IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?



Similar documents
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Post-TMG: Securely Delivering Microsoft Applications

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Where every interaction matters.

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Business Case for a DDoS Consolidated Solution

CONTENTS. PCI DSS Compliance Guide

Business Case for Data Center Network Consolidation

IJMIE Volume 2, Issue 9 ISSN:

Security F5 SECURITY SOLUTION GUIDE

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

F5 and Microsoft Exchange Security Solutions

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Guidelines for Web applications protection with dedicated Web Application Firewall

Penta Security 3rd Generation Web Application Firewall No Signature Required.

PCI DSS 3.0 Compliance

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Application Security in the Cloud with BIG-IP ASM

How To Protect A Web Application From Attack From A Trusted Environment

F5 and VMware. Realize the Virtual Possibilities.

NSFOCUS Web Application Firewall

Dynamic Attack Protection and Access Control

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

10 Things Every Web Application Firewall Should Provide Share this ebook

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Basic & Advanced Administration for Citrix NetScaler 9.2

JVA-122. Secure Java Web Development

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Global Web Application Firewall Market

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Durée 4 jours. Pré-requis

Table of Contents. Page 2/13

Securing SharePoint 101. Rob Rachwald Imperva

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

The New PCI Requirement: Application Firewall vs. Code Review

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Protecting Applications on Microsoft Azure against an Evolving Threat Landscape

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

From the Bottom to the Top: The Evolution of Application Monitoring

FortiWeb 5.0, Web Application Firewall Course #251

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

Application Security Manager ASM. David Perodin F5 Engineer

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Magento Security and Vulnerabilities. Roman Stepanov

Bringing Continuous Security to the Global Enterprise

2013 MONITORAPP Co., Ltd.

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Securing Virtual Applications and Servers

Datacenter Transformation

05.0 Application Development

Information Technology Policy

Protecting Your Organisation from Targeted Cyber Intrusion

IBM. Vulnerability scanning and best practices

Auditing the Security of an SAP HANA Implementation

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

What is Web Security? Motivation

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Adobe Systems Incorporated

PCI DSS and the A10 Solution

elearning for Secure Application Development

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

SAST, DAST and Vulnerability Assessments, = 4

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

SERENA SOFTWARE Serena Service Manager Security

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Web Application Security Assessment and Vulnerability Mitigation Tests

Sitefinity Security and Best Practices

How to complete the Secure Internet Site Declaration (SISD) form

Integrating Security Testing into Quality Control

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Cloud Security Framework (CSF): Gap Analysis & Roadmap

12 Security Camera System Best Practices - Cyber Safe

Cutting the Cost of Application Security

Powered by. Incapsula Cloud WAF

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Web Application Security 101

Addressing Cyber Security in Oracle Utilities Applications

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Cloud Security:Threats & Mitgations

Transcription:

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only? Antoine Donzé Sales Engineer Switzerland & North Africa

Mid-market organizations are increasingly vulnerable to cyber threats

Security: Midmarket Feels the Squeeze Threats MIDMARKET ORGANIZATIONS Limitations

Trends: The Widening Security Gap Gap between midmarket organizations Self Defenses vs. Threats Threat Regulations Complexity IT Security Budget Skills Source: IDC

IT Security-Related Challenges in Midmarket Budget concerns Increasing sophistications of attacks Increasing complexity of security solutions Increasing volume of network traffic Mobile clients and unmanaged devices Patchwork solutions Lack of IT security expertise Compliance with government and industry Security policies are lacking or not enforced Misuse of data by employees Managing security outsourcing Other Source: IDC 5% 8% 40% 37% 37% 33% 31% 31% 29% 26% 48% 59%

Economic Reality 5% of revenue on IT 5% of IT budget on security People versus equipment 45% hardware / software The rest is personnel, outsourcing and consulting Budget Dollars $50 Million IT $2.5 Million Security $125k HW/SW $60k

All network threat vectors must be secured

Traditional Security Does Not Cover All Boundaries Internet Threat Vectors Email Web applications Remote access Web browsing Mobile Internet Network Perimeter

Traditional Approaches Are Too Complex Or Too Constrained

Too Complex: Bag of Parts Strategy High-price Points Not geared for mid markets Complicated Interfaces High learning curve Management Overhead Requires large IT staff

Too Constrained: All-In-One Strategy Feature Gaps Security risks Performance Degradation Network bottlenecks Unplanned upgrades Unused security features High TCO Accelerated refresh cycles

Securing All Internet Threat Vectors Security Threat Vectors Firewall is a linchpin

Federated Security Architecture Cloud-based Central Management Threat Vectors Web Security Email Security Next Generation Firewall Application Security SSL VPN Attack Surfaces: Appliance Cloud Virtual

Web Apps are the Least Secured Vector Source: Verizon Data Breach Report, 2013

Learning The Hard Way

All experts talk about it

Everyone is a Target Web exploitation kits available Easy to procure No expertise required They operate like companies Can attack thousands of servers in seconds

Implication securely publishing Web Apps - Knowledges & Technologies Standards: FIPs 140-2 PCI DSS Networking Load Balancing Coding languages: Java Script, SQL,.Net, Visual Basic,HTML 5, PHP, Perl, Ajax, Protocols - HTTP / SSL, XML Authentication: Tokens, Kerberos/NTLM, LDAP; SAML 2.0 Certificats

Implication securely publishing Web Apps - Threats OWASP top 10 Threats & Ressources A1 Injection, A2 Broken Authentication and Session Management, A3 Cross-Site Scripting (XSS), A8 Cross-Site Request Forgery (CSRF), A5 Security Misconfiguration, A9 Using Components with Known Vulnerabilities A6 Sensitive Data Exposure Common Vulnerabilty & Exposure May 2015 (till 26th) 324 CVE published Since begining of 2015 375 XSS, 111 SQL Injection, 120 GoP, 253 GoI Resources Time Man Power Be up to date

Application Delivery The Barracuda Approach

Two offering Web Application Firewall Web App, Website publication Load Balancing L7 Enhanced Security: Application Learning, XMsecurity, JSON security, Multi-tenant FIPS standard Active-Active HA Load Balancer ADC Web App, Website publication Load Balancing L4/7, GSLB LB natively MS Exchange or Citrix Policy based Security High performance Multiple ports

Flexible Deployment Options Physical Virtual Cloud

Plug & Play Deployment & Management Level of Customization High Medium Low Custom & Positive Security Template-Based Security Default Security

On Premise Easy Deplyoment One Armed Two Armed

Backed by Barracuda Central Intelligence Cloud Services Appliances Servers & Desktops Websites Intelligence Services

Central Management Barracuda Cloud Control Barracuda Control Management Center

Ramp up how much time invested Imperva F5 - Big IP - SecureSphere Product training Web Administering Application BIG-IP Security v11 - - 2 2 Days Days File Configuring Security BIG-IP & Compliancy ASM v11: - 2 Application Days Security Manager - 4 Days Database Configuring Security BIG-IP & APM Compliance v11: Access - 3 Days Policy Manager - 3 Days Administration Configuring BIG-IP - 2 Days AFM v11: Advanced Firewall Manager - 2 Days Configuring BIG-IP LTM v11: Local Traffic Manager - 3 Days Configuring BIG-IP GTM v11: Global Traffic Manager - 2 Days Developing irules for BIG-IPv11 3 Days Source: F5 website Source: Mai Imperva 2015 Website Mai 2015

Ramp up how much time invested Barracuda Sales Representative - online about 1 hour Certified Specialist - online about 1 hour Certified Engineer ADC - webinar 2x2 hours Certified Engineer WAF - onsite training 3 Days

The questions to ask yourselves Which kind, which level of security do I need to attain? With which budget? In which time frame? With which resources?

Give it a try

Thank You