Importance of Web Application Firewall Technology for Protecting Web-based Resources
|
|
|
- Neal Lawson
- 10 years ago
- Views:
Transcription
1 Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 1 of 7
2 Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Introduction Web-based applications and services have changed the landscape of information delivery and exchange in today s corporate, government, and educational arenas. Ease of access, increased availability of information, and the richness of web services have universally increased productivity and operational efficiencies. These increases have led to heavier reliance on web-based services and greater integration of internal information systems and data repositories with web-facing applications. While motivations of attackers against a victim s corporate and organizational assets remain the same (financial, IP, identity theft, services disruption, or denial of service, for example), web applications enable a whole new class of vulnerabilities and exploit techniques such as SQL injection, cross-site scripting (XSS), and cross-site request forgery, to name a few 1. The complexity of services, potential severity of breaches, and mounting sophistication of attacks requires additional functionality beyond the capability of traditional network-based security products. The emergence of dedicated web application firewall technology provides a comprehensive and focused solution to help increase the security of web-based services and protect valuable information assets. This paper will review the fundamental functionality of several traditional security technologies from a high level perspective, including network firewalls, intrusion prevention systems, outbound content filtering, and antimalware gateways. This paper will discuss why dedicated web application firewall technology is necessary to protect web-facing resources. It will also provide a suggested deployment model that illustrates the relative locations of the discussed technologies within a simplified enterprise network. 1 For additional information on attack descriptions and classifications, see 1) OWASP Top , Top_10_2007, and 2) WASC Threat Classification, Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 2 of 7
3 Protocol-Enforcing Network Firewalls Many firewall vendors augment port blocking and TCP session or state awareness by employing protocol inspection functionality (historically known as packet filtering) to help prevent attacks that exploit weaknesses in protocol implementation. This protocol enforcement includes protocols from the application layer of the IP protocol stack such as DNS, HTTP, FTP, SMTP, and SSH and is effective at preventing simple protocol attacks such as fuzzing 2 or parameter overflow attacks by either rejecting protocol violations or by normalizing protocol parameters. Other implementations include pattern matching and blocking of common protocol exploits. Protocol-enforcing network firewalls typically provide the first line of defense by arresting most basic protocol attacks at the network perimeter, including protocol-based denial of service attacks. They primarily operate in the network, session, and transport layers of the Open Systems Interconnection (OSI) reference model. Developers have also greatly enhanced the capability of network firewalls to police the protocol integrity of a wide range of upper-layer protocols such as DNS, FTP, HTTP, SMTP, and TFTP. Network firewalls can also verify that traffic passed over non-standard ports, such as SMTP running over port 2525, conforms to valid SMTP traffic. Intrusion Prevention Systems Intrusion prevention systems (IPS) can be deployed at various locations within an enterprise network. IPS agents monitor network traffic and scan for signatures of a wide range of known attacks. Administrators can choose which application/protocol signature sets they wish to apply in which locations. Improvements in functionality have allowed IPS devices to make access control decisions based on various aspects of the network traffic such as protocol and content type. IPS functionality can also be implemented on the wire in LAN segments, known as network IPS (NIPS) or in software on a host server or client, known as host IPS (HIPS). IPS is effective at providing signature scanning, pattern matching, anomaly detection, and behavioral-based functionality for a broad range of known attacks that make it past perimeter defenses. IPS devices, like network firewalls, support a wide range of network protocols. Enhancements have also provided the capability to detect multi-pronged attacks using state machines that can trigger an IPS to watch for a secondary set of conditions when a primary set of conditions is observed. Outbound Content Filtering Outbound content filtering gateways provide access control for internal corporate users as they access information from the Internet. Content filtering provides protection to an enterprise by preventing users from accessing malicious or otherwise dangerous external content by enforcing white and black lists of known good and known bad Internet sites. Outbound content filters can also be configured to block internal users from uploading corporate documents to external sites. This can help curb identity theft and information leakage. More sophisticated content filtering platforms provide additional protection by monitoring other services, including instant messaging and file transfer systems such as FTP and peer-to-peer (P2P), as well as provide interfaces to anti-malware solutions. Administrators can also configure access control lists and groups that can provide different filtering rule sets for various employee types. Content filtering platforms also address intellectual property protection by providing data loss prevention (DLP) functionality. 2 Fuzzing refers to an attack technique that probes for protocol vulnerabilities by using brute force to transmit vast amounts of random data into protocol parameter values with the hopes of uncovering an exploitable situation from a protocol stack entity. Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 3 of 7
4 Anti-Malware Gateways Malware refers to variants of malicious code such as viruses, Trojans, rootkits, macro viruses, etc., as well as other undesirable content such as spyware and phishing links. Anti-malware gateways scan inbound and outbound content, including , instant messaging, and file downloads, for code that can compromise client security. Antimalware gateways focus on scanning attachments or snippets of code that can either self-execute on a client or that can be uploaded to an Internet-based server for future download by a client. Recent enhancements include outbreak prevention by which a gateway can signal other security devices to limit propagation when malware is detected. Web Application Firewalls Web application firewalls (WAFs) deal specifically with web-based traffic, i.e., HTTP/HTTPS, and can be deployed either as standalone appliances or as self-contained software installed on the web servers themselves. They employ a wide range of functions to work in conjunction with perimeter firewall and IPS technology to augment application attack prevention. Most WAFs include HTTP/HTTPS protocol enforcement and negative signature detection. Other protection mechanisms include URL normalization and scanning, positive security functionality that enforces proper application operation and page logic flow, and adaptive learning modules that can update security policies on the fly. WAFs can also block attacks masked by HTTPS encryption by inspecting SSL sessions using the web server s private key, detecting policy violations, and resetting offending connections. These sessions can either be passively decrypted and inspected or actively terminated and re-encrypted. Furthermore, WAFs can recognize and be configured to police the usage of specific web application elements and functions, such as web objects, form fields, and, most importantly, application session logic. Session logic enforcement, or HTTP session awareness, includes session cookie or state monitoring and protection, as well as the capability to enforce web-path logic and server entry points to prevent session hijacking exploits that allow an attacker to assume the session of another logged-in user. This HTTP session awareness is one of the primary differentiators that web application firewalls possess. WAFs enforce proper context of the HTML request and response, as well as provide semantic awareness of the relationships of the various web objects present on a web site, such as various types of form fields, input drop down lists, server and client side scripts, functions, and associated input and output parameters. They have the functionality to block attacks specific to a wide range of web server, database, and programming platforms. WAFs can be configured to mask or rewrite inbound and outbound server responses to help protect against sensitive information leakage such as credit card numbers. This capability can help administrators address Payment Card Industry Data Security Standard (PCI DSS) policy requirements. WAFs can be deployed between perimeter defenses and the web servers they protect, or installed directly on web server platforms as host-based WAFs. Figure 1 illustrates a simplified enterprise network and the relative locations of the various technologies discussed in a representative deployment. Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 4 of 7
5 Web Application Firewall Typical Deployment, Figure 1 Internal Corp Users Host-based WAF Edge Firewall Content Filter Internal Firewall WAF Internet IPS Malware Gateway Servers Web Application Server Farm Database Servers Copyright 2008, Cybertrust, Inc., All Rights Reserved Internet Users Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 5 of 7
6 Summary Each of the discussed technologies provides excellent security for the aspects of the enterprise network they are designed to protect. With the emerging prevalence and importance of application security, developers of these technologies have enhanced their offerings within the boundaries of their functionality to help protect web applications. Figure 2 provides an overview of each technology by presenting historical purpose, primary mechanism of operation, scope, and how each has enhanced the technology to provide additional functionality in the application security area. Overview Grid, Figure 2 Overview of Technologies and Application Security Relevance Technology Primary Purpose Primary Mechanism of Operation Protocol-Enforcing Network Firewall Intrusion Prevention Systems Content Filtering Gateways Anti-malware Gateways Web Application Firewall OSI network model protocol protection Signature-based network protection Outbound access control Signature-based payload protection HTTP/HTTPS application protection Network port blocking UDP/TCP state awareness Signature scanning Connection reject UDP/TCP state awareness URL and DNS level access control list Outbound connection reject Signature payload scanning Attachment removal URL normalization Session state enforcement Application context enforcement Scope Network protocols Network protocols Network applications Outbound web, IM, file applications Payload components HTTP/HTTPS applications Application Enhanced Functionality Protocol enforcement Enhanced access control URL scanning Broad range of signatures Anti-malware interface Advanced heuristics Outbreak protection Context-based positive security model Adaptive rule modification/exception Copyright 2008, Cybertrust, Inc., All Rights Reserved Dedicated WAFs are designed specifically for HTTP/HTTPS protocols and are required in addition to traditional security technologies to provide a complete solution for securing web applications. They provide in-depth webspecific functionality such as application session awareness, request/response rewriting and masking, and detailed platform- and application language-specific functionality. These capabilities are vital to preventing sophisticated attacks and protecting valuable information assets. Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 6 of 7
7 About the ICSA Labs Web Application Firewall Product Developers Consortium ICSA Labs web application firewall testing and certification program evaluates and certifies products that implement security policy enforcement for the protection of HTTP and HTTPS web-based applications. In conjunction with ongoing efforts in the industry to classify and categorize application security issues and mitigate potential vulnerabilities, web application firewall certification criteria were developed to provide security managers with confidence in the products that secure vital application services from exploitation or attack. WAF Product Developers Consortium Members Applicure Technologies, Ltd., Breach Security, Inc., Citrix Systems, Inc., F5 Networks, Inc., Fortify Software, Inc., Imperva, Inc., Netcontinuum, Inc., Contributors The author would like to acknowledge the following individuals for giving input to the content of this paper: Representatives of the members of the WAF Product Developers Consortium Representatives of the ICSA Labs Consortium program managers group Contact ICSA Labs For questions or comments about this paper, contact Andrew J. Hacker at For more information regarding the ICSA Labs Web Application Firewall Testing Program or WAF Product Developers Consortium, visit and follow the Web Application Firewall hyperlink. About ICSA Labs ICSA Labs, an independent division of Verizon Business, offers vendor-neutral testing and certification of security products. Hundreds of the world s top security vendors submit their products for testing and certification at ICSA Labs. The end-users of security technologies rely on ICSA Labs to authoritatively set and apply objective testing and certification criteria for measuring product compliance and reliability. The organization tests products in key technology categories such as anti-virus, anti-spyware, network firewall, IPSec VPN, cryptography, intrusion prevention, PC firewall, SSL-VPN, web application firewall, anti-spam and wireless LAN. For more information about ICSA Labs, please visit: Copyright 2008 Cybertrust, Inc. All Rights Reserved. Page 7 of 7
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Gateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Web Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
What to Look for When Evaluating Next-Generation Firewalls
What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
FortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6
Imperva Technical Brief Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6 The PCI Security Standards Council s (PCI SSC) recent issuance of an Information Supplement piece
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Global Web Application Firewall Market 2015-2019
Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from
White Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
NSFOCUS Web Application Firewall
NSFOCUS Web Application Firewall 1 / 9 Overview Customer Benefits Mitigate Data Leakage Risk Ensure Availability and QoS of Websites Close the Gap for PCI DSS Compliance Collaborative Security The NSFOCUS
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Applications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Trend Micro Solutions for PCI DSS Compliance
s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Security 101: BIG-IP ASM and IPS Differences Defined
F5 White Paper Security 101: BIG-IP ASM and IPS Differences Defined Industry experts have long debated which is a better defense mechanism in defending against Internet based attacks: a web application
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Next Generation Firewall
Next Generation Firewall Product Overview SANGFOR Next-Generation Firewall is designed with Application Control, Intrusion Prevention and Web Security in mind, providing deep and fine-grained visibility
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Unified Threat Management + Anti-DDoS WAF +
Unified Threat Management + Anti-DDoS WAF + Triple ISO Triple Tolly IPv6 ISO 9001:2008 ISO/IEC 20000:2011 ISO/IEC 27001:2005 100% Extended WildList Malware detection over HTTP, POP3 and SMTP protocols
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
How To Protect Your Network From Attack From A Hacker (For A Fee)
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter Director of Industrial Security Waterfall Security Solutions
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
