protecting the data that drive business l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Protecting the Data that Drive Business PowerPoint Presentation
Download Presentation
Protecting the Data that Drive Business

Loading in 2 Seconds...

play fullscreen
1 / 18

Protecting the Data that Drive Business - PowerPoint PPT Presentation


  • 90 Views
  • Uploaded on

Protecting the Data that Drive Business. Chris Gale Partner Director EMEA Chris.gale@imperva.com. Almost Twenty Years Ago Today. Fleischmann & Pons ‘Cold fusion’. Tim Berners-Lee ‘Distributed hypertext system’. ONLINE STORE. POS TERMINALS (CASH REGISTER). IN-STORE SERVER. HQ SERVER.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Protecting the Data that Drive Business' - kenley


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
protecting the data that drive business

Protecting the Data that Drive Business

Chris Gale

Partner Director EMEA

Chris.gale@imperva.com

almost twenty years ago today
Almost Twenty Years Ago Today...

Fleischmann & Pons

‘Cold fusion’

Tim Berners-Lee

‘Distributed hypertext system’

today s business application data flow

ONLINE STORE

POS TERMINALS (CASH REGISTER)

IN-STORE SERVER

HQ SERVER

STAGING SERVER

TRANSACTION DATABASES

Today’s Business Application Data Flow

TRANSACTION INFOTO ACQUIRING BANK

AUTHORIZATION FROM ACQUIRING BANK

PHYSICAL STORE

CORPORATE HEADQUARTERS

INTERNAL CORPORATE SYSTEMS

DATABASES

CONFIDENTIAL - Imperva

business application data security challenge

Thin Client

3 Tier App

Application

Interface

Thick Client

2 Tier App

DBA

Data

SQL

Applications

Web/Web services

Browser

Business Application Data Security Challenge
  • Database systems are often very complex, combining the core database with a collection of applications…It is not sufficient to protect the database alone, all the associated applications need to be secured.
  • --SANS Top 20 Internet Security Risks of 2007

CONFIDENTIAL - Imperva

why should you care
Why Should You Care?

85% of organizations have experienced a data breach

Theft, Abuse, Misuse & LeakageHappen Even in Leading Organizations

Sources: Privacy Rights Clearinghouse & Ponemon Institute Survey, “The Business Impact of Data Breach”

CONFIDENTIAL - Imperva

why should you care6
Why Should You Care?

Data governance is not optional

PCI– Required to process credit card transaction

SOX – Required to report financial results

EU DD Privacy – Required to process personal data

What do regulations require of you?

CONFIDENTIAL - Imperva

new web 2 0 old threats new
New Web 2.0 – Old Threats & New
  • 92% of Web applications have vulnerabilities
    • 93% of vulnerable sites are still vulnerable after code fixes!!
  • SQL Injection – still majority cause of data leakage
    • Ponemon estimates breaches cost on average $202 per compromised record
    • April 08: automated SQL injection affects 500k IIS webpages
    • July 08: Asprox ‘infects’ reputable sites including NHS
  • Exploiting server’s trust in the client (versus XSS)
    • Cross Site Request Forgery (CSRF) & JS-Hijacking (AJAX)
    • Growing cause of web fraud
worrying threat trends in 2008
Worrying Threat Trends in 2008
  • Majority of malware now ‘cloaked’ in Web protocols
    • Both exploits and Command & Control
    • HTTP poorly monitored – traffic volume, SSL & difficult to block
  • Indirect attacks exploiting ‘trusted’ websites for malware distribution
    • Implicitly trusted by the user – ‘Drive-by’ downloads
    • Sophos reported 1 webpage ‘infected’ every 5secs during 2008
  • ‘Google Hacking’ & ‘Web worms’ – search-engine seeded attacks & data breach discovery
    • Concept first analyzed in March 2004 ADC paper: “Web Application Worms: Myth or Reality?”
can existing controls help
Can Existing Controls Help?
  • Traditional firewalls only detect network attacks
    • Only inspect IP address, port/service number
  • IPS/IDS signatures only detect known threats
    • No application understanding
    • No user/session tracking
    • High rate of false positives/negatives
    • No protection of SSL traffic

Zero DayWorm

Cookie Injection

XSS Attack

Hacker

Data Center

INTERNET

Web Servers

IPS or Deep Inspection firewall

Firewall

User

CONFIDENTIAL - Imperva

slide10
Founded in 2002
  • CEO Shlomo Kramer – CEO of the Year, co-founder of Check Point
  • The leader in Data Security
  • Global company with over 40% international revenue
    • North American HQ in California; International HQ in Israel
    • Local presence in all major markets (EMEA, APAC, Japan)
    • Customers in 35+ countries
  • Over 700 customers and 4500+ organizations protected

CONFIDENTIAL - Imperva

imperva application defence centre
Imperva Application Defence Centre
  • Business application Data Security experts
    • Research the latest threats and compliance best practices
      • Applications (SAP, Oracle EBS, PeopleSoft & others)
      • Databases (Oracle, DB2, SQL-Server & others)
      • Compliance mandates (SOX, PCI, HIPAA & others)
    • Deliver actionable, up-to-date content to Imperva customers

- CONFIDENTIAL -

securesphere data security suite
SecureSphere Data Security Suite
  • Data Security Suite
    • Full Visibility and Control
  • Web Application Firewall
    • Security for Web Applications

SecureSphere Management

  • Database Firewall
    • Auditing & Protection for
    • Databases

Discovery

Assessment

Audit / Monitor

Tracking

Enforcement

  • Database Activity Monitoring
    • Visibility into Database Usage
  • Discovery and Assessment Server
    • Discovery and Assessment for
    • Databases

SecureSphere Platform

  • Modular SecureSphere 7.0
    • Packaged for Specific Use Cases

- CONFIDENTIAL -

securesphere architecture
SecureSphere Architecture

Database Monitor Agent

Management Server (MX)

Database

ADC Insights

Database

Firewall

Web Application Firewall

Web

Database Activity Monitoring

Discovery & Assessment Server

Internet

CONFIDENTIAL - Imperva

securesphere universal user tracking who is really accessing data

alex@imperva.com

Webapp.company.com

No real user Knowledge

alex@imperva.com

alex@imperva.com

End-to-end real userKnowledge

alex@imperva.com

Webapp.company.com

SELECT … WHERE

ID = ‘alex@imperva.com’

SELECT … WHERE

ID = ‘alex@imperva.com’

End-to-end real userKnowledge

Limited real user Knowledge

SecureSphere Universal User TrackingWho Is Really Accessing Data?

Shared & dedicated DB user connections

  • End-to-end visibility of the real application user
    • ‘Pooled’ application user accounts
    • No re-writing of application or database code
  • Web to DB User Tracking
  • SQL Connection User Tracking

CONFIDENTIAL - Imperva

best practice data security recommendations
Best Practice Data Security Recommendations
  • Locate & classify sensitive data
  • Regularly test for vulnerabilities
    • Buy time, mitigate critical risks with WAF & DB firewalls
    • If possible, remediate by fixing the code
  • Protect critical web applications
    • Deploy WAF to prevent data breach
    • Audit access by actual application users – not ‘pooled’ accounts
  • Monitor sensitive data stores
    • Use DAM for visibility
    • Privileged users (DBAs)
    • Consider protecting access to most sensitive data with DB firewalls
pci dss compliance securesphere
PCI DSS Compliance & SecureSphere

6.6Application layer firewall or external code review

SecureSphere WAF: Cost-effective, non-intrusive threat mitigation

10Track and monitor all access to cardholder data

SecureSphere DAM: SQL auditing, tamper-proof, separation of duty

3.4Compensating controls for protecting stored cardholder data

SecureSphere DB Firewall: Prevents unauthorised access to card holder data

imperva the leader in data security
Imperva The Leader in Data Security
  • Only complete solution for visibility and control over business data
  • Dynamic Profiling & Universal User Tracking
  • Consistent industry recognition of technical superiority
  • Veteran leadership with deep industry expertise
  • Industry veterans in security
  • ADC - only research team dedicated to business application data security
  • More application data security deployments than any other vendor
  • Over 700 direct customers
  • 54 Fortune 1000
  • 86 Global 2000
  • Over 4500 protected organizations
  • Consistent growth fueled by
  • Surge in data breaches
  • Regulatory compliancerequirements
  • Tightening Data Security legislation

CONFIDENTIAL - Imperva

thank you

Thank You

www.imperva.com