This is a dedicated watch page for a single video.
An IT manager is weighing their options for protecting the organizations' external-facing applications from SQL injection, cross site scripting and cross site forgery attacks. The manager decided to implement a mechanism to filter HTTP/HTTPS traffic. Why type of solution has the IT manager selected to protect the external-facing applications?