1 / 17

Protecting Customer Websites and Web Applications

Protecting Customer Websites and Web Applications. Web Application Security. The Application Security Market Challenge. Data theft Data leakage Compliance. The Damage. E-payment site breach compromises 5 million customers

klaus
Download Presentation

Protecting Customer Websites and Web Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Customer Websites and Web Applications Web Application Security

  2. The Application SecurityMarket Challenge • Data theft • Data leakage • Compliance

  3. The Damage E-payment site breach compromises 5 million customers Around five million customers of CheckFree Corp. and some banks that use its electronic bill payment service may be affected by a hack that gave criminals control of several of the company's Internet domains. 1/8/2009 Hackers breach Heartland Payment credit card system Heartland Payment Systems disclosed that intruders hacked into the computers it uses to process 100 million payment card transactions per month for 175,000 merchants. 1/22/2009 FAA says info on 45,000 workers stolen in data breach The compromise resulted from an intrusion into the system that was storing the data, the FAA said in a brief statement. 2/10/2009

  4. What Enables Strong Application Security? • Provide active protection • Stop multi-vector attacks • Inspect all requests – even encrypted ones • Read the entire request - headers and content • View the request as the application will • Counter emerging threats

  5. Web Application Firewall (WAF) • Examines user interaction with the application • Performs deep inspection of HTTP traffic content • Blocks harmful requests • Complements network security measures, e.g., firewall, IDS/IPS

  6. Why Security Rules? • Security rules define patterns that indicate hacking • Generic rules based on hacking techniques, not specific applications • Main benefits • Low false-positive rate • Strong security with low maintenance

  7. dotDefender Positioning Software plug-in for IIS and Apache

  8. dotDefender Security Engines

  9. Typical Implementation

  10. Technology Overview • Software plug-in • Multiple security engines • Rule-based • Low maintenance • High efficiency, low impact • Central Management • Open API

  11. dotDefender delivers: • Award-winning Web application security • Solution for a wide customer base - enterprise, SME, SMB, service providers • Support for IIS and Apache • Locks down virtual and cloud environments • Affordable security and compliance • Variety of licensing/pricing models • Best TCO in the industry

  12. Business Drivers • eBusiness • Transactions • Sensitive data • Active content • Compliance – e.g., PCI • Already under attack!

  13. Target Markets • Enterprise • SME • SMB • Service Providers

  14. Opportunities • Reselling • Services • Consulting • Implementation • Integration • Additional touch points

  15. Sample Customer List

  16. Applicure Technologies Jan 2004 Incorporated Apr 2007 IPO TASE: APCR Offices • US Offices: NY & Atlanta • Israel R&D office • Worldwide network of business partners

  17. Provide better security to your clients Add premium security service to your portfolio Gain additional customer touch point Enhance your reputation dotDefender and You Good for your customers’ security… and your bottom line!

More Related