Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers



Similar documents
Cutting the Cost of Application Security

10 Things Every Web Application Firewall Should Provide Share this ebook

End-to-End Application Security from the Cloud

Enterprise-Grade Security from the Cloud

Powered by. Incapsula Cloud WAF

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Introduction: 1. Daily 360 Website Scanning for Malware

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

The New PCI Requirement: Application Firewall vs. Code Review

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Akamai to Incapsula Migration Guide

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

How Web Application Security Can Prevent Malicious Attacks

Automated Mitigation of the Largest and Smartest DDoS Attacks

Web Application Security 101

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

SiteLock SECURE Partner Program FAQ

NSFOCUS Web Application Firewall White Paper

Four Steps to Defeat a DDoS Attack

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

A Network Administrator s Guide to Web App Security

10 Things Every Web Application Firewall Should Provide Introduction

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide

Application Security in the Cloud with BIG-IP ASM

Four Steps to Defeat a DDoS Attack

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

IT Security & Compliance. On Time. On Budget. On Demand.

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI DSS Reporting WHITEPAPER

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

A Layperson s Guide To DoS Attacks

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

Where every interaction matters.

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

The Business Case for Security Information Management

Bringing Continuous Security to the Global Enterprise

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

BIG SHIFT TO CLOUD-BASED SECURITY

The Importance of Cybersecurity Monitoring for Utilities

Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution

PCI DSS Top 10 Reports March 2011

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

How to complete the Secure Internet Site Declaration (SISD) form

F5 Silverline Web Application Firewall Onboarding: Technical Note

Stop DDoS Attacks in Minutes

Four Steps to Defeat a DDoS Attack

EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

We Secure What Matters Most: The Data Center. In physical, virtual, and cloud environments

Protecting Your Organisation from Targeted Cyber Intrusion

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

ALERT LOGIC FOR HIPAA COMPLIANCE

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

How to Secure Your SharePoint Deployment

Akamai Security Products

Load Balancing Security Gateways WHITE PAPER

TLP WHITE. Denial of service attacks: what you need to know

The Hillstone and Trend Micro Joint Solution

Teradata and Protegrity High-Value Protection for High-Value Data

A Decision Maker s Guide to Securing an IT Infrastructure

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

IAAS REFERENCE ARCHITECTURES: FOR AWS

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

End-user Security Analytics Strengthens Protection with ArcSight

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Achieve Deeper Network Security

WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications

VALIDATING DDoS THREAT PROTECTION

Passing PCI Compliance How to Address the Application Security Mandates

FortiWeb 5.0, Web Application Firewall Course #251

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

On-Premises DDoS Mitigation for the Enterprise

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Advantages of Managed Security Services

dotdefender PCI Compliance and You

Streamlining Web and Security

Transcription:

How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data breaches. Regulations like the PCI Data Security Standard attempt to reign in these threats by mandating Web application protection. There s a smart and easy way for businesses to safeguard their and achieve compliance. Hackers *Bots In this ebook, we look at today s most dangerous threats. We also examine compliance requirements. Then, we introduce, a managed security service that protects applications from Web attacks, and profile, a company that stopped a devastating DDoS attack with. Legitimate Traffic Scrapers Comment Spammers Your s

Web Attacks Are Your Number One Risk Web application attacks are the most prevalent and devastating threat facing organizations today. Web attacks are responsible for some of the largest information security breaches in history, including four of the top credit card breaches between 2005 and 2011. At one retailer, hackers used SQL injection to compromise servers and steal 45 million personal information records, costing the organization an estimated $256 million. Web Attacks Are Increasing Web attacks are growing in number, with 64% of organizations in a 2011 survey reporting they had suffered a Web attack in the past four weeks. 1 The same survey found that Denial of Service (DoS) and Web application attacks, both of which target s, were the two most costly types of cyber crime. Web Attacks Are Becoming More Advanced Sophisticated attack techniques have enabled hackers to launch large-scale attacks more quickly. Hackers have also become more organized, pooling resources, and sharing exploits in underground forums. Automated attack tools use search engines to rapidly discover vulnerabilities and attack thousands of sites. For even greater efficiency, hackers have built networks of bots remotely controlled computers to unleash large-scale attacks. Most Web Applications Have Vulnerabilities Most Web applications over 80% 2 have had serious vulnerabilities. This is due in part to the lack of effort applied to secure coding; most developers are motivated to write code quickly or add advanced new functionality rather than write applications securely. Example of a Botnet Management Dashboard Traditional Solutions Don t Stop Web Attacks Firewalls and Intrusion Prevention Systems (IPSs) prevent network attacks, but they are not designed to stop Web application attacks. They cannot differentiate between bots and human users, so they cannot block business logic attacks like site scraping and comment spam. Since they rely on signatures, hackers can use encoding, comments, and other evasion techniques to circumvent them. Most firewalls and IPSs cannot inspect HTTPS traffic, leaving SSL-enabled sites completely unprotected. Web Application Firewalls Stop Web Attacks Web Application Firewalls (WAFs) are purpose-built to protect against Web attacks. WAFs combine several security measures together to offer accurate protection for a myriad of threats, including SQL injection, Crosssite scripting (XSS), CSRF, site scraping, application DDoS attacks, and many more. By the Numbers 230 is the average number of vulnerabilities on a 1 75% of all cyber attacks target Web applications 2 89% of compromised records are due to hacking and external threats 3 64% of organizations feel that they can t fix Web vulnerabilities quickly 4 $7.2 Million is the average cost of a data breach 5 1 WhiteHat Security Statistic Report, WhiteHat Security, 2011 2 Gartner Research 3 2011 Data Breach Investigations Report, Verizon Business, 2011 4 State of Web Security, Ponemon Institute, 2011 5 US Cost of a Data Breach, Ponemon Institute, 2011 1 Second Annual Cost of Cyber Crime Study, Ponemon Institute, 2011 2 WhiteHat Security Statistic Report, WhiteHat Security, 2011

6.6 Does your organization process, store, or transmit credit card data? If so, you probably need to comply with the Payment Card Industry Data Security Standard (). To address PCI, you must satisfy 12 high-level requirements, including requirement 6.6, which governs Web security. PCI 6.6 offers two ways for organizations to protect publicfacing Web applications:» Review web applications at least annually and after any changes» Protect applications with a Web Application Firewall First, you must decide whether you want to scan and fix applications or use a Web Application Firewall (WAF) to address PCI 6.6. Then, you must select a WAF solution or a Web scanning or consulting company to achieve compliance. Option 1: Review Web Applications All organizations should follow secure application coding best practices. However, addressing PCI# 6.6 by reviewing and fixing applications has the following challenges:» Organizations must hire an organization that specializes in application security or train internal staff that are independent of the development team» Organizations must assess application annually and after any changes» Organizations must fix any vulnerabilities and retest applications Reviewing and fixing Web vulnerabilities is costly and may impact application development schedules. Option 2: Implement a Web Application Firewall Web Application Firewalls automatically detect and block attacks before damage can occur. WAFs offer the following benefits:» WAFs proactively stop Web attacks. WAFs use multiple detection techniques to identify advanced attacks, automated threats, and bots with precision.» WAFs provide continuous security. WAFs protect Web applications around the clock not just immediately after a find-and-fix cycle.» WAFs offer low total cost of ownership and won t impact Web application development or entail expensive consulting engagements. For many organizations, WAFs offer a secure, cost-effective way to address PCI 6.6. Selecting a Web Application Firewall If you ve decided to address PCI 6.6 with a WAF, consider the following evaluation criteria when selecting a WAF:» Security accuracy The WAF should block all Web attacks and bots without creating false positives.» Ease of management The WAF should not require in-depth knowledge or training to configure. For smaller organizations, a managed WAF service may be ideal.» Ease of deployment The WAF should be easy to deploy with minimal network changes or new equipment. Achieving PCI 6.6 compliance is quick and easy once you ve considered your options and determined your requirements. Security Standards Council has been certified by a PCI Qualified Security Assessor (QSA) as a PCI-compliant WAF service. subsidiary Incapsula has certified the underlying Cloud WAF technology.

To avoid a costly data breach and stay out of the news headlines, you need to protect your against Web attacks. If you sell product or services online, you also need to address PCI compliance., powered by Incapsula, is an easy and affordable cloud-based Web Application Firewall service that stops Web attacks and meets PCI requirement 6.6. Security professionals at provide around-the-clock monitoring, policy tuning, and reports, so you can rest assured that your Web applications and data are safe. Protect Your Against Hackers Having an online presence is critical. The challenge is that hackers often prey on smaller organizations. protects Web applications against current and emerging threats, including SQL Injection, XSS, malicious bots, and other OWASP Top 10 threats. Achieve PCI 6.6 If your company processes credit cards, Cloud WAF will help you address PCI requirement 6.6 quickly and affordably. With, you can protect your Web applications all of the time not just after a test-andfix cycle. As a managed, hands-free service, Cloud WAF will not impact Web development processes and will not entail burdensome consulting costs. Avoid Search Engine Blacklisting If a hacker injects malware in your, you might not only distribute that malware to your visitors, you might also be blacklisted by search engines reducing the amount of traffic to your site. prevents the attacks, like SQL injection, that allow hackers to upload malware to your site. Improve Performance accelerates the performance of your, improving Web page load times and lowering bandwidth consumption. It also monitors performance and automatically notifies you of errors in your applications and performance issues. Deploy Through a Simple DNS Change Provisioning couldn t be easier. Simply update your s DNS settings to redirect Web traffic through the Cloud. This effortless deployment enables you to jumpstart their Web application security initiative while keeping your existing hosting provider and infrastructure. Benefit from Low Total Cost of Ownership (TCO) By leveraging a software-as-a-service (SaaS) delivery model, provides businesses with the highest levels of Web security available without requiring a large resource investment. couples effortless deployment and dedicated security expertise with low annual costs to avoid hardware and operational costs. Benefits» Stop Web attacks like SQL injection and XSS» Achieve PCI 6.6 compliance quickly and cost-effectively» Stop automated attacks like site scraping» Improve performance» Avoid search engine blacklisting» Outsource WAF management to security experts Cloud DDoS Protection Cloud DDoS Protection is a simple, secure cloud-based service that safeguards businesses from the most debilitating and protracted DDoS attacks. As a service, Cloud DDoS Protection can be deployed quickly and can scale on demand to mitigate malicious traffic.

Keystone s Hit by a DDoS Attack Headquartered in Indiana, is the leading manufacturer of recreational vehicles in North America. In August 2011, the company began receiving reports from its dealers saying that its corporate site and its partner portal were unavailable. Mark Widman, Keystone s lead security administrator, contacted the company s Web hosting provider and learned that they were suffering from a Distributed Denial of Service (DDoS) attack. At first, Keystone s Web hosting provider attempted to allocate more Web servers and allotted more application bandwidth. Unfortunately, according to Widman, the hosting provider s solution fell apart under the attack. We were caught behind the eight ball. Quick Deployment with Instant Results Mark Widman contacted at 4:00 PM on a Thursday afternoon. After updating the DNS information for the company s, Web traffic was redirected through the cloud. By 6:00 PM two hours later had stopped the attack and the was up and running. Foils Distributed SYN Flood Attack Based on information from, Keystone learned that a massive DDoS attack, known as a SYN flood, had hammered its. At the height of the attack, Keystone s bandwidth was over one hundred times greater than typical levels. Two days after purchasing Cloud DDoS Protection, the DDoS attack subsided. However, Keystone suffered two follow-on attacks over the next month. was able to stop these DDoS attacks as well. Technical Support Exceeds Expectations From the outset, the sales and support staff at impressed Keystone s security team. Everyone we ve worked with has been knowledgeable and responsive. The SOC manages all aspects of the deployment, including security policy configuration, monitoring, and tuning. Stops Web Application Attacks Keystone also provisioned. So, Keystone s s are not only protected against powerful DDoS attacks, but they are also protected against Web application attacks like SQL injection, cross-site scripting (XSS), and directory traversal. Keystone s security team was surprised to learn that both users and bots were attacking the site and attempting to access sensitive data. Keystone Gains Visibility into Application Activity and Cloud DDoS Protection not only give Keystone s security team peace of mind, they also offer greater visibility into Web application activity. Email alert notifications inform the security team of attacks and abnormal activity. Notifications list the type of threat and the attacker s IP address, Web browser, and geographic location. A high-level dashboard shows security, performance, and configuration information. With Cloud Services, Keystone s is safeguarded from future Web application and DDoS attacks. From Widman s perspective, Every aspect of the service has been stellar. When we were under attack, our bandwidth went up one hundred fold. stopped the attack and kept our site up and running. Headquarters 3400 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 Tel: +1-650-345-9000 Fax: +1-650-345-9004 www.imperva.com Copyright 2012, All rights reserved. and SecureSphere are registered trademarks of. All other brand or product names are trademarks or registered trademarks of their respective holders. #EB-Cloud-WAF-0212rev1