WEB APPLICATION FIREWALL PRODUCT ANALYSIS
|
|
|
- August Chase
- 10 years ago
- Views:
Transcription
1 WEB APPLICATION FIREWALL PRODUCT ANALYSIS F5 Big-IP ASM v Authors Ryan Liles, Orlando Barrera
2 Overview NSS Labs performed an independent test of the F5 Big-IP ASM The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Web Application Firewall Methodology v6.2 available at This test was conducted free of charge, and NSS did not receive any compensation in return for F5 s participation. While the companion Comparative Analysis Reports (CARs) on security, performance, and total cost of ownership (TCO) will provide comparative information about all tested products, this individual Product Analysis Report (PAR) provides detailed information not available elsewhere. NSS testing has found that the majority of web application firewalls (WAFs) operate in an adaptive learning mode ( learning mode ). In this mode, a WAF learns the behavior of applications and automatically generates policy recommendations. These recommendations require review and approval before the WAF device is deployed. Periodic manual tuning may also be required. As part of the initial WAF test setup, devices are tuned as deemed necessary by the vendor. Every effort is made to deploy policies that ensure the optimal combination of security effectiveness and performance, as would be the aim of a typical customer deploying the device in a live network environment. This provides readers with the most useful information on key WAF security effectiveness and performance capabilities based upon their expected usage. Product Block Rate 1 NSS-Tested Capacity F5 Big-IP ASM V % 36,130 CPS Evasions False Positives Stability & Reliability 0.124% Figure 1 Overall Test Results Using a tuned policy, the Big-IP ASM blocked 99.21% of WAF attacks. The device proved effective against all evasion techniques tested. The device also passed all stability and reliability tests. The Big-IP ASM presented a 0.124% false positive rate The F5 Big-IP ASM is rated by NSS at 36,130 connections per second (CPS), which is in line with the vendorclaimed performance. This is a minimum rating using one transaction per connection. F5 rates this device at 35,000 CPS. NSS-tested capacity is an average of all of the HTTP response-based capacity tests. These performance numbers represent a baseline which you can use to model your environment. 1 Block rate is defined as the number of attacks blocked under test. 2
3 Table of Contents Overview... 2 Security Effectiveness... 5 Attack Types... 5 Attack types:... 5 Resistance to Evasion Techniques... 6 False Positive Testing... 7 Performance... 8 Connection Dynamics Concurrency and Connection Rates... 8 HTTP Connections Per Second and Capacity... 9 HTTP Connections Per Second and Capacity (With Delays) Stability and Reliability Management and Configuration Total Cost of Ownership (TCO) Installation (Hours) Purchase Price and Total Cost of Ownership Value: Total Cost of Ownership Per Protected-CPS Detailed Product Scorecard Test Methodology Contact Information
4 Table of Figures Figure 1 Overall Test Results... 2 Figure 2 Attack Types... 5 Figure 3 Resistance to Evasion Results... 6 Figure 4 False Positives... 7 Figure 5 Concurrency and Connection Rates... 8 Figure 6 HTTP Connections per Second and Capacity... 9 Figure 7 HTTP Connections per Second and Capacity (With Delays) Figure 8 Stability and Reliability Results Figure 9 Sensor Installation Time in Hours Figure 10 3-Year TCO Figure 11 Total Cost of Ownership per Protected-CPS Figure 12 Detailed Scorecard
5 Security Effectiveness This section verifies that the device under test (DUT) is capable of enforcing the tuned security policy effectively. Attack Types In order to represent accurately the protection that is likely to be achieved by a typical enterprise, NSS evaluates the DUT using the vendor s optimally tuned policy. The NSS threat and attack suite contains thousands of publically available exploits (including multiple variants of each exploit) and a number of complex web applications that have been constructed to include known vulnerabilities and coding errors. Groups of exploits are carefully selected from this library to test based on the intended attack type as listed below. Each exploit has been validated to impact the target vulnerable host(s) by compromising either the underlying OS, the web server, or the web application itself. Attack types: URL Parameter Manipulation altering URL data to gain potentially protected information or access protected areas of a website. Form/Hidden Field Manipulation constructing POST requests to access protected information or protected areas of a website, or to manipulate fixed data directly (such as pricing information). Cookie/Session Poisoning manipulation of cookie or session variables to access protected information or protected areas of a website. Cross-Site Scripting (XSS) the process of manipulating user input in such a way that, when rendered in the context of a webpage, it will be interpreted by the browser as code. Directory traversal altering the URL to access areas of the web server that should not otherwise be accessible. SQL Injection manipulating user input in such a way that, when processed by the database server, it will be interpreted as code, potentially providing direct access to private data. Padding Oracle attacks altering a block-cypher cryptographic hash in such a way as to decrypt encrypted information. Test Procedure Results URL Parameter Manipulation 100% Form/Hidden Field Manipulation 100% Cookie/Session Poisoning 100% Cross-Site Scripting (XSS) 99.25% Directory Traversal 100% SQL Injection 100% Padding Oracle Attacks 100% Figure 2 Attack Types 5
6 Resistance to Evasion Techniques Evasion techniques disguise and modify attacks at the point of delivery in order to avoid detection and blocking by security products. Missing a particular type of evasion means an attacker can use an entire class of exploits for which a device is supposed to have protection, rendering it virtually useless. Many of the techniques used in this test have been widely known for years and should be considered minimum requirements for the WAF product category. Providing exploit protection results without fully factoring in evasion can be misleading since the more different types of evasion that are missed packet fragmentation reassembly, stream segmentation, URL obfuscation and normalization the worse the situation. For example, it is better to miss all techniques in one evasion category (say, stream segmentation) than one technique in each category. Figure 3 provides the results of the evasion tests for F5 Big-IP ASM Test Procedure Packet Fragmentation Reassembly Stream Segmentation URL Obfuscation and Normalization Results Figure 3 Resistance to Evasion Results The device proved effective against all evasion techniques tested. This resulted in an overall result for F5 Big- IP ASM
7 False Positive Testing The ability of the DUT to identify and allow legitimate traffic while maintaining protection against attacks and exploits is of equal importance to providing protection against malicious content. This test includes a varied sample of legitimate application traffic, which should properly be identified and allowed. Figure 4 shows the percentage of non-malicious traffic mistakenly identified as malicious (lower score is better). F5 Big-IP ASM had a false positive rate of 0.124%. Figure 4 False Positives 7
8 Performance There is frequently a trade-off between security effectiveness and performance. Because of this trade-off, it is important to judge a product s security effectiveness within the context of its performance (and vice versa). This ensures that new security protections do not adversely impact performance and security shortcuts are not taken to maintain or improve performance. Connection Dynamics Concurrency and Connection Rates The use of sophisticated test equipment appliances allows NSS engineers to create true real-world traffic at multi-gigabit speeds as a background load for the tests. The aim of these tests is to stress the inspection engine and determine how it handles high volumes of application layer transactions per second, and concurrent open connections. All packets contain valid payload and address data, and these tests provide an excellent representation of a live network at various connection/transaction rates. Note that in all tests the following critical breaking points where the final measurements are taken are used: Excessive response time for HTTP transactions Latency within the DUT is causing excessive delays and increased response time to the client. Unsuccessful HTTP transactions Normally, there should be zero unsuccessful transactions. Once these appear, it is an indication that excessive latency within the DUT is causing connections to time out. Figure 5 Concurrency and Connection Rates 8
9 HTTP Connections Per Second and Capacity The aim of these tests is to stress the HTTP detection engine and determine how the DUT copes with network loads of varying average packet size and varying connections per second. By creating genuine session-based traffic with varying session lengths, the DUT is forced to track valid TCP sessions, thus ensuring a higher workload than for simple packet-based background traffic. This provides a test environment that is as close to real world as it is possible to achieve in a lab environment, while ensuring absolute accuracy and repeatability. Each transaction consists of a single HTTP GET request, and there are no transaction delays (i.e., the web server responds immediately to all requests). All packets contain valid payload (a mix of binary and ASCII objects) and address data, and this test provides a good benchmark representation of a live network (albeit one biased towards HTTP traffic) at various network loads. In real life scenarios, browsers may use one connection to send multiple HTTP requests resulting in enhanced throughput for the systems. Figure 6 HTTP Connections per Second and Capacity 9
10 HTTP Connections Per Second and Capacity (With Delays) Typical user behavior introduces delays between requests and responses, e.g., think time, as users read web pages and decide which links to click next. This next set of tests is identical to the previous set except that these include a 5-second delay in the server response for each transaction. This has the effect of maintaining a high number of open connections throughout the test, thus forcing the DUT to utilize additional resources to track those connections. Figure 7 HTTP Connections per Second and Capacity (With Delays) The F5 Big-IP ASM demonstrated an unusual drop in throughput when a 5000ms delay was introduced to the test traffic. 10
11 Stability and Reliability Long-term stability is particularly important for an in-line device, where failure can produce network outages. These tests verify the stability of the DUT along with its ability to maintain security effectiveness while under normal load and while passing malicious traffic. Products that are not able to sustain legitimate traffic (or that crash) while under hostile attack will not pass. The Big-IP ASM is required to remain operational and stable throughout these tests, and to block 100% of previously blocked traffic, raising an alert for each. If any non-allowed traffic passes successfully, caused by either the volume of traffic or the DUT failing open for any reason, this will result in a FAIL. Test Procedure Blocking Under Extended Attack Passing Legitimate Traffic Under Extended Attack Result Protocol Fuzzing & Mutation Protocol Fuzzing & Mutation Detection Ports Protocol Fuzzing & Mutation Management Port Power Fail Redundancy Persistence of Data YES Figure 8 Stability and Reliability Results These tests also determine the behavior of the state engine under load. All WAF devices must choose whether to risk denying legitimate traffic or allowing malicious traffic once they run low on resources. Dropping new connections when resources (such as state table memory) are low, or when traffic loads exceed the device capacity will theoretically block legitimate traffic but maintain state on existing connections (preventing attack leakage). 11
12 Management and Configuration Security devices are complicated to deploy; essential systems such as centralized management console options, log aggregation, and event correlation/management systems further complicate the purchasing decision. Understanding key comparison points will allow customers to model the overall impact on network service level agreements (SLAs); estimate operational resource requirements to maintain and manage the systems; and better evaluate the required skill/competencies of staff. Enterprises should include management and configuration during their evaluation, focusing on the following at a minimum: General Management and Configuration How easy is it to install, configure, and deploy multiple devices throughout a large enterprise network? Policy Handling How easy is it to create, edit, and deploy complicated security policies across an enterprise? Alert Handling How accurate and timely is the alerting, and how easy is it to drill down to locate critical information needed to remediate a security problem? Reporting How effective is the reporting capability, and how readily can it be customized? 12
13 Total Cost of Ownership (TCO) Implementation of security solutions can be complex, with several factors affecting the overall cost of deployment, maintenance, and upkeep. All of these should be considered over the course of the useful life of the solution. Product Purchase The cost of acquisition Product Maintenance The fees paid to the vendor (including software and hardware support, maintenance, and other updates) Installation The time required to take the device out of the box, configure it, put it into the network, apply updates and patches, and set up desired logging and reporting Upkeep The time required to apply periodic updates and patches from vendors, including hardware, software, and other updates Management Day-to-day management tasks including device configuration, policy updates, policy deployment, alert handling, and so on For the purposes of this report, capital expenditure (capex) items are included for a single device only (the cost of acquisition and installation). Installation (Hours) Figure 9 provides the number of hours of labor required to install each device using local device management options only. This will reflect accurately the amount of time taken for NSS engineers, with the help of vendor engineers, to install and configure the DUT to the point where it operates successfully in the test harness, passes legitimate traffic, and blocks/detects prohibited/malicious traffic. This closely mimics a typical enterprise deployment scenario for a single device. Costs are based upon the time that would be required by an experienced security engineer to perform the abovementioned tasks (assumed US $75 per hour for the purposes of these calculations), allowing NSS to hold constant the talent cost and measure only the difference in time required for installation. Readers should substitute their own costs to obtain accurate TCO figures. Product F5 Big-IP ASM V Installation (Hours) 8 Figure 9 Sensor Installation Time in Hours 13
14 Purchase Price and Total Cost of Ownership Calculations are based on vendor-provided pricing information. Where possible, the 24/7 maintenance and support option with 24-hour replacement is utilized, since this is the option typically selected by enterprise customers. Prices reflect single device management and maintenance only; costs for central management solutions (CMS) may be extra. For additional TCO analysis, refer to the TCO CAR. Product F5 Big-IP ASM V Purchase Maintenance/ Year Year 1 Cost Year 2 Cost Year 3 Cost 3-Year TCO $84,995 $10,709 $96,304 $10,709 $10,709 $117,722 Figure 10 3-Year TCO Year 1 Cost is calculated by adding installation costs ($75 USD per hour fully loaded labor x installation time) + purchase price + first-year maintenance/support fees. Year 2 Cost consists only of maintenance/support fees. Year 3 Cost consists only of maintenance/support fees. This provides a TCO figure consisting of hardware, installation, and maintenance costs for a single device only: costs for CMS may be extra. For additional TCO analysis, refer to the TCO CAR. Value: Total Cost of Ownership Per Protected-CPS There is a clear difference between price and value. The least expensive product does not necessarily offer the greatest value if it offers significantly lower performance than only slightly more expensive competitors. The best value is a product with a low TCO and high level of secure capacity (Block Rate x NSS-Tested Capacity). Figure 11 depicts the relative cost per unit of work performed, described as TCO per Protected-CPS. Product F5 Big-IP ASM V Block Rate NSS-Tested Capacity 3-Year TCO TCO per Protected-CPS 99.89% 36,130 CPS $117,722 $3 Figure 11 Total Cost of Ownership per Protected-CPS TCO per Protected-CPS was calculated by taking the 3-Year TCO and dividing it by the product of Block Rate x NSS- Tested Capacity. Therefore, 3-Year TCO / (Block Rate x NSS-Tested Capacity) = TCO per Protected-CPS. 14
15 Detailed Product Scorecard The following chart depicts the status of each test with quantitative results where applicable. Description Result Security Effectiveness Attack Types 99.89% URL Parameter Manipulation 100% Form/Hidden Field Manipulation 100% Cookie/Session Poisoning 100% Cross-Site Scripting (XSS) 99.25% Directory Traversal 100% SQL Injection 100% Padding Oracle attacks 100% Evasions and Attack Leakage Resistance to Evasion 100% Packet Fragmentation Reassembly 100% Ordered 8 byte fragments 100% Ordered 16 byte fragments 100% Ordered 24 byte fragments 100% Ordered 32 byte fragments 100% Out of order 8 byte fragments 100% Ordered 8 byte fragments, duplicate last packet 100% Out of order 8 byte fragments, duplicate last packet 100% Ordered 8 byte fragments, reorder fragments in reverse 100% Ordered 16 byte fragments, fragment overlap (favor new) 100% Ordered 16 byte fragments, fragment overlap (favor old) 100% Out of order 8 byte fragments, interleaved duplicate packets scheduled for later delivery 100% Ordered 8 byte fragments, duplicate packet with an incrementing DWORD in the options field. The duplicate packet has random payload. 100% Ordered 16 byte fragments, duplicate packet with an incrementing DWORD in the options field. The duplicate packet has random payload. 100% Ordered 24 byte fragments, duplicate packet with an incrementing DWORD in the options field. The duplicate packet has random payload. 100% Ordered 32 byte fragments, duplicate packet with an incrementing DWORD in the options field. The duplicate packet has random payload. 100% 15
16 Stream Segmentation 100% Ordered 1 byte segments, interleaved duplicate segments with null TCP control flags 100% Ordered 1 byte segments, interleaved duplicate segments with null TCP control flags 100% Ordered 1 byte segments, interleaved duplicate segments with requests to resync sequence numbers midstream 100% Ordered 1 byte segments, duplicate last packet 100% Ordered 2 byte segments, segment overlap (favor new) 100% Ordered 1 byte segments, interleaved duplicate segments with out-of-window sequence numbers 100% Out of order 1 byte segments 100% Out of order 1 byte segments, interleaved duplicate segments with faked retransmits 100% Ordered 1 byte segments, segment overlap (favor new) 100% Out of order 1 byte segments, PAWS elimination (interleaved duplicate segments with older TCP timestamp options) 100% Ordered 16 byte segments, segment overlap (favor new (Unix)) 100% Ordered 32 byte segments 100% Ordered 64 byte segments 100% Ordered 128 byte segments 100% Ordered 256 byte segments 100% Ordered 512 byte segments 100% Ordered 1024 byte segments 100% Ordered 2048 byte segments (sending MSRPC request with exploit) 100% Reverse Ordered 256 byte segments, segment overlap (favor new) with random data 100% Reverse Ordered 512 byte segments, segment overlap (favor new) with random data 100% Reverse Ordered 1024 byte segments, segment overlap (favor new) with random data 100% Reverse Ordered 2048 byte segments, segment overlap (favor new) with random data 100% Out of order 1024 byte segments, segment overlap (favor new) with random data, Initial TCP sequence number is set to 0xffffffff % Out of order 2048 byte segments, segment overlap (favor new) with random data, Initial TCP sequence number is set to 0xffffffff % URL Obfuscation And Normalization 100% URL encoding - Level 1 (minimal) 100% URL encoding - Level 2 100% URL encoding - Level 3 100% URL encoding - Level 4 100% URL encoding - Level 5 100% URL encoding - Level 6 100% URL encoding - Level 7 100% URL encoding - Level 8 (extreme) 100% Directory Insertion 100% Premature URL ending 100% TAB separation 100% Windows\delimiter 100% Base-64 Encoding 100% Base-64 Encoding (shifting 1 bit) 100% Base-64 Encoding (shifting 2 bits) 100% Base-64 Encoding (chaffing) 100% 16
17 False Positives 0.124% Performance Maximum Capacity Maximum HTTP Connections per Second 75,000 Maximum HTTP Transactions per Second 191,000 HTTP Capacity with no Transaction Delays 2,500 Connections per Second 44 Kbyte Response 12,500 5,000 Connections per Second 21 Kbyte Response 21,000 10,000 Connections per Second 10 Kbyte Response 37,300 20,000 Connections per Second 4.5 Kbyte Response 48,950 40,000 Connections per Second 1.7 Kbyte Response 60,900 HTTP CPS & Capacity With Transaction Delays 21 Kbyte Response with Delay 6, Kbyte Response with Delay 10,400 Stability & Reliability Blocking Under Extended Attack Passing Legitimate Traffic Under Extended Attack Protocol Fuzzing & Mutation Protocol Fuzzing & Mutation Detection Ports Protocol Fuzzing & Mutation Management Port Power Fail Redundancy YES Persistence of Data Total Cost of Ownership Ease of Use Initial Setup (Hours) 8 Time Required for Upkeep (Hours per Year) Contact NSS Expected Costs Initial Purchase (hardware as tested) $84,995 Initial Purchase (enterprise management system) Contact NSS Annual Cost of Maintenance & Support (hardware/software) $10,709 Annual Cost of Maintenance & Support (enterprise management system) Contact NSS Installation Labor Cost (@ US$75/hr) $ Management Labor Cost (per US$75/hr) Contact NSS Total Cost of Ownership (TCO) Year 1 $96,304 Year 2 $10,709 Year 3 $10,709 3-Year TCO $117,722 Figure 12 Detailed Scorecard 17
18 Test Methodology Web Application Firewall (WAF): v6.2 A copy of the test methodology is available on the NSS Labs website at Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX [email protected] This and other related documents available at: To receive a licensed copy or report misuse, please contact NSS Labs NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, copied/scanned, stored on a retrieval system, ed or otherwise disseminated or transmitted without the express written consent of NSS Labs, Inc. ( us or we ). Please read the disclaimer in this box because it contains important information that binds you. If you do not agree to these conditions, you should not read the rest of this report but should instead return the report immediately to us. You or your means the person who accesses this report and any entity on whose behalf he/she has obtained this report. 1. The information in this report is subject to change by us without notice, and we disclaim any obligation to update it. 2. The information in this report is believed by us to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at your sole risk. We are not liable or responsible for any damages, losses, or expenses of any nature whatsoever arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY US. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT, ARE HEREBY DISCLAIMED AND EXCLUDED BY US. IN NO EVENT SHALL WE BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and/or software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet your expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 18
TEST METHODOLOGY. Web Application Firewall. v6.2
TEST METHODOLOGY Web Application Firewall v6.2 Table of Contents 1 Introduction... 4 1.1 The Need for Web Application Firewalls... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion Criteria...
NEXT GENERATION FIREWALL TEST REPORT
NEXT GENERATION FIREWALL TEST REPORT Check Point Software Technologies, Ltd. 13800 Next Generation Firewall Appliance vr77.20 Author Timothy Otto Overview NSS Labs performed an independent test of the
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview
NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT
NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Fortinet FortiGate-1500D FortiOS v5.2.2 build 642 Author Ty Smith Overview NSS Labs performed an independent test of the Fortinet FortiGate-1500D
NETWORK INTRUSION PREVENTION SYSTEM PRODUCT ANALYSIS
NETWORK INTRUSION PREVENTION SYSTEM PRODUCT ANALYSIS McAfee Network Security Platform NS9200 v7.1.5 2013 Ryan Liles, Joseph Pearce Overview NSS Labs performed an independent test of the McAfee NS9200 v7.1.5.
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet
2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles
FIREWALL COMPARATIVE ANALYSIS Performance 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL NSA 4500,
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER
NEXT GENERATION FIREWALL PRODUCT ANALYSIS
NEXT GENERATION FIREWALL PRODUCT ANALYSIS Palo Alto Networks PA- 3020 v6.0.5- h3 Authors Christopher Conrad, Joseph Pearce Overview NSS Labs performed an independent test of the Palo Alto Networks PA-
NEXT GENERATION FIREWALL PRODUCT ANALYSIS
NEXT GENERATION FIREWALL PRODUCT ANALYSIS Cisco ASA 5585- X SSP60 v5.3.1 Authors Joseph Pearce, Christopher Conrad Overview NSS Labs performed an independent test of the Cisco ASA 5585- X SSP60 v5.3.1.
TEST METHODOLOGY. Hypervisors For x86 Virtualization. v1.0
TEST METHODOLOGY Hypervisors For x86 Virtualization v1.0 Table of Contents 1 Introduction... 4 1.1 The Need For Virtualization... 4 1.2 About This Test Methodology And Report... 4 1.3 Inclusion Criteria...
How To Test A Ddos Prevention Solution
TEST METHODOLOGY Distributed Denial- of- Service (DDoS) Prevention v1.0 Table of Contents 1 Introduction... 5 1.1 The Need for Distributed Denial- of- Service Prevention... 5 1.2 About This Test Methodology
TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0
TEST METHODOLOGY Distributed Denial-of-Service (DDoS) Prevention v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Distributed Denial-of-Service Prevention... 4 1.2 About This Test Methodology
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles
FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
TEST METHODOLOGY. Data Center Firewall. v2.0
TEST METHODOLOGY Data Center Firewall v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls in the Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion Criteria...
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER 8350 Cyberoam CR2500iNG-XP
NETWORK INTRUSION PREVENTION SYSTEM
NETWORK INTRUSION PREVENTION SYSTEM PRODUCT ANALYSIS Fortinet FortiGate 3240C METHODOLOGY VERSION: 6.2 Independent & unsponsored test report. This and other related documents available at: http://www.nsslabs.com/ips
TEST METHODOLOGY. Network Firewall Data Center. v1.0
TEST METHODOLOGY Network Firewall Data Center v1.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls In The Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion
NETWORK INTRUSION PREVENTION SYSTEM
NETWORK INTRUSION PREVENTION SYSTEM PRODUCT ANALYSIS McAfee Network Security Platform (NSP) M-8000 Version 6.1 METHODOLOGY VERSION: 6.2 Independent & unsponsored test report. This and other related documents
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
NETWORK FIREWALL TEST METHODOLOGY 3.0. To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs.
NETWORK FIREWALL TEST METHODOLOGY 3.0 To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or [email protected] 2011 NSS Labs, Inc. All rights reserved. No part of
TEST METHODOLOGY. Secure Web Gateway (SWG) v1.5.1
TEST METHODOLOGY Secure Web Gateway (SWG) v1.5.1 Table of Contents 1 Introduction... 4 1.1 The Need for Secure Web Gateways... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 1.4 Deployment...
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Why Is DDoS Prevention a Challenge?
ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
The CISO s Guide to the Importance of Testing Security Devices
ANALYST BRIEF The CISO s Guide to the Importance of Testing Security Devices Author Bob Walder Overview Selecting security products is a complex process that carries significant risks if not executed correctly;
NEXT-GENERATION FIREWALL
NEXT-GENERATION FIREWALL INDIVIDUAL PRODUCT TEST RESULTS Check Point Power-1 11065 METHODOLOGY VERSION: 4.0 FEBRUARY 2011 Independent & unsponsored test report. Reprints Licensed to: Check Point Software
Evolutions in Browser Security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
Internet Advertising: Is Your Browser Putting You at Risk?
ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was
How To Create A Firewall Security Value Map (Svm) 2013 Nss Labs, Inc.
FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) 2013 Frank Artes, Thomas Skybakmoen, Bob Walder, Vikram Phatak, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG,
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0
TEST METHODOLOGY Endpoint Protection Evasion and Exploit v4.0 Table of Contents 1 Introduction... 3 1.1 Inclusion Criteria... 3 2 Product Guidance... 5 2.1 Recommended... 5 2.2 Neutral... 5 2.3 Caution...
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Network Security Equipment The Ever Changing Curveball
Network Security Equipment The Ever Changing Curveball breakingpointsystems.com This document contains information that is the property of BreakingPoint Systems, Inc. This information may not be copied,
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
TEST METHODOLOGY. Next Generation Firewall (NGFW) v5.4
TEST METHODOLOGY Next Generation Firewall (NGFW) v5.4 Table of Contents 1 Introduction... 5 1.1 The Need For Next Generation Firewalls (NGFW)... 5 1.2 About This Test Methodology And Report... 5 1.3 Inclusion
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Microsoft SharePoint
Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
BROWSER SECURITY COMPARATIVE ANALYSIS
BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
SolarWinds. Packet Analysis Sensor Deployment Guide
SolarWinds Packet Analysis Sensor Deployment Guide Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
Installing the IPSecuritas IPSec Client
Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
What to Look for When Evaluating Next-Generation Firewalls
What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to
Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6
Imperva Technical Brief Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6 The PCI Security Standards Council s (PCI SSC) recent issuance of an Information Supplement piece
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
ELECTRONIC SIGNATURE AGREEMENT
ELECTRONIC SIGNATURE AGREEMENT 1. Agreement If you contract with us electronically or otherwise request documentation or disclosures electronically, you specifically consent and agree that we may provide
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
ZXTM (Zeus Extensible Traffic Manager) In Virtual Mode With Microsoft Virtual Server
ZXTM (Zeus Extensible Traffic Manager) In Virtual Mode With Microsoft Virtual Server A Broadband-Testing Report First published February 2007 (V1.0) Published by Broadband-Testing La Calade, 11700 Moux,
IP Application Security Manager and. VMware vcloud Air
Securing Web Applications with F5 BIG- IP Application Security Manager and VMware vcloud Air D E P L O Y M E N T G U I D E Securing Web Applications Migrating application workloads to the public cloud
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Quick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
