Protect Your Tools, Safeguard Your Business

As a Managed Service Provider, you understand the critical importance of secure, reliable access to your tools. Securing self-hosted applications is no longer optional, with the rising threat of cyberattacks and zero-day exploits. Automation Theory’s Reverse-Proxy-as-a-Service (RPaaS) with Web Application Firewall provides a comprehensive, managed solution designed to protect your MSP environment without compromising accessibility or performance.

A simulated SQL Injection attack against ConnectWise Automate being stopped.
Available in:

Why Choose Our Managed Reverse Proxy & WAF Solution?

  • End-to-End Security: Our combined Reverse Proxy and WAF solution not only prevents enumeration but also defends against sophisticated cyber threats with multi-layered security controls to stay ahead of new threats.
  • Simple, Managed Implementation: Our solution, purpose-built for MSPs, is designed for easy deployment with your existing workflows, allowing you to focus on what you do best.
  • Zero Hassle, Fully Managed: Automation Theory handles setup, management, and ongoing support, ensuring your tools are always secure and accessible.

Core Features

Zero-day attacks on MSP tools are the things nightmares are made of. A robust reverse proxy and WAF solution implements a variety of controls to add multiple layers of protection against zero-day attacks.

Our solution not only protects against enumeration to prevent attacks — our WAF engine offers protection against previously unknown threats. This buys MSPs critical time in zero-day scenarios when vendors are scrambling to release patches for emerging threats.

Best practice hardening will never be thrilling, but like diet and exercise, it’s foundational for baseline cyber hygiene. Most MSP tool vendors are years behind the security capability of modern web browsers, and managing cryptography involves OS-level tuning on multiple servers (and even multiple operating systems).

With our service, you can configure all your hardening for all your on-prem applications in one place. By configuring modern security headers, you can add exploit protection by instructing the browser to load content in specific manners or control what on a web page can access clipboard data.

Likewise, it’s possible to granularly allow for legacy cryptographic configurations. For example, for MSPs onboarding new clients, it’s common to see devices that are behind on patching or end-of-life that don’t support the latest TLS ciphers. If you’re using ConnectWise Automate behind our service, it’s possible to allow the remote agents to communicate on legacy versions of TLS to expedite onboarding while requiring all non-agent requests to use secure versions of TLS.

The IP address ACL has been around for over 40 years. While there are limitations to IP ACLs, they work well for certain use cases — and they are easy to implement and manage in our service’s API (and since the same instance can be used for multiple applications, it might streamline maintenance of IP lists).

Likewise, there are 195 countries in the world — and not all of them need to communicate with your MSP tools. Our service can implement traditional GeoIP filtering, which can still provide value in reducing attack surface.

Do you have a cloud vendor that integrates with your tools but doesn’t have static IP addresses? In this scenario, traditional network restrictions won’t work (or are brittle at best).

Our service can lock onto identifiers in the HTTP request and allow requests through to applications based on the originating vendor. This allows for low-maintenance access controls and ensures integrations won’t break if a vendor adds new infrastructure.

SSO providers offer a slew of security protections beyond strong authentication. However, there can be weaknesses in how an MSP tool handles SSO (or some applications might not support SSO or your provider).

With our service, it’s possible to redirect an inbound request to your SSO provider before it reaches the application. This allows MSPs to protect against authentication bypass vulnerabilities and add SSO to applications that don’t have it.

Most on-prem MSP tools show up in IoT scanners like Shodan. This is a critical issue since enumeration is the first phase of a cyberattack, and an attacker with a vulnerability can download a list of targets and feed it into a bot for exploitation in minutes. Likewise, most MSPs run their tools on their primary web domain, which allows attackers or competitors to quickly determine what MSP tools are in use.

Our service comes with anti-enumeration defaults. It will prevent the enumeration of the tools it protects by IoT scanners like Shodan. It also comes with obfuscated FQDNs by default (with the option to support a custom FQDN of yours) and implementation guidance to thwart enumeration techniques.

Does your MSP have an official browser that all staff are supposed to use? Or does your policy indicate that only company devices are allowed to access internal tools?

Depending on your overall security stack, some of these policies can be left to the honor system — which can be less than desirable. Our service can be used as a technical control to enforce policies, streamlining those controls for every application protected by the proxy.

MSPs have interesting access requirements. For example, every user should connect from the office/ZTNA network…except for the one script using a PowerShell module for the API. Or, only internal networks should access the remote access tools — except for users calling in who need to get to the home page to enter temporary access codes.

Our service can help MSPs meet these complex access needs. For example, it’s possible to allow PowerShell access to specific parts of an application while otherwise requiring access from known IPs. Likewise, an application’s home page can be accessible but require SSO, certificate authentication, or access from a trusted network to access any other part of the app.

Good logging is critical for security and troubleshooting. Unfortunately, the quality of the logging mechanisms for various MSP tools can be luck of the draw. In some scenarios, it can be difficult to tell if an attack actually happened without alternative logging configured beforehand.

Our service supports Syslog for HTTP requests. This allows all requests to be sent to your existing SIEM tool, allowing deep visibility for all applications behind the proxy. In the event of a threat, you’ll be prepared with the correct data to tell if your MSP has been impacted.

These days, MSPs have a lot of tools. If that wasn’t enough, each tool has different security options, which adds another layer of complexity.

Our service works with the most popular MSP tools — and is compatible with most other web applications. Protecting multiple applications with the same instance lets MSPs deploy the same controls to all apps for streamlined security and lower management overhead.

Why Do MSPs Love Our Service?

For quite a while (and we had been a Kaseya customer previously), I felt an RMM compromise was going to be the most impactful event that could happen to our business and ultimately impact our customers as well. The power that the RMM tool has is pretty significant, with scripts running as system or root in many cases. And so we felt that we had to do something to better secure that tool and not have it be out there in the world. I know there’s been other unauthenticated access flaws, which was my big concern. We’ve always had MFA implemented, and we’ve locked it down as much as we can. We limit roles within the tool, but there have been prior attacks where if they could reach the sign-on page, they were able to sign into the service.  

I sleep much better at night knowing that our RMM tool is not exposed to the greater world and all the bad actors that are out there. So we’re very happy with it, and we just implemented the web application firewall for that additional layer of security in case somebody gains access from one of these trusted networks.

Kris, Chief Security Officer, Anomymous MSP in Wisconsin

Supported MSP Applications

ApplicationProxy SupportWAF Support
Connectwise Automate
(including Cloud Hosted)
Connectwise ScreenConnect
ConnectWise Manage/PSA
Hudu
Bitwarden
Other Apps*

*Best-effort support is provided for other self-hosted web applications that are not listed.
Multiple applications can be protected with the same proxy instance for no additional cost.

Technical Specifications

Our managed Reverse Proxy and WAF solution is a SaaS and requires minimal setup on your end. Automation Theory hosts and manages all services, providing you with reliable, enterprise-grade protection without the technical overhead. The initial setup can be done in under 30 minutes.

Get Started with a Solution Designed for MSPs

Whether you’re looking to protect against zero-day attacks, restrict access, or harden sensitive systems, our Reverse Proxy and WAF solution is your MSP’s trusted partner. Let us help secure your environment with scalable, robust protection.

Ready to get started?

Please fill out the form below if you’d like to set up a trial of our reverse proxy and WAF. Trials are available for $5/USD:


    Have questions?

    Use our self-service quote form below to get a quote delivered directly to your inbox – or schedule a call with our team to discuss further.

    Base pricing is $319/month USD.