Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink. fatih.bilger@prolink.com.tr



Similar documents
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Application Security Manager ASM. David Perodin F5 Engineer

Gartner Magic Quadrant Sources and Disclaimer

How To Buy Nitro Security

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables

Integrating Web Application Security into the IT Curriculum

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Independent process platform

The monsters under the bed are real World Tour

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

F5 and Microsoft Exchange Security Solutions

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Improve Your Network Security

Achieving PCI Compliance Using F5 Products

The Hillstone and Trend Micro Joint Solution

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

How To Protect A Web Application From Attack From A Trusted Environment

Status Evolution Balance Trends

CA Technologies Data Protection

The real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

June, 2012 Laz Director of Strategy, Silver Tail Systems Twi?er: iamlaz

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence

IBM Security Intrusion Prevention Solutions

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Symantec Company Overview. Symantec Company Overview 1

The Cisco ASA 5500 as a Superior Firewall Solution

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Salient Managed Services. Hosting and Support

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

A Layperson s Guide To DoS Attacks

<Insert Picture Here> Oracle BI Standard Edition One The Right BI Foundation for the Emerging Enterprise

VMware Vision Accelerating the Journey to Your Cloud

F5 NETWORKS, INC. Secure Your Applications, Simplify Authentication, and Optimize Critical System

IBM QRadar Security Intelligence April 2013

Business Intelligence with SharePoint 2010

F5 Networks Overview Maximizing the Performance and Delivery of Your Mission Critical Enterprise Applications

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

Application Firewall Overview. Published: February 2007 For the latest information, please see

Innovative Defense Strategies for Securing SCADA & Control Systems

Network Control Meets Endpoint Security

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Reference Architecture: Enterprise Security For The Cloud

NetApp SANscreen: come controllare i costi senza sacrificare la service quality. Roberto Patano Business Development Manager NetApp Italia

Proven LANDesk Solutions

Amazon Web Services. Steve Spano, Brig Gen (Ret), USAF GM, Defense and National Security AWS, Worldwide Public Sector

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Table of Contents. Page 2/13

Sun and Oracle: Joining Forces in Identity Management

APPLICATION DELIVERY

2015 Vulnerability Statistics Report

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

PCI DSS and the A10 Solution

Inspection of Encrypted HTTPS Traffic

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

The Business Case for Security Information Management

HP FlexNetwork Architecture

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

Developing ASP.NET MVC 4 Web Applications MOC 20486

How To Secure Your System From Cyber Attacks

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

The Top Web Application Attacks: Are you vulnerable?

Enterprise Identity Management Reference Architecture

IT Architecture Review. ISACA Conference Fall 2003

Cloud Essentials for Architects using OpenStack

G06 - How to store your data in SharePoint

Internet threats: steps to security for your small business

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Security strategies to stay off the Børsen front page

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Simplify and Automate IT

DATA TRANSPARENCY TOWN HALL MEETING

HP FlexNetwork and IPv6

Next Gen Firewall and UTM Buyers Guide

Strategic Information Security. Attacking and Defending Web Services

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Now Is the Time for Security at the Application Level

Post-TMG: Securely Delivering Microsoft Applications

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

Recognized Leader in Human Capital Management. Paul Lacy President Mark Julien Chief Financial Officer 1

OPC & Security Agenda

Vulnerability Management

Beyond the Hype: Advanced Persistent Threats

How To Manage A Privileged Account Management

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Security Issues with Integrated Smart Buildings

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Web Application Security

NEXT GENERATION APPLICATION SECURITY

Transcription:

Overview of F5 Networks Fatih Bilger Senior Systems Engineer, Prolink fatih.bilger@prolink.com.tr

Company Snapshot Leading provider of Application Delivery Networking products that optimize the security, performance & availability of network applications, servers and storage systems 280 260 240 220 200 180 160 140 Service Product Revenue Founded 1996 / Public 1999 Approx. 2,130 employees FY09 Revenue: $653M 120 100 80 60 40 FY10 Revenue: $882M 20 0 1Q09 2Q09 3Q09 4Q09 1Q10 2Q10 3Q10 4Q10 1Q11 $ Millions

Who Is F5 Networks? Value Innovation Unique TMOS architecture Industry s only open icontrol API & SDK Powerful irules and DevCentral Community Numerous Industry Patents Proven Results Over 16,000 Customers FY10 Revenue: $882 M #1 in Advanced Platform ADC Market Gartner 2010 Best Web Application Security Solution SC Mag. FORTUNE List of 100 Fastest-Growing Companies 2010 Application Partnerships Unique F5 and application vendor integration Application partner tested and documented solutions F5 solutions in partner labs Cooperative Support Agreements

Gartner Magic Quadrant for ADC "This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from F5."The Magic Quadrant is copyrighted 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

Cyberattacks & web apps: motivation, methods and mitigation Fatih Bilger Senior Systems Engineer, Prolink fatih.bilger@prolink.com.tr

World s First Web Server The historic NeXT computer used by Tim Berners-Lee in 1990, on display in the Microcosm exhibition at CERN. It was the first web server, hypermedia browser and web editor.

World s First Web Server 199 4 The historic NeXT computer used by Tim Berners-Lee in 1990, on display in the Microcosm exhibition at CERN. It was the first web server, hypermedia browser and web editor.

199 World s First Web Server 4 199 4 The historic NeXT computer used by Tim Berners-Lee in 1990, on display in the Microcosm exhibition at CERN. It was the first web server, hypermedia browser and web editor.

199 World s First Web Server 4 199 4 200 4 The historic NeXT computer used by Tim Berners-Lee in 1990, on display in the Microcosm exhibition at CERN. It was the first web server, hypermedia browser and web editor.

Web Application Trends and Technologies Network Load High Traffic Low Traffic Web 1.0 Audio & Video downloads File transfers Basic HTML Flat web pages RIA Web 2.0 SOA SaaS AJAX Silverlight/Flex 3 Audio & Video streaming Less More Application Complexity

Web Application Trends and Technologies Network Load High Traffic Low Traffic Web 1.0 Audio & Video downloads File transfers Basic HTML Flat web pages RIA Web 2.0 SOA SaaS AJAX Silverlight/Flex 3 Audio & Video streaming Less More Application Complexity

Web Application Trends and Technologies Network Load High Traffic Low Traffic Web 1.0 Audio & Video downloads File transfers Basic HTML Flat web pages RIA Web 2.0 SOA SaaS AJAX Silverlight/Flex 3 Audio & Video streaming Less More Application Complexity

Expanding Needs and Demands Applications

Where are the Weak Spots? Transport Browsers (Client Software) Error Codes and Server Responses Web Platform IIS & Apache Application Servers Databases Web Application Authentication, Authorization, Site Structure, Input Validation, App Logic & Management Interface

Almost every web application is vulnerable! 97% of websites at immediate risk of being hacked due to vulnerabilities! 69% of vulnerabilities are client sideattacks 8 out of 10 websites vulnerable to attack - Web Application Security Consortium 75 percent of hacks happen at the application - WhiteHat security report - Gartner Security at the Application Level 64 percent of developers are not confident in their ability to write secure applications. - Microsoft Developer Research

Website Security Statistics Report from WhiteHat Security

Motives of Hackers Pursuit of fame or recognition Personal or Commercial Gain Malicious Intent Causing severe damage to information & assets Terror Cyber War

How long to resolve a vulnerability?

What does a vulnerability cost? The average custom business application has 150.000 to 250.000 lines of code -- Software Magazine Every 1000 lines of code averages 15 critical security defects -- U.S. Department of Defense That means there are an average of 2.250 security defects in every business application! The average security defect takes 75 minutes to diagnose and 6 hours to fix -- 5-year Pentagon Study That means 2.800 hours to diagnose the defects and 13.500 hours to fix them! Average worldwide cost of programmer = $40 per hour -- F5 Networks That s a cost of $112k to diagnose the defects and $540k to fix the defects

Attacks are Moving Up the Stack Network Threats Application Threats 90% of security investment focused here 75% of attacks focused here Source: Gartner

Network Firewalls vs. Application Firewalls Network Firewalls Manage network traffic Protection At Network Layer 3 Manage Access to Corporate LAN s Simple Forwarding Of Approved Packets Application Firewalls Manage web traffic Protection At Application Layer 7 Monitor HTTP/S & XML Protocols Protect Application & Backend Data From Malicious Attack s & Unauthorized Usage Deep Packet Inspection Of All Traffic To And From The Web Servers Packet Inspection Deep Stream Inspection

Network Firewalls vs. Application Firewalls Network Firewalls Manage network traffic Protection At Network Layer 3 Manage Access to Corporate LAN s Simple Forwarding Of Approved Packets Application Firewalls Manage web traffic Protection At Application Layer 7 Monitor HTTP/S & XML Protocols Protect Application & Backend Data From Malicious Attack s & Unauthorized Usage Deep Packet Inspection Of All Traffic To And From The Web Servers Packet Inspection Deep Stream Inspection

Take a Proactive Strategy Based on Truths Myths Programmers Write Perfect Software Facts Programmers Write Buggy Software Few and Simple Access Scenarios Data Theft Occurs at Network Level You Can Secure The Endpoint VS Many and Varying Access Scenarios 75% of Data Theft is at the Application Level You Can Secure Access Users are Secure Users are Inherently Insecure

Application Firewall: Deployment Architecture

What is the value of web application Firewall?

Benefits Developers spend less time fixing security holes freeing them up to spend more time building new business applications Security Professionals can focus on solutions -- enforcing security policies and improving those policies. They spend less time fixing security holes Architects can focus and improve the best practices for application availability, performance, and security Auditors reduce the time required for security assessments and remediation

Thank You!