Major Gaps In Enterprise WAF Coverage Identified

A new study by CyCognito, a leading provider of external attack surface management solutions, has revealed significant deficiencies in web application firewall (WAF) protection across major enterprises. Released on 9 September 2025, the research highlights how more than half of external assets remain unprotected, including those handling sensitive personal data.

Drawing from an analysis of over 500,000 internet-exposed assets belonging to Forbes Global 2000 companies, the findings challenge assumptions about baseline security measures and call for improved visibility and consistency in deployments. Traffic volume indicators were used in the manual sample to gauge usage, providing a layered view of exposure.

Widespread Absence Of WAF Protection

The report paints a concerning picture of uneven WAF coverage, which is often regarded as a fundamental layer of defence against common threats like credential stuffing and injection attacks. CyCognito's analysis found that 52.3% of cloud-hosted assets lack any WAF protection, while the figure rises to 66.4% for assets not hosted in the cloud.

This disparity suggests that traditional on-premises systems are particularly vulnerable, potentially due to legacy management practices.

Researchers attribute these gaps to organisational challenges, including fragmented teams and the absence of a centralised inventory of assets. Many enterprises overlook "unknown unknowns" - assets that exist outside official records - making it difficult to apply protections uniformly.

The study emphasises that without comprehensive visibility, even well-resourced organisations leave critical systems exposed, providing attackers with straightforward entry points.

Vulnerabilities in PII-Handling Assets

Particularly alarming is the exposure of assets that collect personally identifiable information (PII), such as login forms, registration pages, and checkout portals. These high-value targets are prime for reconnaissance and exploitation, yet the research shows substantial lapses.

In cloud environments, 39.3% of PII-collecting assets operate without WAF safeguards, while 63.4% of off-cloud equivalents are similarly unprotected.

This inconsistency heightens risks to data privacy and compliance, as unprotected PII pages could lead to breaches compromising customer trust and regulatory standing. The report notes that these gaps persist despite the critical nature of such assets, often because security configurations are not standardised across an organisation's sprawling digital footprint.

Fragmented WAF Deployments Across Vendors

Adding to the complexity, the study reveals that enterprises typically manage an average of 12 different WAF products, with a median of 11 and some using over 30. This multiplicity stems from historical procurements, regional variations, and siloed operations, resulting in a patchwork of defences that are hard to coordinate.

Far from enhancing security, this vendor diversity complicates policy enforcement and increases operational costs. Each WAF has unique configurations, leading to inconsistencies that allow assets to fall through the cracks. The report argues that abundance does not equate to effectiveness; instead, it fosters blind spots where protection is assumed but not verified.

In-Depth Analysis Of Global Enterprises

To assess real-world implications, CyCognito conducted a manual review of traffic patterns across a dozen prominent global enterprises in sectors like aviation, retail, finance, and media. The findings were stark: even these industry leaders exhibited unprotected high-traffic applications alongside fully secured flagship systems. 

This manual validation separated hypothetical risks from operational realities, confirming that gaps are not merely theoretical. In several instances, unprotected assets handled significant user interactions, demonstrating that the issue lies in execution rather than availability of technology.

Such inconsistencies in large-scale organisations illustrate the pervasive nature of the problem and its potential for widespread impact.

Recommendations For Security Leaders

In response to these findings, the report offers practical guidance for addressing deficiencies. Security executives are urged to conduct thorough reviews of external asset inventories using discovery tools to identify shadow IT and overlooked systems. Once uncovered, assets should be prioritised: protected, remediated, or decommissioned based on business relevance.

Leaders should also evaluate WAF deployments for consolidation, aiming to reduce vendor sprawl and establish unified standards. Treating coverage as an ongoing process - rather than a one-time setup - can help maintain defences amid evolving attack surfaces. The emphasis is on proactive verification to ensure high-value assets, especially those involving PII, receive consistent protection.

Implications For Cyber Security 

The report concludes by stressing the importance of shared knowledge in building resilience. WAFs are vital, but their value depends on informed, uniform application. CyCognito's insights highlight the ongoing battle against dynamic threats, where continuous discovery and community collaboration are key.

 As attack surfaces expand, collective efforts to close gaps will be essential in safeguarding data and operations. This research serves as a timely reminder that assumptions about security can be costly, prompting organisations to prioritise visibility and consistency in their strategies.

Image: Ideogram

You Might Also Read: 

Do You Need Security That Starts With “Prove It”?:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Chinese Technology Businesses Accused Of Global Espionage
Don’t Just Survive a Data Breach - Prevent It »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.