SlideShare uma empresa Scribd logo
1 de 14
Introducing DASP
          version 4.1
                         New Products                              This event will start
                                                                      at 9am CEST,
                           Sept 26, 2012                         thanks for your patience




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012    1
                                                                                            1
Hello !




                     Renaud Bidou                                      Stéphane de Saint Albin
                         CTO                                                   CMO



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012         2
                                                                                                 2
Logistics

           • Goal of this webinar:
             to give you an overview of the
             latest and greatest product
             news… in 60 minutes!

           • How it works
              – You’re muted…
              – … but please ask any questions
                using the chat tool
              – We’ll take a few minutes at the
                end to answer them




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   3
                                                                                           3
About DenyAll

       Securing & accelerating your applications
       Priority #1: filtering incoming Web traffic
          – No other way to effectively protect your IT
            infrastructure against application-layer attacks
       Priority #2: reducing the attack surface
          – Proactively managing vulnerabilities, making it
            harder for hackers, is smart/good practice



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   4
                                                                                           4
DenyAll Product Line

                                                                                • Auditor
                                                                                • Vulnerability Manager
                                                                                • Edge Tester



                                                      Detect
  • Management                                                                             •   sProxy
    Console                                                                                •   rXML
  • Application                                                                            •   rWeb
    Security                                                                               •   rWeb + Client
    Dashboard                                                                                  Shield

                                    Manage                              Protect
Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012                       5
                                                                                                               5
Agenda

       1.      Version 4.1 design goals
       2.      Operational efficiency
       3.      New security engines
       4.      Secure Transparent Mode
       5.      More to come
       6.      Conclusion and next steps



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   6
                                                                                           6
Version 4.1
          Design Goals




Securing & Accelerating Your Applications   3/19/2013 3/19/2013 All © 2012
                                               3/19/2013   Deny          Deny All © 2012   Deny All © 2012   7
                                                                                                             7
A Proven Platform

                                                                  Reverse Proxy


                                                                Standard          Advanced
                       High                 Application                                          XML        User
                                                                Web App           Web App
                    Availability            Acceleration                                        Security   Security
    Protect                                                     Security           Security



       • Time tested, reverse proxy-based architecture for
         maximum security
          – protocol break, infrastructure masking, deep inspection
       • Modular group of features, assembled in packaged
         products to meet specific needs
          – sProxy, rXML, rWeb
          – License key-enabled upgrade paths

Securing & Accelerating Your Applications        3/19/2013
                                                    3/19/2013   Deny All © 2012
                                                                              Deny All © 2012                         8
                                                                                                                      8
+10 Years of Innovation

                                                                    Reverse Proxy


                                                                  Standard          Advanced
                       High                 Application                                                 XML           User
                                                                  Web App           Web App
                    Availability            Acceleration                                               Security      Security
    Protect                                                       Security           Security



   Distributivity            Caching              Deep Inspection            White List           Model Validation   Client Certificates

                                                                                                                          User
  Active-Passive           Compression            Transformation              Stateful            XML Validation      Authentication

                                                                           User Behavior                              SSO integration
   Active-Active         TCP Multiplexing           Black List                                    Transformation
                                                                             Tracking
                                                                                                                     Cookie Tracking
                          SSL Offloading           Scoring List             Client Shield            Black List

                           Server Load-
                                                                                                      Stateful
                            Balancing
                                                                                                      SOAP
                                                                                                   Attachments

                                                                                                       ACL


Securing & Accelerating Your Applications        3/19/2013
                                                    3/19/2013     Deny All © 2012
                                                                                Deny All © 2012                                         9
                                                                                                                                        9
R&D Goals & Priorities

       1. Improve Operational Efficiency
          – Usability & Manageability
          – IT Infrastructure Integration
          – Application Security Intelligence
          – Virtual Patching
       2. Deliver New Security Engines
          to increase protection against modern attacks
       3. Ease Deployment


Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   10
                                                                                           10
New Features
       & Enhancements in 4.1

          Goals                        Group of Features
          Improve     Admin Experience Optimization,
          Operational incl. Log & Error Management
          Efficiency  Application Security Intelligence (Dashboard)
                      IT Infrastructure integration (SSO integration)

          New                          JSON Engine
          Security                     Dynamic Command Injection Filtering
          Engines
          Ease       Secure Transparent Mode
          Deployment Predefined application templates


Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   11
                                                                                           11
Improving
          Operational
          Efficiency




Securing & Accelerating Your Applications   3/19/2013 3/19/2013 All © 2012
                                               3/19/2013   Deny          Deny All © 2012   Deny All © 2012   12
                                                                                                             12
To read full slides presentation &
access to the video recording on:


    Introducing DASP version 4.1


Please click on the link available in
the description below.
Thank you!
                             info
                        @denyall.com
                      +33 1 46 20 96 00




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   14
                                                                                           14

Mais conteúdo relacionado

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Introduction to DASP version 4.1

  • 1. Introducing DASP version 4.1 New Products This event will start at 9am CEST, Sept 26, 2012 thanks for your patience Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 1 1
  • 2. Hello ! Renaud Bidou Stéphane de Saint Albin CTO CMO Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 2 2
  • 3. Logistics • Goal of this webinar: to give you an overview of the latest and greatest product news… in 60 minutes! • How it works – You’re muted… – … but please ask any questions using the chat tool – We’ll take a few minutes at the end to answer them Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 3 3
  • 4. About DenyAll Securing & accelerating your applications Priority #1: filtering incoming Web traffic – No other way to effectively protect your IT infrastructure against application-layer attacks Priority #2: reducing the attack surface – Proactively managing vulnerabilities, making it harder for hackers, is smart/good practice Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 4 4
  • 5. DenyAll Product Line • Auditor • Vulnerability Manager • Edge Tester Detect • Management • sProxy Console • rXML • Application • rWeb Security • rWeb + Client Dashboard Shield Manage Protect Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 5 5
  • 6. Agenda 1. Version 4.1 design goals 2. Operational efficiency 3. New security engines 4. Secure Transparent Mode 5. More to come 6. Conclusion and next steps Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 6 6
  • 7. Version 4.1 Design Goals Securing & Accelerating Your Applications 3/19/2013 3/19/2013 All © 2012 3/19/2013 Deny Deny All © 2012 Deny All © 2012 7 7
  • 8. A Proven Platform Reverse Proxy Standard Advanced High Application XML User Web App Web App Availability Acceleration Security Security Protect Security Security • Time tested, reverse proxy-based architecture for maximum security – protocol break, infrastructure masking, deep inspection • Modular group of features, assembled in packaged products to meet specific needs – sProxy, rXML, rWeb – License key-enabled upgrade paths Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 8 8
  • 9. +10 Years of Innovation Reverse Proxy Standard Advanced High Application XML User Web App Web App Availability Acceleration Security Security Protect Security Security Distributivity Caching Deep Inspection White List Model Validation Client Certificates User Active-Passive Compression Transformation Stateful XML Validation Authentication User Behavior SSO integration Active-Active TCP Multiplexing Black List Transformation Tracking Cookie Tracking SSL Offloading Scoring List Client Shield Black List Server Load- Stateful Balancing SOAP Attachments ACL Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 9 9
  • 10. R&D Goals & Priorities 1. Improve Operational Efficiency – Usability & Manageability – IT Infrastructure Integration – Application Security Intelligence – Virtual Patching 2. Deliver New Security Engines to increase protection against modern attacks 3. Ease Deployment Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 10 10
  • 11. New Features & Enhancements in 4.1 Goals Group of Features Improve Admin Experience Optimization, Operational incl. Log & Error Management Efficiency Application Security Intelligence (Dashboard) IT Infrastructure integration (SSO integration) New JSON Engine Security Dynamic Command Injection Filtering Engines Ease Secure Transparent Mode Deployment Predefined application templates Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 11 11
  • 12. Improving Operational Efficiency Securing & Accelerating Your Applications 3/19/2013 3/19/2013 All © 2012 3/19/2013 Deny Deny All © 2012 Deny All © 2012 12 12
  • 13. To read full slides presentation & access to the video recording on: Introducing DASP version 4.1 Please click on the link available in the description below.
  • 14. Thank you! info @denyall.com +33 1 46 20 96 00 Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 14 14