Technology Blueprint. Protect Your Web Servers. Reduce the attack surface according to each web server s risks

Size: px
Start display at page:

Download "Technology Blueprint. Protect Your Web Servers. Reduce the attack surface according to each web server s risks"

Transcription

1 Technology Blueprint Protect Your Web Servers Reduce the attack surface according to each web server s risks

2 LEVEL SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL Security Connected The Security Connected framework from McAfee enables integration of multiple products, services, and partnerships for SECURITY CONNECTED centralized, efficient, and REFERENCE ARCHITECTURE effective risk mitigation. Built on LEVEL more than two 1decades 2 3 of 4 5 proven security practices, the Security Connected approach helps organizations of all sizes and segments across all geographies improve security postures, optimize security for greater cost effectiveness, and align security strategically SECURITY with business CONNECTED initiatives. The REFERENCE Security Connected ARCHITECTURE Reference Architecture provides a concrete LEVEL path from 1 ideas 2 3 to 4 5 implementation. Use it to adapt the Security Connected concepts to your unique risks, infrastructure, and business objectives. McAfee is relentlessly focused on finding new ways to keep our customers safe. Reduce the attack surface according to each web server s risks The Situation The good news: every company has gotten jittery about web server security. The bad news: the catalyst has been destructive, expensive hacks, breaches, and downtime at companies like Sony, Nintendo, and Amazon. The Sony PlayStation Network (PSN) hack ultimately cost them an estimated $175 million just from downtime. Gene Spafford, a Purdue University professor of computer science, testified before the U.S. Congress that Sony was running an obsolete version of the Apache web server that was unpatched and had no firewall installed. 1 Prior to this incident, Sony was under a DoS attack from the hacktivist group Anonymous, because of a highly visible court battle with another hacker. Then, after the PSN was hacked and taken off line, the hacker group LulzSec breached Sony via what they said was a simple SQL injection. Sony is just one bruised brand on a long list of web hacking targets today. Hackers are not the only concern for website and web server administrators, just the most obvious. With tight budgets, most businesses struggle to keep up with the risks specific to web servers including HTTP fingerprinting, unauthorized access, denial of service, and code injection attacks. Few organizations implement appropriate countermeasures. Yet, every day, misconfigured, unpatched, insecure web servers lead to loss of data, defacement, and service disruption, as Sony can attest. Driving Concerns You must understand your existing web server infrastructure before you can start to mitigate its risks. Most organizations have many different types of web servers that serve different purposes and have different functionalities. The following factors need to be considered in order to assess the level of risk of a web server and determine what mitigating controls need to be put in place. Infrastructure. Many organizations have aging web servers that support mission-critical applications. Most of these older web servers were not set up with security in mind. Couple this with the fact that these older systems are no longer supported, and you have a recipe for abuse and downtime. It is important to know what versions of operating systems and web server software your company runs, for a couple of reasons. One reason is patching. For example, if you know your versions of Apache, then you can easily track bugs and apply the appropriate patches. Along this same line, another reason is support. The risks associated with running a server that is not supported by the vendor can be addressed by upgrading or by implementing mitigating controls. Take Sony s obsolete version of Apache as an example. Sony had at least two choices: either upgrade or deploy a mitigating control like a web application firewall. Sony is hardly the only company that is slow to upgrade. Upgrades are a challenge if the web application was developed on an old platform that cannot be easily ported over to a newer operating system. Also, many companies running older, unsupported web servers do not want to take their servers offline to upgrade or patch, fearing that these older systems may not come back on line. Functionality. The attack surface of a web server has broadened in the past 10 years. A web server serving up static pages does not have much of an attack surface, unlike a blog or even a web server serving up a banking or financial application. Understanding the purpose of each web server in your infrastructure will give you greater understanding of what risks need your attention first. For example, a university may have a class catalog web server that serves up information about all the departments and the classes that students can take, but this content may be static, with no input fields. Then there is the student loan website, containing information on how to apply for loans. This server does accept input. There are forms for students to fill out and even a student logon page. 2 Protecting Web Servers

3 Both the class catalog and the student loan web servers are accessible from the public Internet. However, due to their different functionalities, each should be treated differently from a security perspective. Though this example is comparing two web servers at a university, almost every company or organization has similar scenarios. It could be that the company s main website has very limited functionality, yet their B2B server has extensive functionalities similar to the university s loan web server. Understanding your web servers functionalities will help you understand their criticality to the business or organization, and then you can determine the attention and security appropriate for each web server. Threat agent. The Open Web Application Security Project (OWASP) states that a threat agent is used to indicate an individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company. 2 For example, who or what the threat agent is will depend upon your company or organization and where or how the web server is accessed. US government agencies will have different threat agents than a big retail chain. The US government agencies have to consider international terror groups or hacktivists like Anonymous. A big retailer will have to be concerned with organized crime or hackers trying to steal PCI data or the personal information of their customers. Decision Elements These factors could influence your architecture: Does a third party host your web servers? Does a third party host your web applications? Are you using a web application firewall? Access to the web server from either the public Internet or your Intranet will also define the threat agent. The big retail store chain may have a web server that serves up human resource data to employees. An employee can log on and see insurance data and compensation information. The server also stores Social Security Numbers. However, this server is only accessible via the company s internal network. Though we could create an argument for external hackers, the threat agents in this scenario are employees. The internal threat can be split into unintentional or accidental or intentional or rogue. The unintentional threat agent might be an administrator who unknowingly changes the permissions on a directory from an exclusive group to everyone or does not remember to change a default password. A developer who makes a change to a code on the production system when she meant to make the change on the non-production web server is another example of an unintentional threat agent. In contrast, the intentional threat agent knowingly attacks a web server to gain information or bring a system down. Maybe it is an employee who has just been fired or one who wants to sell company data or employee personal information for his own profit. Since the perimeter requires many of our defenses and much of our attention, it is easy to overlook the internal or employee threat agent. Circumstances can change or create new threat agents. Hence, you need to be prepared to identify these threat agents on an ongoing basis. Staying informed of the public activities of your organization is important to understanding your threat agents. Sony is a good example of this. Their lawsuit against hacker GeoHot drew the attention of the hacker group Anonymous, which on April 4, 2011, staged a DoS attack on Sony s websites. If you have a legal department, ask them to keep you informed as to what legal actions they may be taking against public individuals or other companies or groups. Configuration and maintenance. Many web servers especially those with off-the-shelf operating systems and web server software are set up with unnecessary default and sample files, including applications, configuration files, scripts, and web pages. They may also have unnecessary services, such as content management and remote administration functionality, enabled by default. In addition, debugging functions may be enabled or administrative functions may be accessible to anonymous users. Each of these settings presents an open door to someone interested in abusing your web server. As you take the time to deactivate these settings, you need to be careful. A misconfigured web server also poses a risk to your organization. Server misconfiguration is number six on the OWASP Top 10.3 Misconfiguration can happen at any time during the lifecycle of the web server. Even the most securely configured web servers can quickly become vulnerable if not properly maintained. Protecting Web Servers 3

4 Assessing your web servers relative to the above factors will help you understand which of your web servers are at risk to the following attacks or exploits. This assessment of your infrastructure will also help you identify where you should concentrate your risk mitigation. Web Server Attacks Let s now look at the common attacks on web servers and see how the above concerns can make you more or less susceptible to these attacks. HTTP fingerprinting. This attack is aimed at determining what type and version of operating system and web server software your website or web application is running on, so the attacker can research and reuse any known exploits. For example, if your web server reveals that it is an IIS 7 web server, then the attacker can search the Internet for known exploits and target those vulnerabilities in your web server. It is very simple to attempt to fingerprint a web server. This can be done just by visiting and browsing a website because default landing pages, error messages, and forgotten test pages such as php.ini will cough up this information. Another very basic technique is to look at the server field in the HTTP header. Almost any free scanning tool will do this, including NetCat or nmap. Unauthorized access. The information gathered from HTTP fingerprinting will help the attacker to formulate other attacks. For example, imagine you left the phpinfo test page enabled. If an attacker figures out that your servers are running a web server consisting of Linux (operating system), Apache (web server software), MySQL, and PHP, then the attacker can try default usernames and logons to gain unauthorized access to your web server. Web servers have default passwords and sample functionality that make this job easy. There are also websites with default credentials for all web server software. For instance, the default administrator username and password for Apache Tomcat is admin and no password, or tomcat, tomcat or root, root. There are websites with default credentials for all web server software. Web servers also have sample functionality that can be easily used in the attacker s favor, perhaps by trying to step above the IISSAMPLES directory to access any sample scripts that have not been locked down or removed. There are other ways to get unauthorized access to a web server or web application, such as session hijacking, brute force, bad passwords (guessing passwords), and abusing password change or forgotten username and password functionality. Refer to the OWASP website ( for more details on these types of attacks. Denial of service (DoS). In a denial of service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services on your web servers, potentially requiring extended downtime for your web server and web applications. The DoS attack on Sony by Anonymous led to Sony s websites being unavailable for weeks or months, depending on the region, which led to loss of revenue. 4 Code injection. The best known of the code injection attacks is SQL injection, but there is a whole host of these attacks: LDAP injections, OS command injections, XPath injections, the list goes on. OWASP has Injection as the number one vulnerability on their OWASP Top 10 for 2010 and states 4 Protecting Web Servers

5 Injection flaws occur when an application sends untrusted data to an interpreter. Injection flaws are very prevalent, particularly in legacy code, often found in SQL queries, LDAP queries, XPath queries, OS commands, program arguments, etc. 5 Each of these code injection attacks can have a book written about it; we will just look at two: SQL injection and OS Command Injection. A SQL injection attack tries to exploit the interaction between the web server and the backend database. Many websites use databases to store information. SQL commands are passed from the front-end web application being served up by the web server to the backend database. For example, a client may want to buy something from your company via your web server and may fill out a form requesting the widget. There will be a place for amount, total price, name of client, and more. At the end, the user will click on a submit button to complete the transaction, which will execute a SQL statement against the database. A SQL injection attack tries to exploit flaws in the web application to execute SQL statements and commands on the backend database for malicious reasons, such as to reveal personal data or inject code that can be run on another person s computer when they access the database. Like the interaction between web applications and databases, operating systems and web server software can be intertwined. Developers will write code to call operating system functions, such as listing out the directory structure on a system or the contents of a directory or the contents of a file. If the attacker can cat a file, then what would stop them from running the command cat /etc/passwd to list out the users on the system? Again, visit the OWASP web site to learn more: Main_Page. The above attacks will affect each of your servers differently, depending on your infrastructure, functionality, agent targets, and configuration and maintenance of your web servers. If your servers are not configured properly and well maintained, and your infrastructure is made up of older operating systems, a successful HTTP fingerprint attack could reveal that your web server is an unpatched IIS 5.0 system and target a well-known buffer overflow vulnerability in the indexing services (the CodeRed worm exploited this vulnerability). Unauthorized access and code injections also play upon misconfigurations in operating system and web server software, as well as the web application. However, these attacks may be irrelevant if your web servers do not have a backend database and you are serving up static pages of publicly available information. The only concern you may have will be OS command injection attacks that could lead to the web server being used for malicious purposes such as attacking another server or servers. This range of risks shows how important it is to understand each of your web servers relative to infrastructure, function, threat agent, and configuration and maintenance. Protecting Web Servers 5

6 Solution Description You must know what you have before you can protect it. Your web security solution should help you assess and implement the appropriate protection for each of your web servers. The management of the solution should bring together all the disparate data of your web servers into a central console for ease of analysis and the subsequent securing of these assets. Infrastructure. The infrastructure should be mapped out initially via a scan of all web servers. Scans can encompass the operating system, web server software, and web application or be targeted to a specific part of the web server infrastructure. During the scan, data should be collected centrally to allow an assessment of the current risk of the infrastructure. Detailed security decisions can then be made based on data such as existing versions of operating systems, web server software, and web applications, along with configuration information. For instance, on newer web servers you might deploy proactive protection against common web attacks, such as directory traversal, code injections, and denial-of-service (DoS) attacks. Unsupported older web servers might need to be locked down, so that unknown code cannot be executed on deprecated operating systems. However, known good code will be allowed to run. This process restriction can protect the web servers even though they cannot be patched. Functionality. A deeper, more targeted scan of the web servers can determine the functionality of each web server. This scan will go beyond the operating system and its configuration to target just the web applications and backend databases, if present. Web applications can then be grouped like assets according to each web server s functionality. The criticality of each web server can be added to the description of the asset in a central administrative console, making it easier for administrators to know if a business-critical web server is in need of attention. Deploy specific protections and levels of protection according to the specific functionality of each web server. For example, if not already protected by application firewalls, web servers hosting critical business applications can deploy local security against common web attacks such as directory traversal, code injections, and denial-of-service (DoS) attacks. This security can be added in the form of host intrusion prevention on the server itself. Use predefined shielding policies and rules to prevent attacks and loss of data. If the functionality of the web server includes interaction with a backend database, implement protection to examine database queries to prevent attacks (such as SQL injection) and then deploy policies and rules to ensure normal behavior and prevent tampering of data. Implement flexible antivirus built specifically for high performance, so it can keep up with web traffic. If end users can upload files to a web server, a database, or just a share directory, these uploads should be scanned for malware to protect the server from infected files or intentionally uploaded viruses. Threat agent. Use a vulnerability scan to test how a threat agent might exploit the web assets of a company. The assessment will not reveal the intent of the threat agent, but it will determine if the web server is vulnerable to exploitation. Intentional threat agents using code injection or denial of service attacks can be mitigated by deploying host intrusion prevention with proactive protection against these common web attacks. Unintentional threat agents, such as employees installing untested patches, can be alleviated by blocking changes outside the change process and any unwanted changes. 6 Protecting Web Servers

7 Configuration and maintenance. Each newly built web server should be scanned and checked for misconfiguration. A gold master template can be used to determine adherence to industry standards or your company s required hardening processes. After the web server has rolled out to production, a continuous scheduled scan should be used to assess the web servers. These automated maintenance scans test for misconfigurations, missing patches, vulnerabilities, and anything that could lead to exploitation of the web server or the hosted web application. Implement a change process based on a trust model. By only allowing trusted agents to make changes to your web servers, you gain control. Since changes can only occur within the change framework, you can prevent unapproved or unknown changes from introducing vulnerabilities or causing the image to drift from the approved, tested, compliant version. Whether the change is approved and allowed or unapproved and blocked, these actions should be tracked and administrators alerted, minimizing the chance of an error escalating to serious downtime. Technologies Used in the McAfee Solution The McAfee solutions are flexible to fit your web server security needs. The solution you choose for one web server may not be appropriate for another. Therefore, McAfee suggests the following solutions be considered individually or together: McAfee Vulnerability Manager with the Web Application Assessment Module (WAAM), McAfee Host Intrusion Prevention, McAfee Application Control, McAfee Change Control, and McAfee VirusScan Enterprise. These solutions are managed with McAfee epolicy Orchestrator (McAfee epo ). Internet Firewall McAfee Network Security Platform Enterprise Network McAfee Vulnerability Manager (MVM) McAfee epo Web Server McAfee Application Control McAfee Change Control McAfee Host IPS McAfee VirusScan Web Application Assessment Module McAfee products help reduce the attack surface of your web server with protections designed explicitly for web server risks. Protecting Web Servers 7

8 McAfee Vulnerability Manager and the Web Application Assessment Module (WAAM) McAfee Vulnerability Manager works with the McAfee Web Application Assessment Module (WAAM) to help organizations discover vulnerabilities in the underlying operating system, as well as the web server software and web applications, before the hacker does. McAfee Vulnerability Manager (MVM) will test the web server s operating system (Linux, UNIX, or Windows) against multiple checks and return results that administrators can use to fix or mitigate vulnerabilities. The Web Application Assessment Module (WAAM) will probe and test the web server software, such as IIS or Apache, as well as any web application for vulnerabilities, such as code executions or injections, and warn of any unpatched or vulnerable web servers. The Web Application scanner can take advantage of pre-built templates to perform a deep scan based on the required checks for PCI, the OWASP Top 10, or CWE/SANS Top 25, or home in on specific checks such as Cross Site Scripting or path traversals. Both MVM and WAAM will help IT security administrators proactively monitor web servers to discover vulnerabilities or unpatched systems. The Web Application Assessment Module is a completely integrated (user interface, reporting, engine, ticketing) module of McAfee Vulnerability Manager. MVM pulls the data together to give you actionable data so that risk can be calculated and mitigated. McAfee Host Intrusion Prevention McAfee Host Intrusion Prevention (IPS) is a host-based intrusion detection and prevention system that protects system resources and applications from external and internal attacks. It provides a manageable and scalable intrusion prevention solution for web servers. Its patented technology blocks zero-day and known attacks with robust buffer overflow protection. McAfee Host IPS uses signatures to protect specific applications and operating systems, for example, web servers such as Apache and IIS. The majority of signatures protect the entire operating system, while some protect specific applications. Signatures are also a collection of intrusion prevention rules that can be matched against a traffic stream. For example, a signature might look for a specific string in an HTTP request. If the string matches one in a known attack, Host IPS takes action. These rules provide protection against known attacks. Host IPS can also help protect against code injection attacks such as SQL injections. The Host IPS SQL engine intercepts incoming database queries before they are processed by the base engine. Each query is examined to see if it matches any known attack signatures, if it is well formed, and if there are telltale signs of SQL injection. Furthermore, SQL database signatures implement database shielding to protect the database s data files, services, and resources. In addition, database enveloping can be implemented to ensure that the database operates within its well-defined behavioral profile. McAfee Application Control Even the most security conscious enterprises have a hard time patching web servers. This may not be due to a flawed patching process, but to one or all three of the following: legacy unsupported systems, refusal by the business to allow the server downtime, or a vendor that has not approved the patches or service pack to run with their software. McAfee Application Control can alleviate these issues. McAfee Application Control protects the web server through dynamic whitelisting that only allows trusted applications to run on the web servers, along with memory and buffer overflow protection. For continuous control of the web server, McAfee Application Control also has change event transparency, which bridges protection with operational change policies. McAfee Application Control can be installed on legacy systems that are no longer supported, such as Windows NT 4.0. It has a light touch on system resources, which is important for legacy systems that lack extra capacity. Organizations that have implemented McAfee Application Control have been able to cut down on the number of times they patch, reducing downtime. 8 Protecting Web Servers

9 McAfee Change Control As we have discussed, change can be the downfall of a web server. Configuration and ongoing maintenance are critical processes. McAfee Change Control can be the basis for your change control process or be added to your company s existing process for better control of web servers. McAfee Change Control, like McAfee Application Control, tracks and validates attempted changes in real time on the web server. The two products can be used together to protect both the application and the data it depends on. Where Application Control is monitoring binaries, Change Control can target individual files or directories. Both McAfee Application Control and McAfee Change Control work on a trust model. If changes are attempted outside the approved channels of change (or Trust), the changes are not permitted. Yet if a trusted agent makes the change, it is allowed. Every change is tracked for further review. McAfee Change Control offers three distinct features: File Integrity Monitoring (FIM) Change Prevention Reconciliation (as an optional add-on) File Integrity Monitoring gives you details on who made which changes to which files, when, and how the changes were made. You get comprehensive visibility into attempts to modify critical files and registry keys. Change Prevention can write protect your critical files and registry keys from unauthorized tampering, such that changes are permitted only if the change is applied in accordance with the update policies. Finally, Reconciliation maps changes to their corresponding tickets in a Change Management System (CMS), providing an evidence trail for changes made in support of a Request for Change (RFC). 1. Authorized User Update 2. Authorized Administrators Enterprise Console 3. Authorized Third-Party Agents, e.g., Tivoli, SMS Secure Signal Updates McAfee Application Control and McAfee Change Control allow updates through a Trust Model Protecting Web Servers 9

10 McAfee VirusScan Some may think that running a virus scanner on a web server is not a good idea because of the potential performance impact, but the risks we have discussed make it smart to integrate the protection of McAfee VirusScan where possible. Most clients leverage VirusScan on web servers where users are uploading files to a directory. VirusScan can be integrated into the process so that files are scanned and either cleaned or denied from being written to the directory. There are two choices for VirusScan: Enterprise or Command Line scanner. VirusScan Enterprise and VirusScan Command Line scanner offer fast performance and protection of your web servers from: Viruses, worms, and Trojans Buffer overflows Potentially unwanted code and programs McAfee epolicy Orchestrator (McAfee epo ) McAfee epolicy Orchestrator is the single management console that collects and presents the data needed to understand the web servers security posture. It also controls the solutions needed to help mitigate the web servers risks. The following tasks can be performed within McAfee epo: View MVM and WAAM scans Analyze each web servers level of risk via data from MVM and WAAM as well as information on what security is on the web servers Deploy and manage McAfee VirusScan, McAfee Change Control, McAfee Host IPS, and McAfee Application Control on web servers Set up and automate scans, deployment, policies, and tasks McAfee epo is not only a central console to see all your web server assets within one pane of glass, but it has the ability to help you secure them more efficiently as well. 10 Protecting Web Servers

11 Impact of the Solution McAfee solutions will help you understand your web server infrastructure and protect each web server against the vulnerabilities, attacks, and threat agents that could disrupt it. McAfee Vulnerability Manger and the Web Application Assessment Module can test and identify whether or not your web servers are vulnerable to any or all of these attacks: HTTP Fingerprinting, Unauthorized Access, Denial of Service, and Code Injection. McAfee Host IPS can protect against most of these attacks via its signatures, such as IIS Site Server AdSamples Info Leak (HTTP Fingerprinting), Apache Shielding Configuration File Access (Unauthorized Access), IIS WebDAV Search Request DoS (Denial of Service), and MSSQL SQL Injection with DELAY (code injection). Where Host IPS may not be appropriate, such as on older web servers, McAfee Application Control and McAfee Change Control can be deployed. These systems can work together through a centralized management console for automated, efficient maintenance and visibility into changes and issues letting you take action before the damage is done. Protecting Web Servers 11

12 Additional Resources For more information about the Security Connected Reference Architecture, visit: About the Author Douglas Simpson has over 11 years in the IT industry. His experience includes designing, building, and managing networks with dedication to IT security, risk, and compliance. Doug is a graduate of Wittenberg University with a B.A. and holds current certifications in Information Systems Security Professional (CISSP), Ethical Hacker (CeH), IT Service Management (ITIL), and MCSE The information in this document is provided only for educational purposes and for the convenience of McAfee customers. The information contained herein is subject to change without notice, and is provided AS IS without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance Mission College Boulevard Santa Clara, CA McAfee, McAfee Application Control, McAfee Change Control, McAfee epolicy Orchestrator, McAfee epo, McAfee Host Intrusion Prevention, McAfee VirusScan Enterprise, VirusScan, McAfee Vulnerability Manager, and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications, and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2011 McAfee, Inc bp_protecting-web-servers-L3_1011

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption Technology Blueprint Protect Your VoIP/SIP Servers Insulating your voice network and its servers from attacks and disruption LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes Technology Blueprint Protect Your Application Servers Preserve uptime by blocking attacks and unauthorized changes LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices McAfee* application whitelisting combined with Intel vpro technology can improve security, increase

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

Secure Virtualization in the Federal Government

Secure Virtualization in the Federal Government White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in

More information

Securing OS Legacy Systems Alexander Rau

Securing OS Legacy Systems Alexander Rau Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Xerox Next Generation Security: Partnering with McAfee White Paper

Xerox Next Generation Security: Partnering with McAfee White Paper Xerox Next Generation Security: Partnering with McAfee White Paper 1 Background Today s MFPs are complex embedded systems. They contain, among other things, full scale operating systems, embedded web servers,

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

IBM Managed Security Services Vulnerability Scanning:

IBM Managed Security Services Vulnerability Scanning: IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com

More information

Technology Blueprint. Secure Your Point-of-Sale. Lock down point of sale/service (POS) systems

Technology Blueprint. Secure Your Point-of-Sale. Lock down point of sale/service (POS) systems Technology Blueprint Secure Your Point-of-Sale (POS) Systems Lock down point of sale/service (POS) systems LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected The

More information

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

NSFOCUS Web Application Firewall White Paper

NSFOCUS Web Application Firewall White Paper White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect

More information

Codes of Connection for Devices Connected to Newcastle University ICT Network

Codes of Connection for Devices Connected to Newcastle University ICT Network Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes

More information

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp. and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair dave.wichers@owasp.org COO, Aspect Security dave.wichers@aspectsecurity.com Copyright 2007 - The Foundation This work is available

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

McAfee Database Activity Monitoring 5.0.0

McAfee Database Activity Monitoring 5.0.0 Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

Internal Penetration Test

Internal Penetration Test Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Integrated Protection for Systems. João Batista Joao_batista@mcafee.com Territory Manager

Integrated Protection for Systems. João Batista Joao_batista@mcafee.com Territory Manager Integrated Protection for Systems João Batista Joao_batista@mcafee.com Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300

More information

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices WHITE PAPER Best Practices for Securing Remote and Mobile Devices Table of Contents Executive Summary 3 The Rise of Mobile and Remote Computing 3 Risks from Remote Computing 3 Risks for Mobile Workers

More information

THE HACKERS NEXT TARGET

THE HACKERS NEXT TARGET Governance and Risk Management THE HACKERS NEXT TARGET YOUR WEB AND SOFTWARE Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software ISC2 CyberSecurity Conference 09 Kuala

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

White Paper. PCI Guidance: Microsoft Windows Logging

White Paper. PCI Guidance: Microsoft Windows Logging PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation

More information

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week

More information

Technology Blueprint. Protect the Network Perimeter. Controlling what gets through into and out of your organization

Technology Blueprint. Protect the Network Perimeter. Controlling what gets through into and out of your organization Technology Blueprint Protect the Network Perimeter Controlling what gets through into and out of your organization LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security Connected

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Table of Contents. Page 2/13

Table of Contents. Page 2/13 Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

Endpoint Security for DeltaV Systems

Endpoint Security for DeltaV Systems DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Secure Web Applications. The front line defense

Secure Web Applications. The front line defense Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Breaking down silos of protection: An integrated approach to managing application security

Breaking down silos of protection: An integrated approach to managing application security IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

Web Engineering Web Application Security Issues

Web Engineering Web Application Security Issues Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend

More information

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current

More information

24/7 Visibility into Advanced Malware on Networks and Endpoints

24/7 Visibility into Advanced Malware on Networks and Endpoints WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction

More information

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

McAfee Solidcore 5.1.0 Product Guide

McAfee Solidcore 5.1.0 Product Guide McAfee Solidcore 5.1.0 Product Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

The Web AppSec How-to: The Defenders Toolbox

The Web AppSec How-to: The Defenders Toolbox The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware

More information

Network Intrusion Prevention Systems Justification and ROI

Network Intrusion Prevention Systems Justification and ROI White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand

More information

Your Web and Applications

Your Web and Applications Governance and Risk Management Your Web and Applications The Hacker s New Target Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software Social Engineering in the Business

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability

More information

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware

More information

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Web Application Security 101

Web Application Security 101 dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

McAfee VirusScan and epolicy Orchestrator Administration Course

McAfee VirusScan and epolicy Orchestrator Administration Course McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from

More information

McAfee Database Security. Dan Sarel, VP Database Security Products

McAfee Database Security. Dan Sarel, VP Database Security Products McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing

More information

GOOD PRACTICE GUIDE 13 (GPG13)

GOOD PRACTICE GUIDE 13 (GPG13) GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording

More information