SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Proteja suas Aplicações e esteja
Seguro
Vinicius Miranda, Sales Engineer
WestconGroup, vinicius.miranda@westcon.com
© F5 Networks, Inc 2
• A Importância da Proteção para suas Aplicações;
• Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação?
• Principais Ataques Direcionados para as Aplicações;
• Como a F5 Networks ajuda na Proteção das suas Aplicações?
• Duvidas;
Agenda
A Importância da Proteção para as
Aplicações
© F5 Networks, Inc 4
Business App Security Access
Proteção da Aplicação é igual a Proteção do Negócio?
Vazamento
de Dados
Roubo de
Credencial
Fraude
US$ 81
Milhões
8.695 casos no
Brasil entre
2014/2015 –
PwC 16
© F5 Networks, Inc 5
Como comprovar essa realidade?
Source: Akamai Report
Firewall Tradicional e Firewall de
Aplicação, qual é a Diferença???
© F5 Networks, Inc 7
Vamos entender…
“Next generation” Firewall
Characteristics
• Outbound USER inspection
• Who is doing what?
• “Trusted” users to Internet
Corporate
(users)
Web Application Firewall
Data center
(servers)
Characteristics
• Inbound APPLICATION protection
• Application delivery focus
• “Untrusted” users to data center
© F5 Networks, Inc 8
Ok…mas qual é a diferença entre eles?
Multiprotocol Security 
IP Reputation  
Web Attack Signatures 
Web Vulnerabilities Signatures  
Automatic Policy Learning 
URL, Parameter, Cookie and Form Protection 
Leverage Vulnerability Scan Results 
Principais Ataques Direcionados
para as Aplicações
© F5 Networks, Inc 10
Roubo de Credencial, Vazamento de Dados, Aplicações
Lentas…
SQL
Injection
Cross-Site
Scripting
XSS
Parameter
Tampering
© F5 Networks, Inc 11
Vulnerabilidades nas Aplicações WEB…
7%
2014
40%
2016
Como estar protegido diante deste Cenário?
Como a F5 Networks pode ajudar?
© F5 Networks, Inc 13
The New Perimeter Is An App Perimeter
Apps Are The Gateway to Data!
F5
SS
L
SS
L
SS
L
APP
PER-APP / PER-USER PERIMETER
SSL-visible ✖ ✔
Location-independent ✖ ✔
Session-based ✖ ✔
Continuous trust
verification
✖ ✔
Strategic control points ✖ ✔
App availability ✖ ✔
TRADITIONAL
TRADITIONAL NETWORK PERIMETER
App
© F5 Networks, Inc 14
Let’s talk about Web Application Firewall - WAF
• A Web application firewall protects Web
servers from malicious traffic and blocks
attempts to compromise the system.
• It prevents targeted attacks that include
cross-site scripting, SQL injection, forceful
browsing,cookie poisoning and invalid
input.
• The F5 BIG-IP® Application Security
Manager is a Web application firewall that
uses both positive and negative security
models to identify, isolate and block
sophisticated attacks without impacting
legitimate application transactions. ASM
© F5 Networks, Inc 15
The Value Of F5 Hybrid WAF Protection
Secure response
delivered
Request made
BIG-IP ASM security
policy checked
Server response
generated
Vulnerable
application
• Drop, block or forward request
• Application attack filtering & inspection
• SSL, TCP, HTTP DoS mitigation
Response inspection for errors
and leakage of sensitive
information
BIG-IP ASM security
policy enforced
• #1 Most Effective WAF (NSS Labs)
• 2780 signatures for best protection
• Enable transparent protection from ever-
changing threats
• Reduce risks from vulnerabilities with
dynamic VA/ DAST integrations
• Engage unique BOT detection
(rapid surfing, intervals, event sequence)
• #1 Most Deployed WAF (451 Research)
• 10 of OWASP attacks mitigated with on-box
reporting
• Deploy full-proxy or transparent full-proxy
(bridge mode)
© F5 Networks, Inc 16
Mitigate Attacks Across Flexible Environments
Internet
VIPRION Platform
Devices
Data Center
Load Balancing
+ DDoS Protection
+ Application Security
BIG-IP ASM
• Protect critical apps in the datacenter
• Install on any BIG-IP platform
• Deploy as an add-on to BIG-IPs in use or run it as a
standalone.
Protection in the datacenter
NO APP LEFT UNPROTECTED!
BIG-IP
Virtual Edition
Securing apps in the cloud
BIG-IP ASM VE
• Activate security services
close to apps that have
moved to the cloud
• Accelerate development
and test
Cloud-based app protection
Silverline Web App Firewall
• Fast activation of ASM protections
• Managed service for SaaS and tier 2
applications
• 24x7x365 SOC Support
© F5 Networks, Inc 17
ASM SILVERLINE
WAF
PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
Next Steps
• Visit us online at www.F5.com/security and for more information on F5 security
solutions.
• Contact your F5 solution expert to discuss effective security solutions that
meet specific needs of your organization and those you do business with.
Edifício Berrini Plaza
Rua Samuel Morse, 134 - 10º andar
Brooklin - São Paulo SP
Tel: +55 11 5054.4480
CEP: 04576-060
E-mail: info@cylk.com.br
Proteção da aplicação | Webinar CYLK, Westcon e F5

Mais conteúdo relacionado

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Proteção da aplicação | Webinar CYLK, Westcon e F5

  • 1. Proteja suas Aplicações e esteja Seguro Vinicius Miranda, Sales Engineer WestconGroup, vinicius.miranda@westcon.com
  • 2. © F5 Networks, Inc 2 • A Importância da Proteção para suas Aplicações; • Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação? • Principais Ataques Direcionados para as Aplicações; • Como a F5 Networks ajuda na Proteção das suas Aplicações? • Duvidas; Agenda
  • 3. A Importância da Proteção para as Aplicações
  • 4. © F5 Networks, Inc 4 Business App Security Access Proteção da Aplicação é igual a Proteção do Negócio? Vazamento de Dados Roubo de Credencial Fraude US$ 81 Milhões 8.695 casos no Brasil entre 2014/2015 – PwC 16
  • 5. © F5 Networks, Inc 5 Como comprovar essa realidade? Source: Akamai Report
  • 6. Firewall Tradicional e Firewall de Aplicação, qual é a Diferença???
  • 7. © F5 Networks, Inc 7 Vamos entender… “Next generation” Firewall Characteristics • Outbound USER inspection • Who is doing what? • “Trusted” users to Internet Corporate (users) Web Application Firewall Data center (servers) Characteristics • Inbound APPLICATION protection • Application delivery focus • “Untrusted” users to data center
  • 8. © F5 Networks, Inc 8 Ok…mas qual é a diferença entre eles? Multiprotocol Security  IP Reputation   Web Attack Signatures  Web Vulnerabilities Signatures   Automatic Policy Learning  URL, Parameter, Cookie and Form Protection  Leverage Vulnerability Scan Results 
  • 10. © F5 Networks, Inc 10 Roubo de Credencial, Vazamento de Dados, Aplicações Lentas… SQL Injection Cross-Site Scripting XSS Parameter Tampering
  • 11. © F5 Networks, Inc 11 Vulnerabilidades nas Aplicações WEB… 7% 2014 40% 2016 Como estar protegido diante deste Cenário?
  • 12. Como a F5 Networks pode ajudar?
  • 13. © F5 Networks, Inc 13 The New Perimeter Is An App Perimeter Apps Are The Gateway to Data! F5 SS L SS L SS L APP PER-APP / PER-USER PERIMETER SSL-visible ✖ ✔ Location-independent ✖ ✔ Session-based ✖ ✔ Continuous trust verification ✖ ✔ Strategic control points ✖ ✔ App availability ✖ ✔ TRADITIONAL TRADITIONAL NETWORK PERIMETER App
  • 14. © F5 Networks, Inc 14 Let’s talk about Web Application Firewall - WAF • A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. • It prevents targeted attacks that include cross-site scripting, SQL injection, forceful browsing,cookie poisoning and invalid input. • The F5 BIG-IP® Application Security Manager is a Web application firewall that uses both positive and negative security models to identify, isolate and block sophisticated attacks without impacting legitimate application transactions. ASM
  • 15. © F5 Networks, Inc 15 The Value Of F5 Hybrid WAF Protection Secure response delivered Request made BIG-IP ASM security policy checked Server response generated Vulnerable application • Drop, block or forward request • Application attack filtering & inspection • SSL, TCP, HTTP DoS mitigation Response inspection for errors and leakage of sensitive information BIG-IP ASM security policy enforced • #1 Most Effective WAF (NSS Labs) • 2780 signatures for best protection • Enable transparent protection from ever- changing threats • Reduce risks from vulnerabilities with dynamic VA/ DAST integrations • Engage unique BOT detection (rapid surfing, intervals, event sequence) • #1 Most Deployed WAF (451 Research) • 10 of OWASP attacks mitigated with on-box reporting • Deploy full-proxy or transparent full-proxy (bridge mode)
  • 16. © F5 Networks, Inc 16 Mitigate Attacks Across Flexible Environments Internet VIPRION Platform Devices Data Center Load Balancing + DDoS Protection + Application Security BIG-IP ASM • Protect critical apps in the datacenter • Install on any BIG-IP platform • Deploy as an add-on to BIG-IPs in use or run it as a standalone. Protection in the datacenter NO APP LEFT UNPROTECTED! BIG-IP Virtual Edition Securing apps in the cloud BIG-IP ASM VE • Activate security services close to apps that have moved to the cloud • Accelerate development and test Cloud-based app protection Silverline Web App Firewall • Fast activation of ASM protections • Managed service for SaaS and tier 2 applications • 24x7x365 SOC Support
  • 17. © F5 Networks, Inc 17 ASM SILVERLINE WAF PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
  • 18. Next Steps • Visit us online at www.F5.com/security and for more information on F5 security solutions. • Contact your F5 solution expert to discuss effective security solutions that meet specific needs of your organization and those you do business with. Edifício Berrini Plaza Rua Samuel Morse, 134 - 10º andar Brooklin - São Paulo SP Tel: +55 11 5054.4480 CEP: 04576-060 E-mail: info@cylk.com.br