Application Data Security Stallion Winter Seminar 2009 Otepää, March 06th 2009.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
BalaBit Shell Control Box
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
The Most Analytical and Comprehensive Defense Network in a Box.
This presentation is intended as a detailed WebEx, to bring potential customers to an understanding of Dream Report capabilities. This presentation focuses.
ETrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Sarbanes-Oxley Compliance Process Automation
Barracuda Web Application Firewall
Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer
MIGRATION FROM SCREENOS TO JUNOS based firewall
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Imperva Total Application Security Idan Soen, CISSP Security Engineer SecureSphere – The First Dynamic Profiling Firewall Idan Soen, CISSP Security Engineer.
The Most Analytical and Comprehensive Defense Network in a Box.
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Comprehensive Search Engine Marketing Technology.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Network security Product Group 2 McAfee Network Security Platform.
High Performance Web Accelerator WEB INSIGHT AG Product Introduction March – 2007 MONITORAPP Co.,Ltd.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Optimal Pipeline Using Perforce, Jenkins & Puppet Nitin Pathak Works on
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Oracle’s EPM System and Strategy
Comprehensive Search Engine Marketing Technology February 15, 2007.
Why SIEM – Why Security Intelligence??
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Barracuda NG Firewall ™
Deployment Planning Services
Hybrid Cloud Web Filtering Platform
Web Application Protection Against Hackers and Vulnerabilities
Critical Security Controls
“Introduction to Azure Security Center”
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez
Forefront Security ISA
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer
Healthcare Cloud Security Stack for Microsoft Azure
The MobileIron® Threat Detection difference:
Microsoft Data Insights Summit
Protect data in core business applications
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Application Data Security Stallion Winter Seminar 2009 Otepää, March 06th 2009

- CONFIDENTIAL -2 Agenda  Corporate Overview  Application Data Security  Introduction to Imperva Solutions  Why Customers Select Imperva

- CONFIDENTIAL -3 Why Should You Care? Sources: Privacy Rights Clearinghouse & Ponemon Institute Survey, “The Business Impact of Data Breach” Theft, Abuse, Misuse & Leakage Happen Even in Leading Organizations 85% of organizations have experienced a data breach

- CONFIDENTIAL -4 Why Should You Care? PCI – Required to process credit card transaction SOX – Required to report financial results HIPAA – Required to store Patient Health Data Governing your data is not optional

- CONFIDENTIAL -5 Security and Compliance Requirements  Full Visibility  Who is accessing your data?  Who has accessed your data?  Granular Controls  Who is attacking your data and how?  Is your data leaking outside the organization?  How do you protect your data? Imperva delivers the industry’s most robust and widely deployed solution for addressing the entire application data security lifecycle.

- CONFIDENTIAL -6 Imperva Overview  Founded in 2002  The leader in Application Data Security  Global company with int’l revenue consisting of 40%+  North American HQ in California; International HQ in Israel  Local presence in all major markets (EMEA, APAC, Japan)  Customers in 35 countries  Strong global network of channel partners  Over 700 customers and organizations protected  Shlomo Kramer, CEO & President  SC Magazine 2008 CEO of the Year  One of three founders of Check Point

- CONFIDENTIAL -7 Imperva Application Defense Center  Application Data Security experts  Research the latest threats and compliance best practices  Applications (SAP, Oracle EBS, PHP, Perl, OWA & others)  Databases (Oracle, DB2, SQL-Server & others)  Compliance mandates (SOX, PCI, HIPAA & others)  Deliver actionable, up-to-date content to Imperva customers

- CONFIDENTIAL -8 What is … Application Data Security Users Business Applications Structured Application Data Data Center Database systems are often very complex, combining the core database with a collection of applications…It is not sufficient to protect the database alone, all the associated applications need to be secured. --SANS Top 20 Internet Security Risks of a consensus list of vulnerabilities that require immediate remediation. It is the result of a process that brought 48 leading security experts.

- CONFIDENTIAL -9 Web/Web services Applications Monitoring & Protecting Data Browser DBA Thick Client 2 Tier App Thin Client 3 Tier App Application Interface SQL Data

- CONFIDENTIAL -10 Customer Challenges DATA ACTIVITY MONITORING COMPLIANCE REPORTING DATABASE AUDITING REAL-TIME DATA PROTECTION PCI COMPLIANCE ENTERPRISE APPLICATION SECURITY WEB APPLICATION SECURITY DATABASE SECURITY

- CONFIDENTIAL -11 Introducing SecureSphere  Only complete solution for enterprise data that includes:  Data activity monitoring  Real-time data protection  Full visibility and granular control of data usage  From end user through application and into database  Full stack protection  Unmatched ease-of-use and ease-of-deployment

- CONFIDENTIAL -12 Protection Approaches (WAF)  „Postive“ Security  Protection from unknown threats and vulnerabilities  PROFILING of Applications  „Negative“ Security  Protection from known threats and vulnerabilities  Protocol Validation  Signatures

 Non-Inline Deployment  Reverse Proxy Deployment  Inline Bridge Deployment Flexible Deployment Options  Transparent Inline Bridge  Supports full enforcement  High performance, low latency  Fail-open interfaces  Transparent & Reverse Proxy  High performance for content modification  URL rewriting, cookie signing, SSL termination  Non-inline Deployment  Primarily for monitoring, zero network latency Switch SecureSphere Data Center SecureSphere INTERNET

Imperva SecureSphere Product Line - CONFIDENTIAL -14 ADC Insights Database Monitoring Gateway Database Monitor Agent Management Server (MX) Web Database Internet Database Security Gateway Web Application Firewall

Gateway ModelsG4G8/CrossbeamG16 FTL Throughput500MB/Sec1GB/Sec2GB/Sec Max TPS (HTTP/SQL)16K/50K24K/10036K/200K Recommended Web Servers Form Factor 1U FTL Model: 2U 1U FTL Model: 2U 2U Deployment mode Bridge, Router, Proxy or Monitor Max Inline Bridge Segments222 Max Routing Interfaces555 Management Interfaces111 High Availability Fail Open, IMPVHA, VRRP Fault ToleranceAvailable Yes Imperva SecureSphere Product Line

Graphical Reports  Pre-defined reports  Custom reports  Reports created on demand or ed daily, weekly or monthly  PDF and CSV (Excel) format  Integration with 3 rd party reporting and SIEM tools

Data Leakage Reports  SecureSphere detects credit card and SSNs in Web applications  Reports show:  Data leakage over time  Data leakage by URL  Data leakage by user accessing the data

 Connection pooling (one DB account for many app users) makes it difficult to tell who accessed what data  With native DB logging, companies could track what data was accessed through the application - the Gun  SecureSphere audits SQL transactions by application user  So with SecureSphere, customers can identify the Shooter User Knowledge Tracks Web Users to the Database

Real Time Dashboard

- CONFIDENTIAL -20 Set Policies/Controls Set policies automatically and quickly Keep up with changes Configurable policies and controls based on situation Monitor and Enforce Ensure separation of duties Ensure end user accountability Capture full details Provide security at all layers Alert/block in real-time Measure Built in & custom reports Roll-up & drill down of data Security event analysis Compliance workflow Assess Discover servers and data Test configuration Evaluate inherent risks Assess who uses the data and applications and how Achieving Security & Compliance IMPERVA ADDRESSES THE ENTIRE LIFE CYCLE

- CONFIDENTIAL -21 Integrated End-to-end Coverage Full coverage for all paths to the data. A unified view of access that simplifies management and provides full information to satisfy auditors and forensic investigators Automation & Accuracy Ability to model change to applications, usage patterns and data structures over time. Business Relevant Reporting Highly customizable reporting for specific business applications & regulatory mandates. Performance & Scalability Capacity, availability and ease of management that meets the deployment requirements of complex global companies World Class Customer Service Imperva customers enjoy 24 X 7 X 365 access to a global team of engineers with deep technical expertise and real-world deployment experience. Why Customers Choose Imperva

- CONFIDENTIAL -22 Thank You Imperva 3400 Bridge Parkway, Suite 101, Redwood Shores, CA Sales: