Web Application Firewall Subscription on Cyberoam UTM appliances

Similar documents
The Top 6 WAF Essentials to Achieve Application Security Efficacy

A Security View-point

IPS Signature Database

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Imperva Incapsula Website Security

Shortcut guide to Web application firewall deployment

DenyAll Protect. accelerating. Web Application & Services Firewalls. your applications. DenyAll Protect

Application Signature. Database Release Notes

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Unified Threat Management

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Application Signature Version: Date:9 th Sept, 2016 Application Signature Database Release Notes Version

Solutions Business Manager Web Application Security Assessment

Web Applications Security. Radovan Gibala F5 Networks

Key Considerations in Choosing a Web Application Firewall

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Mitigating Security Breaches in Retail Applications WHITE PAPER

haltdos - Web Application Firewall

White paper. Keys to Oracle application acceleration: advances in delivery systems.

Unified Threat Management

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Copyright

F5 Application Security. Radovan Gibala Field Systems Engineer

Future-ready security for small and mid-size enterprises

Cyberoam. Unified Threat Management. Comprehensive Network Security

Next-Generation Centralized Security Management for MSSPs & Distributed Enterprises

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Excerpts of Web Application Security focusing on Data Validation. adapted for F.I.S.T. 2004, Frankfurt

WHITE PAPER. Best Practices for Web Application Firewall Management

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Kishin Fatnani. Founder & Director K-Secure. Workshop : Application Security: Latest Trends by Cert-In, 30 th Jan, 2009

Security

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

NetDefend Firewall UTM Services

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Application Signature. Database Release Notes Date: 8 th May, 2015

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Safeguarding Cardholder Account Data

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Application Signature

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Unified Threat Management

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.

Pulse Secure Application Delivery

Imperva Incapsula Product Overview

GOING WHERE NO WAFS HAVE GONE BEFORE

RSA SecurID Implementation

Security and PCI Compliance for Retail Point-of-Sale Systems

De-risk Your Applications. SUBSCRIBE TO EVRY S SECURITY TESTING AS A SERVICE (STaaS) TODAY!

Simple and Powerful Security for PCI DSS

DELL SonicWALL Understanding Trend

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

The SonicWALL SSL-VPN Series

Citrix NetScaler AppFirewall and Web App Security Service

How were the Credit Card Numbers Published on the Web? February 19, 2004

Dell SonicWALL Secure Mobile Access 8.5. Web Application Firewall Feature Guide

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Office 365 Buyers Guide: Best Practices for Securing Office 365

Security Course. WebGoat Lab sessions

MWR InfoSecurity Advisory. 26 th April Elastic Path Administrative. Quit. Session Hijacking through Embedded XSS

CoreMax Consulting s Cyber Security Roadmap

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

C1: Define Security Requirements

Comodo Certificate Manager

TIBCO Cloud Integration Security Overview

OWASP TOP OWASP TOP

Web Application Penetration Testing

Business Strategy Theatre

86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013

NGN: Carriers and Vendors Must Take Security Seriously

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Phishing is Yesterday s News Get Ready for Pharming

Herding Cats. Carl Brothers, F5 Field Systems Engineer

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

EasyCrypt passes an independent security audit

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Security Solutions. Overview. Business Needs

Contents. Background. Use Cases. Product Introduction. Product Value

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

IPS Signature Database

Gladiator Incident Alert

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

Securing Your Amazon Web Services Virtual Networks

PT Unified Application Security Enforcement. ptsecurity.com

A (sample) computerized system for publishing the daily currency exchange rates

2 ZyWALL UTM Application Note

SIEMLESS THREAT MANAGEMENT

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

Deploying a Next-Generation IPS Infrastructure

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

SECURING DEVICES IN THE INTERNET OF THINGS

Transcription:

On-Appliance Reporting Web Application Firewall Subscription on Cyberoam UTM appliances Protecting Web Applications from hackers Application Visibility and Control Bandwidth Management Firewall Web Application Firewall Intrusion Prevention System Anti-Virus & Anti-Spyware Web Filtering www.cyberoam.com

Introduction Today, organizations host critical web-based applications like CRM, ERP, inventory management, online banking and E-commerce applications, and more, that serve business information to employees, partners and customers. However, hackers are increasingly exploiting vulnerabilities present in these web-applications to break into organizations IT networks and reach the database server where all corporate data resides. This can result into loss of business and customer data, IPR theft, downtime, and more, leading to loss of reputation, business and customers. Unfortunately, no organization is today left out from web-application attacks, including Governments, banks, retail, manufacturing organizations, and more.? Expensive Best of breed WAF Affordable Cyberoam UTM with WAF subscription With Cyberoam s Web Application Firewall available as a subscription on its UTM appliances, SMBs no longer need to make a choice between the need and luxury of securing their applications using a Web Application Firewall. So far, lack of a simpler and better WAF option deferred their investment in a Web Application Firewall. In enterprises, Cyberoam WAF removes the need of spending a fortune in securing critical web applications by offering the Web Application Firewall subscription at a minimal extra cost, which comes along with a host of other security features of a Unified Threat Management. Cyberoam WAF can be easily deployed in an organization s security infrastructure without requiring any change to existing Web applications. Hacker Cyberoam s Web Application Firewall Cyberoam Web Application Firewall is available as a subscription on Cyberoam UTM appliances. It follows the positive security model based on its Intuitive Website Flow Detector to secure websites and Web-based applications against attacks like SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities. Web User Client /Partner SQL Injection, cookie poisoning, XSS,... Cyberoam Web Application Firewall Web & Application Server Database Server Hacker Cyberoam Web Application Firewall Protection against Web-based Application Attacks Cyberoam Web Application Firewall is deployed to intercept the traffic to and from the web servers to provide an added layer of security against attacks before they can reach the web applications. Its Intuitive Website Flow Detector intelligently self-learns the legitimate behavior and response of web applications. Based on the Intuitive Website Flow Detector, the Web Application Firewall ensures the sanctity of web applications in response to server requests, protecting them against web application attacks. Cyberoam Web Application Firewall looks at every request and response within the HTTP/HTTPS/Web Service layers. It is effective at repelling attacks from a wide range of commercial and open-source automated vulnerability scanners (e.g. Nessus, WebInspect), as well as hand-crafted attacks.

Conforms to HTTP specification? Matches a user-defined policy? Adheres to Intuitive Website Flow Detector? HTTP/HTTPS www.abcretaillogin.com img1.gif HTTP Protocol Specification Intuitive Website Flow Detector Request is legitimate and adheres to the Intuitive Website Flow Detector s selflearning in the past, when such a request was last made to the Web server. User-defined policies The server request was not found valid under the Intuitive Website Flow Detector s knowledge from the past the requested URL cannot be the entry point and it is, hence, blocked from reaching the Web server and the browser receives an HTTP 403 Forbidden response code. No other information is exposed as decided under the User Defined Policy. The request doesn t pass any of the 3 validation steps. Web server is thus protected from present/future URL-based HTTP attacks. Features: Positive protection model without Signature Tables The Cyberoam Web Application Firewall enforces a positive security model through Intuitive Website Flow Detector to automatically identify and block all applicationlayer attacks without relying on signature tables or patternmatching techniques. The Web Application Firewall considers defined Web application behavior as good. Any deviation is considered bad, or malicious, and is blocked accordingly. This provides security against zeroday attacks and eliminates the need to manually populate and update signature tables. The Intuitive Website Flow Detector automatically adapts to changes in the website. Comprehensive business logic protection The Cyberoam WAF protects against attacks like SQL injection,cross-site scripting (XSS),and cookie-poisoning that seek to exploit business logic behind Web applications, ensuring they are used exactly as intended. HTTPS () encryption Offloading Attackers cannot bypass the Cyberoam WAF protection measures through an HTTPS () connection, mostly used in the financial services, healthcare, e-commerce, and other industries that process sensitive data. The WAF not only secures encrypted connections, but also reduces latency of traffic with its offloading capabilities. Instant Web server hardening The Cyberoam WAF instantly shields any Web environment (IIS, Apache, WebSphere, etc.) against the more than 14,000 common server mis-configurations and an ever-expanding universe of known 3rd-party software vulnerabilities. Reverse proxy for incoming HTTP/HTTPS traffic The Cyberoam WAF follows a reverse proxy model for all incoming HTTP and HTTPS traffic which provides an added level of security by virtualizing the application infrastructure. All incoming Web application requests from the Web client terminate at the WAF. Valid requests are submitted to the back-end Web server, hiding the existence and characteristics of originating servers. URL, Cookie, and Form hardening Application-defined URL query string parameters, cookies, and HTML form field values (including hidden fields, radio buttons, checkboxes, and select options) are protected by the Cyberoam WAF. Attempts to escalate user privileges through cookie-poisoning, gain access to other accounts through URL query string parameter tampering, and other types of browser data manipulation are automatically identified and blocked. Monitoring and reporting Cyberoam Web Application Firewall provides alerts and logs that help organizations with information on types of attacks, source of attacks, action taken on them, and more that help comply with the PCI DSS requirements. Additional Features: Block/alert known bad IP addresses Customizable user messages for blocked requests Rate-based connection safeguards

Business Benefits Offers instant protection without requiring changes to existing Web applications when deployed. Prevents intruders from manipulating web content Protects data inside the organization from being hacked by exploiting Web application vulnerabilities Secures corporate brands, trade secrets, and Intellectual Property Maintains customer confidence in your website s security, especially for banks, e-commerce, and more. Ensures sensitive information about the environment doesn t go out to hackers by sending customizable error messages to users. Easy to use with no special training required for administrators Low maintenance as it automatically adapts to website / web-application changes Promotes integrity and availability of Web applications Helps comply with mandatory PCI requirements WAF subscription available on following Cyberoam UTM Appliances : Cyberoam NG series Appliances : CR25iNG, CR25wiNG, CR25iNG-6P, CR25wiNG-6P, CR35iNG, CR35wiNG, CR50iNG, CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG, CR300iNG-XP, CR2500iNG Cyberoam ia series Appliances : CR50ia, CR100ia, CR200i, CR300i, CR500ia, CR750ia, CR1000ia, CR1500ia sales@cyberoam.com www.cyberoam.com Awards & Certifications www.check-mark.com Basic AES Portal Exchange Firefox JavaScript Basic Advanced BEST BUY PC PRO RECOMMENDED EDITOR S C H O I C E www.itpro.co.uk RECOMMENDS 2008 - Emerging Vendor of the Year Techno Visionaries IT Leader Cyberoam Technologies 505 Thornall Street, Suite # 304, Edison, New Jersey 08837, USA, Tel: 201-301-2851 India 901, Silicon Tower, Behind Pariseema Building, Off, C.G.Road, Ahmedabad 380 006, INDIA, Tel: +91-79-66065606 Toll Free Numbers USA : +1-800-686-2360 India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 Europe : +44-808-120-3958 Registered Trademark of Cyberoam Technologies

Business Benefits Offers instant protection without requiring changes to existing Web applications when deployed. Prevents intruders from manipulating web content Protects data inside the organization from being hacked by exploiting Web application vulnerabilities Secures corporate brands, trade secrets, and Intellectual Property Maintains customer confidence in your website s security, especially for banks, e-commerce, and more. Ensures sensitive information about the environment doesn t go out to hackers by sending customizable error messages to users. Easy to use with no special training required for administrators Low maintenance as it automatically adapts to website / web-application changes Promotes integrity and availability of Web applications Helps comply with mandatory PCI requirements WAF subscription available on following Cyberoam UTM Appliances : Cyberoam NG series Appliances : CR25iNG, CR25wiNG, CR25iNG-6P, CR25wiNG-6P, CR35iNG, CR35wiNG, CR50iNG, CR100iNG, CR200iNG, CR200iNG-XP, CR300iNG, CR300iNG-XP, CR2500iNG Cyberoam ia series Appliances : CR50ia, CR100ia, CR200i, CR300i, CR500ia, CR750ia, CR1000ia, CR1500ia sales@cyberoam.com www.cyberoam.com Awards & Certifications www.check-mark.com Basic AES Portal Exchange Firefox JavaScript Basic Advanced BEST BUY PC PRO RECOMMENDED EDITOR S C H O I C E www.itpro.co.uk RECOMMENDS 2008 - Emerging Vendor of the Year Techno Visionaries IT Leader Cyberoam Technologies 505 Thornall Street, Suite # 304, Edison, New Jersey 08837, USA, Tel: 201-301-2851 India 901, Silicon Tower, Behind Pariseema Building, Off, C.G.Road, Ahmedabad 380 006, INDIA, Tel: +91-79-66065606 Toll Free Numbers USA : +1-800-686-2360 India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 Europe : +44-808-120-3958 Registered Trademark of Cyberoam Technologies Pvt. Ltd.