THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

Similar documents
IT SECURITY SEMINAR "STALLION " Security, NGFW fallacy & going Beyond IP? Juniper Networks - Jaro Pietikäinen

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

SECURE THE DATACENTER. Dennis de Leest Sr. Systems Engineer

RETHINK SECURITY FOR UNKNOWN ATTACKS

SECURING THE DATACENTER

The Threat Keeps Growing, Are we Doing it Wrong: David Naudé - Commercial Manager SA

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

WEBAPP SECURE The Smartest Way to Secure Websites and Web Applications Against Hackers, Fraud, and Theft

The Smartest Way to Secure Websites and Web Applications Against Hackers, Fraud, and Theft

The Global Attacker Security Intelligence Service Explained

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

The Hillstone and Trend Micro Joint Solution

Rational AppScan & Ounce Products

10 Things Every Web Application Firewall Should Provide Share this ebook

JUNIPER S WEB APPLICATIONS UNDER DAILY ATTACK

Data Center security trends

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Understanding and Responding to the Five Phases of Web Application Abuse

Concierge SIEM Reporting Overview

Cutting the Cost of Application Security

Secure Cloud-Ready Data Centers Juniper Networks

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Breaking the Cyber Attack Lifecycle

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Check list for web developers

The Top Web Application Attacks: Are you vulnerable?

External Supplier Control Requirements

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

Are You Ready for PCI 3.1?

From the Bottom to the Top: The Evolution of Application Monitoring

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

COORDINATED THREAT CONTROL

Securing Your Business with DNS Servers That Protect Themselves

Analyzing HTTP/HTTPS Traffic Logs

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Protection Against Advanced Persistent Threats

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

CYBER SECURITY SERVICES PWNED

APT Protection Via Data-Centric Security. Alan Kessler President and CEO Vormetric

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

The Web AppSec How-to: The Defenders Toolbox

Junos WebApp Secure (formerly Mykonos)

Digital Pathways. Penetration Testing

EVOLVED DATA CENTER ARCHITECTURE

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Course Title: Penetration Testing: Network & Perimeter Testing

Huawei Eudemon200E-N Next-Generation Firewall

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Latest Changes in Healthcare Regulations and the IT Solutions Needed to Address Them

Where every interaction matters.

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Cyber Exploits: Improving Defenses Against Penetration Attempts

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Security is a top priority. The reasons for reliable network security keep growing.

2012 Bit9 Cyber Security Research Report

Networking for Caribbean Development

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Cisco RSA Announcement Update

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

FortiWeb 5.0, Web Application Firewall Course #251

EC-Council Certified Security Analyst (ECSA)

SecurityMetrics Vision whitepaper

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Penetration Testing Services. Demonstrate Real-World Risk

Readiness Assessments: Vital to Secure Mobility

Website Security: How to Avoid a Website Breach. Jeff Bell, CISSP, CPHIMS, ACHE Director, IT Security and Risk Services CareTech Solutions

Client logo placeholder XXX REPORT. Page 1 of 37

Penetration Testing //Vulnerability Assessment //Remedy

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Modular Network Security. Tyler Carter, McAfee Network Security

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Transcription:

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS Junos WebApp Secure Junos Spotlight Secure

SECURITY AT JUNIPER Customer segments Business segments Service providers, enterprise Routing, switching, security Security innovation & leadership Invest more than 20% of revenue on R&D Leader in high-end firewalls and remote access SSL VPN Pioneer in Intrusion Deception technology DDoS advanced technology First to deliver purpose-built virtual firewall SC Magazine 2013 best cloud and SSL VPN solution Tech Target s 2013 reader s choice gold awards for virtual security, IDP, and NAC 2 Access Apps Networks Mgmt Mobility Edge Data center Cloud Products

THE COST OF AN ATTACK PONEMON INSTITUTE AVERAGE BREACH COSTS $214 PER RECORD STOLEN Sony Stolen Records 100M Theft Sony Lawsuits $1-2B Reputation Revenue Sony Direct Costs $171M 23 day network closure Lost customers Security improvements 3

5 Attack phases:- APT behaviour Phase 1 Phase 2 Phase 3 Phase 4 Phase 5 Silent Reconnaissance Attack Vector Establishment Attack Implementation Attack Automation Maintenance Attackers profile physical and virtual devices and applications Weaknesses in attack surface identified for attack Attacks launched to take control of device, application or VM. Can be used to begin further Reconnaissance Repeat attack to increase effectiveness, increase Profit or extract more data Evade patching and remediation measures to stop the attack Web Copyright 2013 Juniper Networks, Inc. Application Firewall 4

DETECT THREATS BY DECEPTION NO SIGNATURE & RULE WRITING Network Perimeter Client Firewall App Server Database Injected Tar Traps Web App Response Query String Parameters Query String Parameters HTML Hidden Input Fields HTML Hidden Input Fields Server Configura-on (.htpasswd) Server Configura-on (.htpasswd) 404 Not Found Any Manipulation of a Tar Trap = Malicious 5

TRACK ATTACKERS BEYOND THE IP Track IP Address Track Browser Attacks Persistent Token Capacity to persist in all browsers including various privacy control features. Track Software and Script Attacks Fingerprinting HTTP communications. 6

FINGERPRINT OF AN ATTACKER Timezone Browser version Fonts Browser add-ons 200+ attributes used to create the fingerprint. ~ Real Time availability of fingerprints IP Address False Positives nearly zero 7

JUNOS SPOTLIGHT SECURE Junos Spotlight Secure Global Attacker Intelligence Service Attacker from San Francisco Junos WebApp Secure protected site in UK Attacker fingerprint uploaded Attacker fingerprint available for all sites protected by Junos WebApp Secure Detect Anywhere, Stop Everywhere 8

RESPOND AND DECEIVE Junos WebApp Secure Responses Human Hacker Botnet Targeted Scan IP Scan Scripts &Tools Exploits Warn attacker l Block user l l l l l Force CAPTCHA l l l l l Slow connection l l l l l Simulate broken application l l l l l Force log-out l l l All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat. 9

THE JUNOS WEBAPP SECURE ADVANTAGE DECEPTION-BASED SECURITY Detect Track Profile Respond Tar Traps detect threats without false positives. Track IPs, browsers, software and scripts. Understand attacker s capabilities and intents. Adaptive responses, including block, warn and deceive. 10

WEB APP SECURITY TECHNOLOGY Web Application Firewall Web Intrusion Deception System Detection Signatures ü ü Tar Traps Tracking IP address ü ü Browser, software and scripts Profiling IP address ü ü Browser, software and scripts Responses Block IP ü ü Block, warn and deceive attacker PCI Section 6.6 ü ü ü ü ü ü 11