Frequently Asked Questions
If you didn’t find your question in this list, feel free to ask it in the support chat
What is included in the free trial? What happens after the free trial expires?
During the 14 day free trial you have access to all RapidSec Pro features. When your trial expires, RapidSec will prompt you to select the best plan for you.
What is a “Data Point”?
RapidSec processes 'data points' to power the CSP suggestions, dashboards, reports & monitoring alerts. Some origins of data points are CSP reports (sent to your unique report-uri), and HTTP or HTTPS requests handled by your application and protected by the RapidSec Microagent.
What happens if I consume all of my monthly data points?
You can upgrade your plan at any time to get higher quota of monthly data points. Once upgraded to one of our paid plans, you'll have access to the app even if you'll consume all of your new data points quota.
Can I cancel or change my plan at a later time, or get a refund?
Yes! We don’t hold anyone by force and strive to provide long term value to all our customers without tying them in. You can ask for a refund within 30 days if you are not satisfied for any reason.
How does Content-Security-Policy protect my site?
CSP is considered a general defense-in-depth technology, protecting from web client-side attacks. It is very powerful for the cases that a certain security vulnerability exists — either from your code, or from a 3rd party. Companies like Github and Google regularly use CSP to protect and monitor their assets from XSS and other client-side attacks.
How do I manually deploy a CSP HTTP header on my site?
Which vulnerabilities does RapidSec defend against?
RapidSec protects your users and data from the most common and painful attacks on your Web Client side. These include:
CSRF · Cross Site Request Forgery: A malicious attack where a user is tricked into performing an action he or she didn't intend to do. It can result in damaged client relationships, unauthorized fund transfers, changed passwords and data theft — including stolen session cookies.
ClickJacking: An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element. This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online.
CSIM · Client Side Injected Malware: These vulnerabilities arise when applications using a client-side template framework dynamically embed user input in web pages. The security impact of client-side injection vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality that it contains, and the other applications that belong to the same domain and organization.
What is Client-Side Protection?
Client-Side Protection is technology that runs inside the browser of your end-users, blocking a vast array of attacks such as Cross-site scripting (XSS), Clickjacking, CSRF, Formjacking, Magecart / Supply chain attacks. The best way to provide client side protection is implementing a strict content-security-policy (CSP), leveraging samesite cookies and optimizing other security headers. RapidSec fully automates these browser-native controls, making client-side protection effective, yet effortless.
Do I need RapidSec if I already have a WAF (Web Application Firewall)?
Yes, absolutely! RapidSec's patent-pending technology provides a new critical layer of web protection, above the WAF, which effectively eliminates attacks targeting your vulnerable client-side. We ensure only allowed scripts are running on your page, data exfiltration to malicious sources is blocked, and all cookies are well-configured to protect your users and data.
How does RapidSec Boost website performance?
Does RapidSec respect my data privacy?
Looking for more information?