Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution

Similar documents
Powered by. Incapsula Cloud WAF

PCI DSS Top 10 Reports March 2011

Where every interaction matters.

Caretower s SIEM Managed Security Services

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

PCI DSS Reporting WHITEPAPER

Data Sheet: PCI DSS Compliant ecommerce Hosting

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Network Test Labs (NTL) Software Testing Services for igaming

Swordfish

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Securing OS Legacy Systems Alexander Rau

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

F5 Silverline Web Application Firewall Onboarding: Technical Note

Enterprise-Grade Security from the Cloud

Moving to the Cloud? DIY VS. MANAGED HOSTING

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Five reasons SecureData should manage your web application security

Cutting the Cost of Application Security

The New PCI Requirement: Application Firewall vs. Code Review

10 Things Every Web Application Firewall Should Provide Share this ebook

End-to-End Application Security from the Cloud

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

ALERT LOGIC FOR HIPAA COMPLIANCE

BIG SHIFT TO CLOUD-BASED SECURITY

NSFOCUS Web Application Firewall White Paper

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

How to Develop a Log Management Strategy

1. Thwart attacks on your network.

The Business Value of Managed Security Services

PCI Compliance Top 10 Questions and Answers

How To Protect A Web Application From Attack From A Trusted Environment

The Education Fellowship Finance Centralisation IT Security Strategy

Current IBAT Endorsed Services

IBM Global Technology Services Preemptive security products and services

How To Use Cautela Labs Cloud Agile.Com

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

LOG MANAGEMENT: BEST PRACTICES

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

IndusGuard Web Application Firewall Test Drive User Registration

IBM Internet Security Systems products and services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Firewall Administration and Management

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Managed Security Services for Data

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

A Case for Managed Security

FIRN Secure Internet Bundled Services:

Passing PCI Compliance How to Address the Application Security Mandates

PCI Compliance. Top 10 Questions & Answers

From the Bottom to the Top: The Evolution of Application Monitoring

Cisco SAFE: A Security Reference Architecture

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Injazat s Managed Services Portfolio

Avoiding the Top 5 Vulnerability Management Mistakes

Fortify. Securing Your Entire Software Portfolio

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Securing the Microsoft Cloud

Using Continuous Monitoring Information Technology to Meet Regulatory Compliance. Presenter: Lily Shue Director, Sunera Consulting, LLC

How to use Alertsec to Enable SOX Compliance for Your Customers

Managing Cloud Computing Risk

PDQ Tek. PDQpos.com. 760 Veterans Circle; Warminster, PA

PCI Compliance for Cloud Applications

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Preemptive security solutions for healthcare

CONTINUOUS LOG MANAGEMENT & MONITORING

Improving Web Application Security: The Akamai Approach to WAF

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES. Expert management of infrastructure, network, and application security

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

VENDOR MANAGEMENT. General Overview

Windows XP End-of-Life Handbook for Upgrade Latecomers

Cisco Remote Management Services for Security

PCI Requirements Coverage Summary Table

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

How To Protect Your It Infrastructure

Click to edit Master title style. How To Choose The Right MSSP

Maximizing Your Workforce Management Software In a SaaS Environment

Protecting Your Organisation from Targeted Cyber Intrusion

PCI DSS Requirements - Security Controls and Processes

Conquering PCI DSS Compliance

Akamai Security Products

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Security. Security consulting and Integration: Definition and Deliverables. Introduction

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Web Application Defence. Architecture Paper

End-user Security Analytics Strengthens Protection with ArcSight

PCI Data Security Standards (DSS)

Extreme Networks Security Analytics G2 Vulnerability Manager

Transcription:

Where every interaction matters. Data Sheet: Vigilant Web Application Firewall Security-as-a-Service Fully Managed Solution Continuous Monitoring of Threats

Attacks on websites and web applications are becoming more frequent and more complex. Such attacks pose a serious risk to your business, especially if you need to meet industry or governmental compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS). The solution is to use a web application firewall (WAF). However, to make sure WAFs are effective, you need experts to monitor, tune and manage them on a constant basis, which is tough to implement in-house. Instead, Peer 1 Hosting s Vigilant Web Application Firewall built upon Alert Logic Web Security Manager and ActiveWatch offers a fully managed Security-as-a-Service WAF that provides a powerful yet low-impact approach to web application security. Vigilant WAF provides comprehensive protection without the hefty price tag and maintenance requirements of in-house security solutions. If you host your web applications with us, you ll benefit from the expertise of our security team, who will skilfully handle every aspect of managing the solution, from deployment to everyday maintenance, and have your web application firewall ready for you very quickly. Your business will also benefit from the vigilance of Alert Logic s round-the-clock Security Operations Centre (SOC), which monitors both the solution and the global IT threat landscape every second. Your solution is constantly adjusted to ensure no false positives, as well as to catch legacy and emerging malicious traffic, and to make sure your web applications achieve peak performance and availability. Using our Vigilant WAF you will benefit from: Using our Vigilant WAF you will benefit from: Superior baseline security and protection Reduced management duties Fully managed solution Expert monitoring No software upgrades or end-of-life issues Minimal upfront costs and a highly competitive monthly pricing model Simplest method for complying with PCI DSS Requirement 6.6 Support for other compliance mandates, including the Health Insurance Portability and Accountability Act (HIPAA), and the Federal Information Security Management Act (FISMA) DATA SHEET: VIGILANT WEB APPLICATION FIREWALL 2

Legitimate User Attackers STOP STOP STOP Network Firewal STOP PEER 1 Hosting Client Server Vigilant WAF (Web Application Firewall) DATA SHEET: VIGILANT WEB APPLICATION FIREWALL 3

Features Proactive data and web application security Vigilant WAF protects your web applications by keeping undesirable traffic away from your servers. It provides whitelist and blacklist protection, blocks the top 10 web attacks identified by the Open Web Application Security Project (OWASP) and prevents zero-day attacks, all of which protect both your web infrastructure and your network. Rigorous compliance and reporting Vigilant WAF helps you comply with regulatory mandates, including HIPAA and FISMA. It meets or exceeds the standards of compliance frameworks, particularly PCI DSS, and is the simplest way to comply with Requirement 6.6. All the data you need for compliance is collected and presented in fully customisable reports. Rapid deployment model We can deploy Vigilant WAF in just a few days, after which you can customise policies for advanced protection, add and remove sites and applications and access reports through the Alert Logic portal. Intuitive learning Vigilant WAF compares HTTP and HTTPS traffic to expected and acceptable patterns, and when it detects any irregularities, it blocks the traffic and generates an alert. It will also recommend security policies for you to approve and implement. Virtual patching The signatures of web application attack change constantly, but the traffic pattern stays the same. So Vigilant WAF virtual patching monitors both signatures and patterns, providing the ultimate defence against known exploits and zero-day attacks. Around-the-clock Security Operations Centre Vigilant WAF is monitored and managed all day, every day from Alert Logic s world-class Security Operations Centre. Your firewalls are always being adjusted to ensure and maintain the best possible performance within your particular environment. To help you further, the SOC team can offer advice on best practices, help you with remediation and more. Benefits Reduce costs dramatically By employing our Vigilant WAF you minimise the overall costs of protecting your applications by removing the capital costs and operating expenses associated with running and maintaining a WAF yourself. In addition, your team doesn t have to manage any software upgrades. Upfront costs are low, and there is a set of tiered packages to choose from so that you can get the best price/protection mix for your business. Managed completely The Peer 1 Hosting team works around the clock with the Alert Logic SOC to manage all our clients Vigilant WAFs, including configuration, optimisation, monitoring and updates. Comply easily Vigilant WAF provides all the processes, data and reporting you need to ensure full compliance with all relevant regulations, letting you avoid the consequences of a breach, such as fines, restrictions and even loss of ecommerce trading permissions. DATA SHEET: VIGILANT WEB APPLICATION FIREWALL 4

Benefits (cont d) Deploy rapidly Deploying WAFs often takes ages, especially if you have to train staff. When you add Vigilant WAF to your network infrastructure, you will have fully optimised, perfectly tuned protection in a matter of a few days. FirstCall Promise If you have a problem or need to report an incident, you only need to make one call to Peer 1 Hosting that s our FirstCall Promise. We ll help you with configuration, performance, report generation and more. Options Peer 1 Hosting s Vigilant Web Application Firewall can be licensed in any one of four tiers. Choose according to your required bandwidth speeds get in touch if you would like us to support you in determining which tier is best for you. 100Mbps 250Mbps 500Mbps 1Gbps Order now. 0800 840 7490 / www.peer1hosting.co.uk DATA SHEET: VIGILANT WEB APPLICATION FIREWALL 5