Imperva Incapsula Website Security

Similar documents
SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Imperva Incapsula Product Overview

SOLUTION BRIEF FPO. Imperva Simplifies and Automates PCI DSS Compliance

Imperva Incapsula Load Balancer

Imperva CounterBreach

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

SIEM Solutions from McAfee

Integrated Web Application Firewall (WAF) & Distributed Denial Of Service (DDoS) Mitigation For Today s Enterprises

WHITE PAPER. Best Practices for Web Application Firewall Management

Security

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Beyond Blind Defense: Gaining Insights from Proactive App Sec

CloudSOC and Security.cloud for Microsoft Office 365

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

TRUE SECURITY-AS-A-SERVICE

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Securing Your Microsoft Azure Virtual Networks

Data Privacy and Protection GDPR Compliance for Databases

haltdos - Web Application Firewall

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

McAfee Embedded Control

E-BOOK. Healthcare Cyber Security and Compliance Guide

Technical Brochure F-SECURE THREAT SHIELD

SIEMLESS THREAT MANAGEMENT

AKAMAI CLOUD SECURITY SOLUTIONS

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

McAfee epolicy Orchestrator

Sustainable Security Operations

Compare Security Analytics Solutions

SIEM: Five Requirements that Solve the Bigger Business Issues

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Continuously Discover and Eliminate Security Risk in Production Apps

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Brochure. Security. Fortify on Demand Dynamic Application Security Testing

Securing Your Amazon Web Services Virtual Networks

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

securing your network perimeter with SIEM

Defend Against the Unknown

BIG-IP Application Security Manager : Implementations. Version 13.0

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Global DDoS Threat Landscape

with Advanced Protection

CA Security Management

May the (IBM) X-Force Be With You

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Configuring BIG-IP ASM v12.1 Application Security Manager

Vulnerability Assessment with Application Security

The Top 6 WAF Essentials to Achieve Application Security Efficacy

epldt Web Builder Security March 2017

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

SECURITY PRACTICES OVERVIEW

Office 365 Buyers Guide: Best Practices for Securing Office 365

Audience. Overview. Enterprise Protection Platform for PCI DSS & HIPAA Compliance

Incapsula Guide to Selecting a DDoS Solution WHITE PAPER

Un SOC avanzato per una efficace risposta al cybercrime

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

A10 HARMONY CONTROLLER

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

How to Secure Your Cloud with...a Cloud?

RSA Web Threat Detection

Web Application Firewall Subscription on Cyberoam UTM appliances

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Comprehensive datacenter protection

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Transforming Security from Defense in Depth to Comprehensive Security Assurance

NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING

Security by Default: Enabling Transformation Through Cyber Resilience

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Best Practices in Securing a Multicloud World

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Snort: The World s Most Widely Deployed IPS Technology

IBM Security Guardium Analyzer

Kaspersky Security Network

Table of Content Security Trend

Gladiator Incident Alert

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

SecureSphere Web Application Firewall Test Drive

SIEMLESS THREAT DETECTION FOR AWS

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Product Guide. McAfee Web Gateway Cloud Service

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

locuz.com SOC Services

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

86% of websites has at least 1 vulnerability and an average of 56 per website WhiteHat Security Statistics Report 2013

BUILDING AND MAINTAINING SOC

Automating the Top 20 CIS Critical Security Controls

Transcription:

Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as strong two-factor authentication and bot access control. An advanced client classification engine analyzes all incoming traffic to your site, preventing access by malicious and unwanted visitors. Complementing the WAF s built-in security capabilities, Incapsula provides easy-to-use tools that enable enterprises to build custom security rules tailored to their specific requirements. What You Get Best-in-class, PCI-certified web application firewall Custom rules tailored to your enterprise s security policy and use cases Two-factor authentication for website access Advanced client classification engine that analyzes all incoming traffic Easy-to-use API for integration with backend systems Access Control Bot Mitigation Web Application Firewall Two-Factor Authentication Web Application 1

Why Incapsula? Cloud-based, big data approach leverages customer base for 360-degree visibility into attack landscape Proven against hundreds of penetration tests and millions of attacks every day Dedicated security research team monitors, tunes, and updates the service to ensure protection against new and emerging threats Decades of security experience and best practices, leveraging Imperva s market-leading WAF technology Activated by simple DNS change no hardware or software installation, integration, or changes to the website Cloud-Based, Big Data Security Approach A cloud-based approach enables us to harness real data from our customer base to better understand the global attack landscape and continually improve our security. Sandboxing lets us silently test new features on real websites before their launch. Servicing thousands of customers and subjected to hundreds of penetration tests and millions of attacks every day, Incapsula is aligned to meet the most stringent security criteria. Using crowdsourcing techniques, Incapsula protects your website with collective knowledge about the current threat landscape. Threat information is aggregated across the entire Incapsula community using big data analytics. This data is used to identify new attacks and new attack sources. We then use this data to develop new signatures that are deployed across our network. Web Application Firewall (WAF) Industry Leading WAF Technology Incapsula offers a cloud-based WAF that ensures that your website or application is always protected against any type of application layer hacking attempt. Based on Imperva s industry-leading WAF technology and experience, our WAF defends against all OWASP Top 10 threats including: SQL injection, cross-site scripting, illegal resource access, and remote file inclusion. Security experts behind Incapsula ensure optimum protection against newly discovered vulnerabilities to prevent disruption to your application and improve website performance. Proactive Remediation The Incapsula security team monitors hackers activities and zero-day exploits to make sure that websites and applications using our service are protected. Using a exclusive database of all common website stacks, content management systems, and e-commerce solutions, Incapsula applies dedicated security rules to proactively remediate known vulnerabilities from these sources. Incapsula delivers protection against newly discovered vulnerabilities to prevent disruption to your application and improve website performance. 2

PCI Certification and Reporting Our WAF is certified by the PCI Security Standards Council. It protects you from liabilities and non-compliance penalties, while protecting your customers sensitive data from exposure on your site. The Incapsula PCI compliance report audits security rule configuration changes and periodically reports on your compliance with PCI 6.6 requirements. Rich real-time reporting capabilities enable organizations to easily understand security status and meet regulatory compliance. Blacklisting Prevention Legitimate websites are vulnerable to being added to the malware blacklists of security software firms, search engines, and browser vendors on a daily basis due to application vulnerabilities. In this scenario, customers and partners cannot access your website and your business is effectively shut down. The WAF enables you to close vulnerability gaps in your applications to avoid blacklisting and ensure your website is always accessible. Custom Security Rules Custom security rules allow each enterprise to enforce its security policy in an optimal manner within the Incapsula Website Security service. A simple-to-use GUI lets you configure custom security rules to meet your organization s particular needs. Custom security rules enhance our best-in-class web application security capabilities by giving you the capability, for example, to tighten security policies around sensitive areas or to generate alerts for specific events that require investigation. Not only do these rules improve security, they also help to eliminate false-positives by taking into account specific user behavior anomalies. 3

Both technical and non-technical users can define custom rules using an intuitive GUI rule builder of a syntax text editor. Rule actions may include alert, block request, block session or block IP or request CAPTCHA, JavaScript or cookie. Rule triggers are based on multiple filters such as URL, client type and user agent. Examples of custom rule triggers: (ClientType == Browser Referrer contains google.com) (User-Agent contains googlebot & CaptchaState == Failed ClientIP == 120.0.0.1). Bot Mitigation More than 95% of all website attacks are carried out by malicious bots. Using advanced client classification, crowdsourcing, and reputation-based techniques, Incapsula distinguishes between good and bad bot traffic. This lets you block known bad or suspicious bot activity such as comment spam, scraping, and vulnerability scanning, while making sure that legitimate bots such as Google, Facebook, and Pingdom can freely access your website. In addition to the improved security, blocking malicious bots also improves website performance, because they can account for up to 50% of all website traffic. Two-Factor Authentication Incapsula lets you implement strong two-factor authentication on any website or application without integration, coding, or software changes. Single-click activation lets you instantly protect administrative access, secure remote access to corporate web applications, and restrict access to a particular web page. Two-Factor Authentication manages and controls multiple logins across several websites in a centralized manner. Two-factor authentication is supported using either email, SMS, or Google Authenticator. 4

Traffic Monitoring and Analytics In-Depth Threat Reporting and Analysis Alerts can be easily searched, sorted, and directly linked to corresponding security rules. Incapsula s monitoring and reporting framework provides instant visibility into security, compliance, and content delivery concerns. A dashboard provides a high-level view of system status and security events. Incapsula provides customers with a detailed analysis of every threat posed to your website including: IP address, user agent, location, and other pertinent session information. Weekly graphical reports visualize trends in website traffic, threats, and performance improvements. Real-Time Statistics A real-time statistics dashboard enables users to get instant access to live information about their website s traffic and performance. This premium feature allows rapid response to security events and supports real-time, data driven decision-making. In the case of a DDoS attack, for instance, live traffic statistics enable your security team to quickly identify abnormal activity patterns of bot and human visitors. Premium Service Support Managed Service Incapsula offers a managed service option, allowing organizations to free up IT resources for other business-critical tasks. Based on a dedicated team of security experts and support engineers, our fully-managed service provides you with the highest level of security and performance around the clock. Incapsula provides organizations with continuous website health monitoring, as well as email threat alerts, proactive security event management, policy tuning and configuration management, and weekly reporting. A 24 7 NOC performs ongoing security monitoring and ensures that you are always protected against DDoS attacks, as well as other new and emerging threats. Managed service customers are assigned a personal account manager who acts as a single point of contact for all your website security and performance needs. 5

API for Provisioning, Management, and Events Our product experts understand the world of enterprise web applications and work closely with IT teams to address their specific integration and customization requirements. The Incapsula API is designed for easy integration with your backend systems, enabling streamlined customer provisioning and account management. Plug-and-Play SIEM Integration To enhance your existing security solutions and workflow, Incapsula supports leading SIEM solutions including HP ArcSight, Splunk, McAfee, IBM QRadar and Graylog. In addition to near real-time event reporting and strong data encryption, SIEM integration features pre-built custom and reports. 2016, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula, Skyfence, CounterBreach and ThreatRadar are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders. imperva.com 6