15+ attack vectors · sub-50ms · activation-based billing

Lyrie AI WAF — Hybrid-Grade Web Protection

Enterprise-grade detection with 15+ attack vectors, sub-50ms decisions, and multi-vector correlation. Your subscription only starts when your WAF is actually connected.

15+ attack vectors · sub-50ms · activation-based billing

Lyrie AI WAF — Hybrid-Grade Web Protection

Enterprise-grade detection with 15+ attack vectors, sub-50ms decisions, and multi-vector correlation. Your subscription only starts when your WAF is actually connected.

15+ attack vectors · sub-50ms · activation-based billing

Lyrie AI WAF — Hybrid-Grade Web Protection

Enterprise-grade detection with 15+ attack vectors, sub-50ms decisions, and multi-vector correlation. Your subscription only starts when your WAF is actually connected.

Two simple ways to connect

No complex integrations. Choose DNS records for any website, or our WordPress plugin for one-click setup.

ONE-CLICK SETUP - NO API KEY

DNS Records (Automatic)

Click one button and Entri auto-configures your DNS records — works with Cloudflare, GoDaddy, Namecheap, and 40+ providers.

No manual DNS editing needed. Zero code changes, zero hassle.

Requires API Key

WordPress Plugin

Download and install our WordPress plugin. Enter your API key in Settings → Lyrie AI and the plugin handles everything.

Full WAF protection with zero configuration.

Two simple ways to connect

No complex integrations. Choose DNS records for any website, or our WordPress plugin for one-click setup.

ONE-CLICK SETUP - NO API KEY

DNS Records (Automatic)

Click one button and Entri auto-configures your DNS records — works with Cloudflare, GoDaddy, Namecheap, and 40+ providers.

No manual DNS editing needed. Zero code changes, zero hassle.

Requires API Key

WordPress Plugin

Download and install our WordPress plugin. Enter your API key in Settings → Lyrie AI and the plugin handles everything.

Full WAF protection with zero configuration.

Two simple ways to connect

No complex integrations. Choose DNS records for any website, or our WordPress plugin for one-click setup.

ONE-CLICK SETUP - NO API KEY

DNS Records (Automatic)

Click one button and Entri auto-configures your DNS records — works with Cloudflare, GoDaddy, Namecheap, and 40+ providers.

No manual DNS editing needed. Zero code changes, zero hassle.

Requires API Key

WordPress Plugin

Download and install our WordPress plugin. Enter your API key in Settings → Lyrie AI and the plugin handles everything.

Full WAF protection with zero configuration.

Built for production

Get hybrid-grade endpoint protection in four simple steps.

Activation-based billing

Your WAF subscription only starts counting down once your domain is successfully connected — no wasted time.

One-click DNS setup

Use our Entri integration to auto-configure DNS records with a single click. No manual DNS editing required.

Connection change protection

Connection methods can be changed up to 3 times per 72 days, protecting against unauthorized modifications.

Sub-50ms decisions

Every request is analyzed and a block/allow decision is made in under 50 milliseconds — zero impact on user experience.

Built for production

Get hybrid-grade endpoint protection in four simple steps.

Activation-based billing

Your WAF subscription only starts counting down once your domain is successfully connected — no wasted time.

One-click DNS setup

Use our Entri integration to auto-configure DNS records with a single click. No manual DNS editing required.

Connection change protection

Connection methods can be changed up to 3 times per 72 days, protecting against unauthorized modifications.

Sub-50ms decisions

Every request is analyzed and a block/allow decision is made in under 50 milliseconds — zero impact on user experience.

Built for production

Get hybrid-grade endpoint protection in four simple steps.

Activation-based billing

Your WAF subscription only starts counting down once your domain is successfully connected — no wasted time.

One-click DNS setup

Use our Entri integration to auto-configure DNS records with a single click. No manual DNS editing required.

Connection change protection

Connection methods can be changed up to 3 times per 72 days, protecting against unauthorized modifications.

Sub-50ms decisions

Every request is analyzed and a block/allow decision is made in under 50 milliseconds — zero impact on user experience.

Detection layers

Every request passes through multiple detection layers. When signals combine, scores amplify.

Signature rules

Pattern-matching across 15+ attack categories with multi-pass normalization.

Behavioral analysis

Rate patterns, request timing, burst detection, and login brute force protection.

AI scoring

Entropy analysis, payload length scoring, and per-request anomaly detection.

Distributed detection

Same payload from multiple IPs, coordinated attack patterns across the network.

Multi-vector correlation

When 2+ attack vectors trigger, scores amplify — catching sophisticated attacks.

Baseline anomaly

Deviation from normal traffic patterns flags suspicious behavior automatically.

  • Signature rules

    Pattern-matching across 15+ attack categories with multi-pass normalization.

  • Behavioral analysis

    Rate patterns, request timing, burst detection, and login brute force protection.

  • AI scoring

    Entropy analysis, payload length scoring, and per-request anomaly detection.

  • Distributed detection

    Same payload from multiple IPs, coordinated attack patterns across the network.

  • Multi-vector correlation

    When 2+ attack vectors trigger, scores amplify — catching sophisticated attacks.

  • Baseline anomaly

    Deviation from normal traffic patterns flags suspicious behavior automatically.

Detection layers

Every request passes through multiple detection layers. When signals combine, scores amplify.

Signature rules

Pattern-matching across 15+ attack categories with multi-pass normalization.

Behavioral analysis

Rate patterns, request timing, burst detection, and login brute force protection.

AI scoring

Entropy analysis, payload length scoring, and per-request anomaly detection.

Distributed detection

Same payload from multiple IPs, coordinated attack patterns across the network.

Multi-vector correlation

When 2+ attack vectors trigger, scores amplify — catching sophisticated attacks.

Baseline anomaly

Deviation from normal traffic patterns flags suspicious behavior automatically.

  • Signature rules

    Pattern-matching across 15+ attack categories with multi-pass normalization.

  • Behavioral analysis

    Rate patterns, request timing, burst detection, and login brute force protection.

  • AI scoring

    Entropy analysis, payload length scoring, and per-request anomaly detection.

  • Distributed detection

    Same payload from multiple IPs, coordinated attack patterns across the network.

  • Multi-vector correlation

    When 2+ attack vectors trigger, scores amplify — catching sophisticated attacks.

  • Baseline anomaly

    Deviation from normal traffic patterns flags suspicious behavior automatically.

How it works

Verify your domain, connect, and protection starts immediately.

Ready to protect your web apps?

Start with full WAF protection free. No credit card required. Your subscription only begins once your WAF is connected and active.

Ready to protect your web apps?

Start with full WAF protection free. No credit card required. Your subscription only begins once your WAF is connected and active.

Ready to protect your web apps?

Start with full WAF protection free. No credit card required. Your subscription only begins once your WAF is connected and active.

Ready to protect your web apps?

Start with full WAF protection free. No credit card required. Your subscription only begins once your WAF is connected and active.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.