Not built-in to WAF license — requires additional licensing.
Partial
Strengths & Cautions

✔ Strengths

  • + Swiss-engineered with European data sovereignty compliance
  • + Combined WAF and API gateway in unified reverse proxy architecture
  • + Strong PCI DSS Req. 6.4/6.6 compliance coverage
  • + Deep OWASP Top 10 protection with positive security model
  • + Integrated SSO/OIDC/SAML authentication enforcement at WAF layer
  • + Mature enterprise platform trusted by European banks and government
  • + Virtual patching for rapid CVE mitigation without application changes

⚠ Cautions

  • ! European/Swiss market focus — less North American presence and support
  • ! Enterprise appliance pricing — no consumption-based or cloud-native model
  • ! No built-in DDoS protection at network layer (L3/L4)
  • ! Limited cloud-native deployment options (primarily on-prem/VM)
  • ! API discovery capabilities require third-party tooling
  • ! Initial WAF rule tuning requires security expertise to minimize false positives
  • ! All capabilities VENDOR-CLAIMED (no CL independent testing)
📈 Competitive Positioning Category 6 — Network Security
CapabilityAirlock WAF testF5 BIG-IPCloudflare WAFAWS WAF
WAF Protection
API Gateway
Reverse Proxy
Bot Management
On-prem Deployment
Cloud-native
Pricing ModelEnterprise licenseEnterprise licensePay-per-usePay-per-use

Competitive data based on public information. CL has not evaluated these alternatives — for detailed assessment, see individual CL Listings.

📑 Framework Views Hub: CSF 2.0 + 800-53r5 + ISO 27001
▼ Show NIST SP 800-53, CSF 2.0, ISO 27001 mapping tables
NIST SP 800-53 Rev 5
ControlNameContributionProvenance
SC-7Boundary ProtectiondirectDERIVED via PCI DSS 6.4
SI-4System MonitoringdirectDERIVED via DORA Art. 10
AC-4Information Flow EnforcementdirectDERIVED via PCI DSS 1.3
IR-4Incident HandlingcontributingCL-ORIGINAL
SC-8Transmission Confidentiality & IntegritydirectDERIVED via PCI DSS 4.1
AU-3Content of Audit RecordscontributingCL-ORIGINAL
NIST CSF 2.0
ControlNameContributionProvenance
PROTECTPR.DS-01 Data-at-rest and data-in-transit protectiondirectDERIVED via SC-7
PROTECTPR.AC-05 Network integrity protectiondirectDERIVED via SC-7
DETECTDE.CM-01 Network monitoringdirectDERIVED via SI-4
RESPONDRS.RP-01 Incident response executioncontributingCL-ORIGINAL
ISO 27001:2022 Annex A
ControlNameContributionProvenance
A.8.20Network securitydirectDERIVED via NIS2-ISO
A.8.21Security of network servicesdirectDERIVED via DORA-ISO
A.8.22Segregation of networkscontributingDERIVED via PCI-ISO
A.8.16Monitoring activitiescontributingCL-ORIGINAL
A.8.24Use of cryptographydirectDERIVED via PCI-ISO
▼ Show Vendor Security Practices (SSDF / CRA)
SSDF IDPracticeStatus
PW.1Risk-based secure designClaimed
RV.2Timely vulnerability remediationClaimed
PO.5Secure development environmentClaimed
PS.3SBOM availableNot stated
RV.1Vulnerability disclosure programClaimed
PS.2Code signingClaimed
Compliance Labs · Software Listing v3.5 · OLIR Schema Hub: CSF 2.0 ↔ 800-53r5 ↔ ISO 27001 · Avril 2026
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Vendor
  • Category
  • CL Tier
  • Short description
  • Website
  • What it is
  • Best for
  • Does NOT do
  • CL verdict
  • Regulatory coverage
  • Frameworks tested
  • Capabilities
  • MITRE ATT&CK
  • Strengths
  • Cautions
  • Anti-hype claims
  • Operational metrics
  • Evidence pack
Compare
Compare ×
View comparison Continue browsing software