STAYSAFEONLINE
WITH
WEBHAWK
(CyberThreatSecurity)
BASES
COVERED
AttacksPreventedbyWebhawk
Denial of
Service attack
Sync Flood
Attack
DNS Spoofing
DNS Flood
Attack
DRDOS Attack
DNS cache
Poisoning
Session
Hijacking
Man-in-the-
Middle Attack
Backdoor
attacks
ComparisontoOtherSolutions
Protection WebHawk Firewall Antivirus Standard Wireless
Routers
Hacks Y N N N
Malware Y LIMITED N N
RuleBased
Protection
Y Y Y N
BehaviorLearning Y N N N
Securesall
connecteddevices
(notjustPCs)
Y Y N N
AutomaticUpdates Y N N N