Beyond PCI-DSS Gautam Aggarwal Barracuda Web Application Firewall

Slides:



Advertisements
Similar presentations
Enabling business beyond the corporate network.
Advertisements

Solutions & Services to ‘Multiply your Business Performance’ 2013.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
Lisa Farmer, Cedo Vicente, Eric Ahlm
1 Web 2.0 in a Virtualized World: Building an Architecture for Growth Presented by: Lori MacVittie Technical Marketing Manager, Application Services.
Blue Coat: Your partner to sales success Nigel Hawthorn VP EMEA Marketing
Citrix Partner Update The Citrix Delivery Centre.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
MIGRATION FROM SCREENOS TO JUNOS based firewall
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
CONFIDENTIAL & PROPRIETARY 1 WAF and Identity and Access Management Integration The Next Step in the Evolution of Application Security Best Practices Jan.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureSurf Protect your users when surfing the Internet.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Fortinet An Introduction
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Akamai Technologies - Overview RSA ® Conference 2013.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Deconstructing API Security
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Kona Security Solutions - Overview
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Microsoft TMG End of Life. Who is Barracuda? Barracuda Networks Established: 2003 Headquarter: Campell, CA Employees: Customers: Market:
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
V2 January © 2015 Citrix | Confidential – Content in this presentation is under NDA. NetScaler Pitch Deck One solution for all apps.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Small Business Solutions Copyright 2014 Trend Micro Inc.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Global Hardware Encryption Market Risk Analysis, Competitor Analysis, Choice Modelling, Trends and Forecast by 2022 Phone No.: +1 (214)
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Accelerating Your Journey to a Safe Cloud
Efficient and Secure Application Delivery
Grow Your Business with the Security Leader
Web Content Security Unlock the Power of the Web
Barracuda Load Balancer ADC
Barracuda Web Security Flex
Web Application Protection Against Hackers and Vulnerabilities
Grow Your Business with the Security Leader
Securing Your Web Application in Azure with a WAF
AT&T Premises-Based Firewall Enhanced SBS Solution
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Customized Solutions to your needs
Securing the Network Perimeter with ISA 2004
Veeam Backup Repository
Virtual Private Network (VPN) Market
AKAMAI INTELLIGENT PLATFORM™
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Check Point Connectra NGX R60
F5 Networks Solutions Silverline Silverline
Presentation transcript:

Beyond PCI-DSS Gautam Aggarwal Barracuda Web Application Firewall Vice President, Product Marketing

Barracuda Networks Corporate Overview Business Focus Network Security, Content Security, Application Delivery and Data Protection solutions Appliance, Virtual Appliance and Cloud delivery Volume sales to midmarket; strategic sales to enterprise Market Leadership More than 150,000 corporate subscribers Distribution in over 80 countries worldwide Content security appliance volume leader (IDC) Strategic wins in Web application firewall, next generation firewall and cloud Web security lines Corporate Basics Over 800 employees worldwide Headquarters in Silicon Valley – Campbell, CA Investment by Sequoia Capital and Francisco Partners Rapid top-line profitable growth and strong cash flow

Banking Financial Services & Insurance (BFSI) Application Security Heritage Application security focused since 1999 (as part of Netcontinuum) Web Application Security Magic Quadrant “Visionary” since 2003 Currently in Gartner’s ADC Magic Quadrant 2010 Large Financial Services Footprint JP Morgan, UBS, Morgan Stanley, HSBC, RBS, Citibank, and many other multinational banks 300+ Retail Banking & Financial customers in N. America alone Extensive India Experience BFSI: Aviva Life Insurance, Dhanlakshmi Bank, Bharat Bank, Andra Bank, Murugappa Group, Axis Bank Other: NIC, Brahmos, AICTE, Hyundai, Tirupathi Temple and many more Worldwide WAF center of excellence in Bengaluru

The Perfect Cyber Crime Infect Users Attack Applications Destroy Data

Attacks Can Be Launched From Anywhere Lots of Botnets that can launch attacks from anywhere. Attacks can be launched anywhere from zombie computers (aka botnets). Heat map of a 24 hour sampling period infected computers. Source: The Economist, July, 2010

Application Security Trends in APAC Mobile device adoption accelerating migration to web Proliferation of smartphones & tablets have forced enterprise to migrate faster to web However enterprises are focusing on functionality and time-to-market but not security Increased application layer attacks have forced enterprises to rethink security 47% of worldwide attack traffic originate from Asia.1 India, China, Indonesia, Myammar, & Taiwan are all in the Top 10. 1 SQL Injection & Cross-Site Scripting (XSS) are consistently the top attack methodologies APAC enterprises are responding by adopting WAFs APAC saw a growth of 22.6% Growth YoY in 2011.2 Japan, S. Korea have the highest market share of WAF. 2 China & ANZ have the fastest WAF growth rate. 2 India is starting to adopt WAF technology, particularly in BFSI industries Akamai 2011 State of the Internet Report Frost & Sullivan WAF Market analysis Source: 1. Akamai State of the Internet 2011 2. Frost & Sullivan WAF Market Analysis

Barracuda Enables PCI-DSS Compliance Requirement Barracuda Networks 1- Install a Firewall Provides secure Application Firewall 3 - Protect Cardholder data Proxies Web traffic and insulates Web servers from direct access by attackers 4 - Encryption Provides easy SSL/TLS encryption even if the application does not use encryption 6 – Secure systems & applications Blocks known and zero-day attacks as well OWASP Top-10 application vulnerabilities 7 - Restrict Access Provides granular role-based administration 10 - Track and Monitor Access Logs and reports all application access and security violations 11 – Regularly test systems Integration with code scanners automate testing and tuning ICSA Labs tested & certified for PCI-DSS compliance FIPS 140-2 Certified Crypto Hardware

Reverse Proxy a Must for BFSI NO Non-proxy WAFs expose server operating systems and TCP stacks directly to the Internet YES Proxy-based WAFs are more secure: Traffic Rewrite – Non-proxies cannot control and re-write traffic Cloaking – Non-proxies do not Cloak SSL – Non-proxies’ SSL is VERY slow Cookie security – Non-proxies do not protect against ID theft Botnet Protection – Non-proxies do not protect against DoS Authentication and Authorization – Non-proxies cannot do AAA Data Theft Protection – Non-proxies cannot mask outbound data Response time acceleration – Non-proxies cannot accelerate

Solution: Layer 7 Web Application Firewall Inbound inspection for Layer 7 attacks Outbound inspection to protect against data theft Servers Barracuda Web Application Firewall Based on reverse proxy technology Has bi-directional content inspection and security As a reverse proxy, it can load balance and accelerate application delivery

Attack Protection & Data Loss Prevention SQL Injection XSS injection CSRF Command injection Data theft protection Credit Card, Aadhaar (UID), custom patterns Web site cloaking Integrated anti-virus Session protection Cookie encryption Parameter tampering protection Brute Force Protection DoS Protection IP Reputation Blocking Blocking by Geo IP Anonymous Proxy Blocking XML Firewall XML-based attacks XML Schema enforcement Web Services security SIEM Integration Armored Browser Integration

Integration with Mobility Solutions Armored Browser Extends protection to the client Enforce server access only by armored browser Prevents Man-in-the-Browser (MITB) attacks Barracuda Safe Browser (BSB) Outbound Content Security for mobile devices Same level of security on or off network Prevents infections on mobile phones and laptops that can lead to Man-in-the-Browser (MITB) attacks

Consolidate Disparate Appliances in the DMZ Perimeter Access Control Load Balancing SSL Accelerators Caching Reverse Proxy Web Application Firewalls Security Delivered as Hardware or VM Servers Reduces Management Complexity Decreases Risk of Security Misconfiguration 12

Barracuda Content Security Solutions Mobile Worker Content Security Allow Cloud Filtering Content Filtering Application Control User Control Malware Protection Headquarters Control Hardware Appliance Branch Offices Archive Block Virtual Appliance 13

Barracuda NG Firewall Application Aware Network Firewall Intelligent WAN Optimization Industry leading central management