WEB APPLICATION FIREWALL



Similar documents
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

The New PCI Requirement: Application Firewall vs. Code Review

Guidelines for Web applications protection with dedicated Web Application Firewall

Where every interaction matters.

Application Security Testing

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Web Application Security

Web Application Vulnerability Testing with Nessus

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Security

EC Council Certified Ethical Hacker V8

A Decision Maker s Guide to Securing an IT Infrastructure

10 Things Every Web Application Firewall Should Provide Share this ebook

IJMIE Volume 2, Issue 9 ISSN:

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Passing PCI Compliance How to Address the Application Security Mandates

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web App Security Audit Services

Implementation of Web Application Firewall

CYBERTRON NETWORK SOLUTIONS

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CEH Version8 Course Outline

EC-Council Certified Security Analyst (ECSA)

How To Protect A Web Application From Attack From A Trusted Environment

New IBM Security Scanning Software Protects Businesses From Hackers

Table of Contents. Page 2/13

Attack Vector Detail Report Atlassian

Hackers are here. Where are you?

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Web Application Security 101

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

FortiWeb 5.0, Web Application Firewall Course #251

External Supplier Control Requirements

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.

[CEH]: Ethical Hacking and Countermeasures

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

FORBIDDEN - Ethical Hacking Workshop Duration

Presented by Frederick J. Santarsiere

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

What is Web Security? Motivation

Penetration Testing in Romania

(WAPT) Web Application Penetration Testing

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

The Top Web Application Attacks: Are you vulnerable?

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Reducing Application Vulnerabilities by Security Engineering

Application Security Best Practices. Wally LEE Principal Consultant

Web Application Report

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Swordfish

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

CompTIA Security+ (Exam SY0-410)

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Detailed Description about course module wise:

Attacks from the Inside

2013 MONITORAPP Co., Ltd.

Using Free Tools To Test Web Application Security

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How To Protect Your Data From Being Stolen

SERENA SOFTWARE Serena Service Manager Security

Information Technology Policy

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

White Paper Secure Reverse Proxy Server and Web Application Firewall

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Penta Security 3rd Generation Web Application Firewall No Signature Required.

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Secure Web Applications. The front line defense

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Loophole+ with Ethical Hacking and Penetration Testing

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Application Denial of Service Is it Really That Easy?

Networking: EC Council Network Security Administrator NSA

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

EC-Council. Certified Ethical Hacker. Program Brochure

Hackers are here. Where are you?

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

05.0 Application Development

Transcription:

WEB APPLICATION FIREWALL Sdn. Bhd. (1015448-T) A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor, Malaysia. Tel : +603 5021 8290 Fax : +603 5021 8291 Email : sales@kaapagamtech.com Web: http://www.kaapagamtech.com

Web applications, are the most vulnerable elements of an organization s IT infrastructure today. According to a research by the Gartner Group : Almost three-fourths of all Internet assaults are targeted at Web applications. Estimated 80% of all security breaches are due to vulnerabilities within the web application layer (attacks exclusively using the HTTP/HTTPS protocol) leading to the theft of sensitive corporate data such as credit card information and customer lists. Traditional security mechanisms such as firewalls and IDS provide little or no protection against attacks on your web applications Insecure web applications provide easy access to backend corporate databases. Firewalls, SSL and locked-down servers are futile against web application hacking! Web application attacks, launched on port 80/443, go straight through the firewall, pass through operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers. Web applications are vulnerable to long list of attacks due to the practical difficulty of following Secure Coding / Secure Programming practices on a business oriented IT software development eco system. For example, source code review on thousands of lines of codes incur substantial amount of time and cost for each application. Furthermore, source code review & audit must be done on the entire code base every time when there are changes or additions to the application code. As this creates burden on the project timelines as well as budgets, most of the organizations do not follow the secure coding and auditing practices. In addition to the vulnerabilities from the application itself, vulnerabilities from operating systems, firmware s, web server software s, web application language platforms, database platforms, etc. introduce more entry points and attack vectors for attackers to party on the infrastructure. The vast majority of web applications have inadequate security, hence a Web Application Firewall (WAF) is necessary. According to Web Application Security Consortium, A Web Application Firewall is an intermediary device, sitting between a web-client and a web server, analysing OSI Layer-7 messages for violations in the Application security policy. A web application firewall is used as a security device protecting the web server from attack. 2 P a g e

VALARI is a Web Application Firewall & Security Management System designed to secure your web applications from attacks and provide a layer of security by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities. VALARI can detect and block all the OWASP Top 10 Vulnerabilities and many more Web application threats: HTTP Distributed Denial of Service (DDoS), HTTP Flooding and Slow HTTP DoS Attacks, Brute Force Login, OS Command Injection, Parameter / Form Field Tampering, Data Disclosure, Phishing Attacks, SQL Injection, Cross Site Request Forgery (CSRF), Cross Site Scripting (XSS), Drive-by-Downloads, Directory Traversal, Buffer Overflow, Cookie Injection, Cookie Poisoning, Site Reconnaissance, Data Destruction, Remote File Inclusion Attacks, Google Hacking, Anonymous Proxy Vulnerabilities, HTTP Response Splitting, HTTP Verb Tampering, HTTP Parameter Pollution Attack, Malicious Encoding, Malicious Robots, Known Worms, Web Services (XML) attacks, Session Hijacking, Site Scraping, Sensitive Data Leakage (Social Security Numbers, Cardholder Data, PII, HPI), Web server software and operating system attacks, Zero Day Web Worms, Forceful Browsing of Website Content, Automated Botnet Attacks, Manipulation of Query String Parameters and many more Full Web Traffic Logging : contents in the web Request bodies are not logged by the web servers and hence attackers use POST requests to delivery exploits and it goes completely blind on the web server logs. With full HTTP transaction logging in VALARI, it is possible to log all requests and responses. This Logging feature can be controlled on what and when a log is created. VALARI can be configured to mask the sensitive data in the request and/or response fields before they are written to the audit log. Web Intrusion Detection with Just-In Time Monitoring and Detection : Web Traffics are monitored real time to detect attacks and react on suspicious events / data that hit your web applications. Built-in Anti-evasion and Encoding validation mechanisms. Protected protocols: HTTP, HTTPS (SSL), XML, Web services, SOAP and AJAX 3 P a g e

Facilitates compliance with PCI DSS requirement 6.6 Attack Prevention and External Patching / Virtual Patching : VALARI acts immediately to prevent attacks from reaching your web applications. With more than 20,000 specific rules, VALARI is an ideal external patching tool. External patching (referred to as Virtual Patching) is about reducing the window of opportunity as the time needed to fix / patch application vulnerabilities often take weeks to months. With VALARI, application vulnerabilities can be patched from the WAF Layer without patching the application source code making your applications secure until a proper patch is applied to the application by your development team or vendors. Flexible Rule Engine : The Heart of VALARI is made up of our flexible rule engine with more than 20,000 specific rules covering all sorts of application vulnerabilities, signature patterns and evasion patterns. Our Rule engine is implemented with hardening, protocol validation and detection of web application security issues and is kept updated on regular basis as and when vulnerabilities and attack vectors evolve. Geo-location Blocking : VALARI allows Geo-location blocking to block request originated from specific countries Integrated Security Rules from various public vulnerability data signature sources and VALARI correlates data from all these numerous sources to generate the Flexible Scalable Reliable rules, automatically updating daily and as needed. Various vulnerability data signature sources include : Kaapagam Tech Rule Set Public vulnerability data such as the Open Source Vulnerability Database (OSVDB) Honeypot systems High Availability Deployment option with Active & Passive VALARI Units with identical rule sets and configurations. The Passive VALARI unit can be put-in action if the primary VALARI unit is down for any unforeseen circumstances. 4 P a g e

Hardware Specifications : Form Factor CPU Motherboard Memory Flash Chassis Network Interfaces Hardware Warranty 1u high density rack chassis 1 x Intel Xeon Quad core Processor Intel Server board 16GB ECC RAM 2 x 60GB Mirrored Flash Storage 1u IPC Chassis 5 x Intel Gigabit Server Adapters integrated 3-year warranty on parts, labour, next-day onsite response SUPPORT & MAINTENANCE Standard Support : VALARI will be deployed with 1 year Maintenance and Standard Support on Software components and rule sets. Customer will be provided with a telephone number and email to make Service / Support Request. The Support number operates during business hours, 9:00 a.m. to 5:00 p.m. (GMT +8), Monday through Friday, excluding legal holidays. All Software related supports will be done remotely via Team Viewer or VPN access. The Support is inclusive of any patches and upgrades to the existing system. Premium Support : Premium Support of VALARI includes 24 x 7 x 365 email and phone support. All Software related supports will be done remotely via Team Viewer or VPN access. The Support is inclusive of any patches and upgrades to the existing system. 5 P a g e

OUR CONSULTANTS Seasoned Consultants Deliver... is committed to delivering the highest quality consultancy to help you achieve your business goals and eliminate issues. No matter which technology or devices you use, you can count on our consultants with years of hands-on experience to be your teammate. At, we select only the experts in their respective field who can pass our rigorous selection process. Each consultant is an acknowledged subject matter expert who is dedicated to customer s requirements List of Certifications achieved by our consultants Certified Information System Security Professional (CISSP) Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) EC-Council Certified Secure Programmer (ECSP) EC-Council Certified Incident Handler (ECIH) EC-Council Certified Security Analyst (ECSA) EC-Council Certified Licensed Penetration Tester (LPT) EC-Council Certified Disaster Recovery Professional (EDRP) EC-Council Certified VoIP Professional (ECVP) EC-Council Certified Instructor (CEI) Open Source Wireless Integration Security Professional (OSWiSP) Offensive Security Certified Professional (OSCP) GIAC Certified Security Essential (GSEC) GIAC Certified Penetration Tester (GPEN) GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) GIAC Reverse Engineering Malware (GREM) SCSAS (Sun Certified Solaris Associate) CCDA (Cisco Certified Design Associate) 6 P a g e

CCNA (Cisco Certified Network Associate) Microsoft Certified Systems Engineer (MCSE) Microsoft Certified Professional Developer (MCPD) Microsoft Certified IT Professional Business Intelligence Microsoft Certified IT Professional Enterprise Messaging Microsoft Certified Technology Specialist Web Applications Microsoft Certified Technology Specialist Virtualization Microsoft Certified Technology Specialist Database Microsoft Certified Trainer (MCT) Microsoft Most Valuable Professional (MVP) - Security CONTACT US At, customer service is everyone's responsibility. Our goal is to provide "High Calibre" service to our customers. A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor, Malaysia. Tel : +603 5021 8290 Fax : +603 5021 8291 Email : sales@kaapagamtech.com Web: http://www.kaapagamtech.com Blog: http://blog.kaapagamtech.com 7 P a g e