Is traditional security restraining you? Not anymore!

ACFW* is innovative firewall designed and built to bring security control back to application owners and developers. It changes vulnerable organization into series of small, highly secured entities. Deploy as part of your application, anywhere you want. Create policy you need, exactly how you need it. Your application, your requirements, your rules, your firewall.

iPad mock

Application Focused

To empower your business

Don’t worry about IPs, ports and firewall rules. Register servers to roles, create policies based on roles. Deploy anywhere you want. Change configuration based on events in your application. Experience flexibility not known before.

Ultra

Easy to use

No complex syntax, no marketing-driven features noone will ever need, just simple API. It takes less than 5 minutes to start using. It is deployed along with your application anywhere in the world and whenever you need.

DevOps

Natural Choice

Naturally belongs to application and is managed within a team. No other security product fits DevOps and DevSecOps frameworks so closely.

Zero Trust

Finally defined

No marketing pitches. Implement real zero trust policy. Treat office users, home-workers, internet customers and even other applications with the same level of security.

Unique features

Out-of-the-box

Try our dynamic configurations, role-based access, app-diagrams, guest portal, templates, events and more things otherwise impossible to achieve or requiring tens of thousands of dollars for required infrastructure. All of this available out-of-the-box for a fraction cost.

Choose version which best suits your application

Basic

Small projects

  • Server roles
  • Policies based on roles
  • Dynamic configurations
Order
Standard

Projects of any size for any company

  • Server roles
  • Policies based on roles
  • Dynamic configurations
  • Templates
  • App-diagrams
Order
Global

When highest security standards are required

  • Server roles
  • Policies based on roles
  • Dynamic configurations
  • Templates
  • App-diagrams
  • Global Policy
TBD

Testimonials

Beginning of a new journey

Imagine a world in which your home does not have locks. You cannot have them because government said you don't have knowledge to decide who can enter your home. Imagine that to be able to invite your family from another town you need to provide names, dates of birth and reason of visit to chief of the Police at least 3 weeks in advance to obtain permission. Your neighbors at the same time can freely enter your home because they're considered candid. There are cameras everywhere and every step of every person is recorded but if something is stolen from you, the only thing Police will do is to inform you after 2 months how it happened. Government does nothing to change this because crime rates are below target. Would you consider it absurd?

This is how traditional and next-generation cybersecurity looks like. Just replace words in this story with statements like perimeter security, security zones, change management, approvals, visibility or risk acceptance. Over 20 years of cybersecurity experience led us to a moment in which we are in position to reveal first product of our new cybersecurity strategy - firewall that is as close to application as possible. Tool which is so easy to use that you don't need to have degree in cybersecurity. Applications already store usernames and decide who can log in. Now they will be able to go extra mile in security from day one.

News

Contact us