Compare
Bastion at the network layer. Imunify on the filesystem.
Bastion blocks the request before it reaches the disk. Imunify scans what reaches it anyway. Run them together for full coverage from edge to filesystem.
- ~22 900
- events/24h handled at the network layer
- 4
- active bouncers (firewall, custom, php, appsec)
- 0
- intrusions reaching the filesystem so far
Sample from a production Plesk node running Bastion + Imunify AV side-by-side since 2026-05-11.
Stack fit
Two products, two layers, one stack.
Layered defense, not rivalry
Bastion sits in front of nginx. Imunify sits on top of the disk. Together they cover the request path and the files it could ever touch.
Bastion sees what Imunify cannot
Probes, brute force, scanner paths, blocked IPs and CVE virtual-patches stopped at HTTP 403, before a single byte hits a customer PHP file.
Imunify catches what Bastion misses
Files arriving by FTP, by SSH or via a paid CMS plugin install never traverse the auth_request layer. A filesystem scanner is the right tool for that last mile.
Operational compare
Different product shape, compatible deployment.
Layer
Network and HTTP, in-flight request inspection
Filesystem, scans files at rest
Primary signal
CrowdSec LAPI + CTI community decisions
Signature database + heuristics on PHP/JS
Action surface
Ban, captcha, throttle, scoped allow rules
Quarantine, clean, alert, WP hardening
Plesk integration
Native extension dashboard
Plesk extension + WordPress plugin