SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Enkitec eSERT v2

                             Scott Spendolini
                   Executive Director, Enkitec




                                                 1
WELCOME




          2
About Enkitec
 Oracle Platinum Partner
  Established in 2004
  Headquartered in Dallas, TX
  Locations throughout the US & EMEA

 Specialties include
  Exadata Implementations
  Development Services
   PL/SQL / Java / APEX

  DBA/Data Warehouse/RAC
  Business Intelligence


                                        3
Sumneva Acquisition
 On June 22nd, 2012, Enkitec acquired Sumneva
  sumnevaSERT now called eSERT
  sumnevaFramework now called eFramework

 Enkitec is as committed as ever to APEX products,
  services & training
  eSERT v2
  eSERT Cloud
  At least two more products for APEX developers in CY2012




                                                              4
Agenda
 Overview
 eSERT 2.0
 eSERT Cloud
 Summary




                5
OVERVIEW




           6
Insecurities
 We live in a time where the security of data is
  the most emphasized yet least practiced thing
 It is almost impossible to keep up with how many
  sites have been compromised anymore
 Unfortunately, adding security to our
  applications is almost always
  event driven or reactive




                                                     7
Customer Demand
 Despite this, we’re all tasked with quickly
  developing applications for our customers/
  clients
  Often times, we take
   shortcuts and leave
   out things, like security
  Not because we want to,
   because we have to




                                                8
Excuses, Excuses...
 We make many, many excuses to ourselves as to
  why we didn’t adequately secure our
  applications:
  Not enough time
  No one cares about the
   data/application
  It’s “internal only”
  Our users are not smart
   enough to do anything
   malicious
  False sense of security


                                                  9
Recipe for Disaster
 Given:
  The stresses of getting our applications released quickly
  The lack of time we have to do so

 Our applications - APEX & otherwise - are likely
  to have potential security vulnerabilities that
  we could easily fix
  If we only knew what they were and had the time...




                                                               10
ESERT   2.0




              11
eSERT 2.0
 eSERT:
  Security Evaluation & Recommendation Tool
 APEX application designed to evaluate and identify
  potential security issues in other APEX applications
  Supports both APEX 4.0 & 4.1
    APEX 4.2 support shortly after release

    Oracle Database 10gR2 or later

  Runs in and is integrated with
   your APEX Workspace
    Single Workspace Install in eSERT 2.1

  Designed to be a part of your
   development process

                                                         12
How it Works
 eSERT evaluates your application’s metadata for
  potential security issues
  Takes only a few seconds to run

 Result is an interactive APEX application that
  allows developers to easily explore and mitigate
  potential threats
  Each application is scored based on eSERT’s findings

 Designed to clearly identify what needs attention
  and steer developers or managers in that
  direction


                                                          13
Classifications
 eSERT inspects APEX applications and reports on
  threats in five classifications:


                    URL Tampering          App Settings




          Cross Site Scripting                     Page Settings




                                 SQL Injection




                                                                   14
Scoring
 Evaluations in eSERT will produce three scores:
  Raw
   Actual results of the evaluation

  Pending
   Raw score plus any exception - approved or not - that developers have
    put in place to justify existing threats

  Approved
   Raw score plus all approved exceptions




                                                                            15
Results
 eSERT will assign a status & color code to every
  component which it evaluates:
  Pass
  Approved



  Pending



  Fail
  Rejected
  Stale


                                                     16
Complete Evaluation
 eSERT evaluates all components of an
  application, regardless of their condition &
  authorization scheme
  Nothing gets skipped

 eSERT can be pre-configured with a set of valid
  values
  Which can be changed or augmented depending on your
   interpretation or business needs




                                                         17
“Security is not a product, but
      rather a process.”




                                  18
Ongoing Evaluation
 eSERT allows developers to add exceptions for
  false positives and acceptable risks
 All exceptions must be reviewed & approved by a
  manager before the “approved” score increases
 As exceptions are logged, the value of the
  attribute in question is also captured
  If this value changes at any time, the exception will be
   instantly flagged as “stale” and require re-approval




                                                              19
Without eSERT
                   Correcting each additional security vulnerability
                    may cause other functional issues
                    Thus, a high number of vulnerabilities corrected at once
                     will yield more functional defects
Vulnerabilities




                                             Time
                  2007 2008 2009        Untitled 1
                                               Untitled 2
                                                                                20
With eSERT
                   Using eSERT to keep security vulnerabilities to a
                    minimum reduces the number of functional
                    defects introduced
Vulnerabilities




                                          Time
                  2007      2009     Untitled 1
                                                                        21
New Features Summary
Feature                    Version 2.0 (APEX 4.0)   Version 2.1 (APEX 4.1)

Exceptions & Notations               ✓                        ✓

Social Stream                        ✓                        ✓

Enhanced UI                          ✓                        ✓

PDF Reports                          ✓                        ✓

Import/Export                        ✓                        ✓

Scheduled Evaluations                                         ✓

Single Workspace Install                                      ✓

SaaS (eSERT Cloud)                                       Cloud Only



                                                                             22
ESERT V2
D E M O N S T R A T I O N




                            23
ESERT   CLOUD




                24
eSERT Cloud
 eSERT cloud is a affordable hosted service where
  anyone can upload their APEX applications and
  get an instant security evaluation via eSERT
  Interactive Dashboard with summary results
  PDF Summary Report (typically 100+ pages)




                                                     25
How it Works - 5 Simple Steps
1) Create an account at http://enkitec.com/sert
2) Request a workspace to upload your APEX
   applications into
3) Purchase evaluation credits
   (1 credit = 1 application evaluation)
4) Select an application to evaluate
5) View and/or download the results




                                                  26
ESERT     CLOUD
D E M O N S T R A T I O N




                            27
SUMMARY




          28
Summary
 eSERT provides you with the ability to easily and
  quickly identify and remedy most APEX security
  vulnerabilities
  Its designed to be used both during and after
   development, not as a checkpoint at the end
  As a side-effect, your developers will become more
   security-conscious by using eSERT and incorporate secure
   best practices by default




                                                              29
Customers Across All Industries
 Private Sector                         Public Sector
  Multi-Channel Retailer                 Intelligence Agency
   Massive application with Over 300      Over 100 internal applications
    Concurrent Users
                                          Local Government
  Major Defense Contractor
                                           Internal Applications
   Hundreds of applications
                                          Civilian Agency
  Major Healthcare Provider
                                           Internet Facing
   Infrastructure Management               e-Commerce Application

 Higher Education                        DOD Agency
                                           Logistical Reports & Info
  Multiple Major Universities
   Access to student & research
    information


                                                                             30
Statement of Direction
 Version 2.2 - Q4 2012
  APEX 4.2 Support
   Based on actual release date

  Additional Reports & Analytics
  Scheduled Evaluation Enhancements
  Team Development Integration




                                       31
Licensing
 eSERT
  Per Instance of APEX
  Per APEX Workspace
  Per APEX Application

 eSERT Cloud
  Per Evaluation of an Application
   Volume discounts available




                                      32
Want More Details?
 Contact us for details & pricing
  sales@enkitec.com
  Americas
   +1 972 607 3751

  EMEA
   +44 7944 654510

  http://www.enkitec.com/sert




                                     33
http://www.enkitec.com




                         34

Weitere ähnliche Inhalte

Mehr von Enkitec

Profiling Oracle with GDB
Profiling Oracle with GDBProfiling Oracle with GDB
Profiling Oracle with GDBEnkitec
 
Oracle Performance Tools of the Trade
Oracle Performance Tools of the TradeOracle Performance Tools of the Trade
Oracle Performance Tools of the TradeEnkitec
 
Oracle Performance Tuning Fundamentals
Oracle Performance Tuning FundamentalsOracle Performance Tuning Fundamentals
Oracle Performance Tuning FundamentalsEnkitec
 
SQL Tuning Tools of the Trade
SQL Tuning Tools of the TradeSQL Tuning Tools of the Trade
SQL Tuning Tools of the TradeEnkitec
 
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan Stability
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan StabilityUsing SQL Plan Management (SPM) to Balance Plan Flexibility and Plan Stability
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan StabilityEnkitec
 
Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceEnkitec
 
OGG Architecture Performance
OGG Architecture PerformanceOGG Architecture Performance
OGG Architecture PerformanceEnkitec
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security PrimerEnkitec
 
How Many Ways Can I Manage Oracle GoldenGate?
How Many Ways Can I Manage Oracle GoldenGate?How Many Ways Can I Manage Oracle GoldenGate?
How Many Ways Can I Manage Oracle GoldenGate?Enkitec
 
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...Understanding how is that adaptive cursor sharing (acs) produces multiple opt...
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...Enkitec
 
Sql tuning made easier with sqltxplain (sqlt)
Sql tuning made easier with sqltxplain (sqlt)Sql tuning made easier with sqltxplain (sqlt)
Sql tuning made easier with sqltxplain (sqlt)Enkitec
 
Profiling the logwriter and database writer
Profiling the logwriter and database writerProfiling the logwriter and database writer
Profiling the logwriter and database writerEnkitec
 
Fatkulin hotsos 2014
Fatkulin hotsos 2014Fatkulin hotsos 2014
Fatkulin hotsos 2014Enkitec
 
Combining ACS Flexibility with SPM Stability
Combining ACS Flexibility with SPM StabilityCombining ACS Flexibility with SPM Stability
Combining ACS Flexibility with SPM StabilityEnkitec
 
Why You May Not Need Offloading
Why You May Not Need OffloadingWhy You May Not Need Offloading
Why You May Not Need OffloadingEnkitec
 
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEX
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEXLOBS, BLOBS, CLOBS: Dealing with Attachments in APEX
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEXEnkitec
 
Creating a Business Oriented UI in APEX
Creating a Business Oriented UI in APEXCreating a Business Oriented UI in APEX
Creating a Business Oriented UI in APEXEnkitec
 
Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New FeaturesEnkitec
 
Enkitec Exadata Human Factor
Enkitec Exadata Human FactorEnkitec Exadata Human Factor
Enkitec Exadata Human FactorEnkitec
 
About Multiblock Reads v4
About Multiblock Reads v4About Multiblock Reads v4
About Multiblock Reads v4Enkitec
 

Mehr von Enkitec (20)

Profiling Oracle with GDB
Profiling Oracle with GDBProfiling Oracle with GDB
Profiling Oracle with GDB
 
Oracle Performance Tools of the Trade
Oracle Performance Tools of the TradeOracle Performance Tools of the Trade
Oracle Performance Tools of the Trade
 
Oracle Performance Tuning Fundamentals
Oracle Performance Tuning FundamentalsOracle Performance Tuning Fundamentals
Oracle Performance Tuning Fundamentals
 
SQL Tuning Tools of the Trade
SQL Tuning Tools of the TradeSQL Tuning Tools of the Trade
SQL Tuning Tools of the Trade
 
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan Stability
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan StabilityUsing SQL Plan Management (SPM) to Balance Plan Flexibility and Plan Stability
Using SQL Plan Management (SPM) to Balance Plan Flexibility and Plan Stability
 
Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture Performance
 
OGG Architecture Performance
OGG Architecture PerformanceOGG Architecture Performance
OGG Architecture Performance
 
APEX Security Primer
APEX Security PrimerAPEX Security Primer
APEX Security Primer
 
How Many Ways Can I Manage Oracle GoldenGate?
How Many Ways Can I Manage Oracle GoldenGate?How Many Ways Can I Manage Oracle GoldenGate?
How Many Ways Can I Manage Oracle GoldenGate?
 
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...Understanding how is that adaptive cursor sharing (acs) produces multiple opt...
Understanding how is that adaptive cursor sharing (acs) produces multiple opt...
 
Sql tuning made easier with sqltxplain (sqlt)
Sql tuning made easier with sqltxplain (sqlt)Sql tuning made easier with sqltxplain (sqlt)
Sql tuning made easier with sqltxplain (sqlt)
 
Profiling the logwriter and database writer
Profiling the logwriter and database writerProfiling the logwriter and database writer
Profiling the logwriter and database writer
 
Fatkulin hotsos 2014
Fatkulin hotsos 2014Fatkulin hotsos 2014
Fatkulin hotsos 2014
 
Combining ACS Flexibility with SPM Stability
Combining ACS Flexibility with SPM StabilityCombining ACS Flexibility with SPM Stability
Combining ACS Flexibility with SPM Stability
 
Why You May Not Need Offloading
Why You May Not Need OffloadingWhy You May Not Need Offloading
Why You May Not Need Offloading
 
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEX
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEXLOBS, BLOBS, CLOBS: Dealing with Attachments in APEX
LOBS, BLOBS, CLOBS: Dealing with Attachments in APEX
 
Creating a Business Oriented UI in APEX
Creating a Business Oriented UI in APEXCreating a Business Oriented UI in APEX
Creating a Business Oriented UI in APEX
 
Colvin RMAN New Features
Colvin RMAN New FeaturesColvin RMAN New Features
Colvin RMAN New Features
 
Enkitec Exadata Human Factor
Enkitec Exadata Human FactorEnkitec Exadata Human Factor
Enkitec Exadata Human Factor
 
About Multiblock Reads v4
About Multiblock Reads v4About Multiblock Reads v4
About Multiblock Reads v4
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Enkitec eSERT Overview

  • 1. Enkitec eSERT v2 Scott Spendolini Executive Director, Enkitec 1
  • 3. About Enkitec  Oracle Platinum Partner  Established in 2004  Headquartered in Dallas, TX  Locations throughout the US & EMEA  Specialties include  Exadata Implementations  Development Services  PL/SQL / Java / APEX  DBA/Data Warehouse/RAC  Business Intelligence 3
  • 4. Sumneva Acquisition  On June 22nd, 2012, Enkitec acquired Sumneva  sumnevaSERT now called eSERT  sumnevaFramework now called eFramework  Enkitec is as committed as ever to APEX products, services & training  eSERT v2  eSERT Cloud  At least two more products for APEX developers in CY2012 4
  • 5. Agenda  Overview  eSERT 2.0  eSERT Cloud  Summary 5
  • 7. Insecurities  We live in a time where the security of data is the most emphasized yet least practiced thing  It is almost impossible to keep up with how many sites have been compromised anymore  Unfortunately, adding security to our applications is almost always event driven or reactive 7
  • 8. Customer Demand  Despite this, we’re all tasked with quickly developing applications for our customers/ clients  Often times, we take shortcuts and leave out things, like security  Not because we want to, because we have to 8
  • 9. Excuses, Excuses...  We make many, many excuses to ourselves as to why we didn’t adequately secure our applications:  Not enough time  No one cares about the data/application  It’s “internal only”  Our users are not smart enough to do anything malicious  False sense of security 9
  • 10. Recipe for Disaster  Given:  The stresses of getting our applications released quickly  The lack of time we have to do so  Our applications - APEX & otherwise - are likely to have potential security vulnerabilities that we could easily fix  If we only knew what they were and had the time... 10
  • 11. ESERT 2.0 11
  • 12. eSERT 2.0  eSERT: Security Evaluation & Recommendation Tool  APEX application designed to evaluate and identify potential security issues in other APEX applications  Supports both APEX 4.0 & 4.1  APEX 4.2 support shortly after release  Oracle Database 10gR2 or later  Runs in and is integrated with your APEX Workspace  Single Workspace Install in eSERT 2.1  Designed to be a part of your development process 12
  • 13. How it Works  eSERT evaluates your application’s metadata for potential security issues  Takes only a few seconds to run  Result is an interactive APEX application that allows developers to easily explore and mitigate potential threats  Each application is scored based on eSERT’s findings  Designed to clearly identify what needs attention and steer developers or managers in that direction 13
  • 14. Classifications  eSERT inspects APEX applications and reports on threats in five classifications: URL Tampering App Settings Cross Site Scripting Page Settings SQL Injection 14
  • 15. Scoring  Evaluations in eSERT will produce three scores:  Raw  Actual results of the evaluation  Pending  Raw score plus any exception - approved or not - that developers have put in place to justify existing threats  Approved  Raw score plus all approved exceptions 15
  • 16. Results  eSERT will assign a status & color code to every component which it evaluates:  Pass  Approved  Pending  Fail  Rejected  Stale 16
  • 17. Complete Evaluation  eSERT evaluates all components of an application, regardless of their condition & authorization scheme  Nothing gets skipped  eSERT can be pre-configured with a set of valid values  Which can be changed or augmented depending on your interpretation or business needs 17
  • 18. “Security is not a product, but rather a process.” 18
  • 19. Ongoing Evaluation  eSERT allows developers to add exceptions for false positives and acceptable risks  All exceptions must be reviewed & approved by a manager before the “approved” score increases  As exceptions are logged, the value of the attribute in question is also captured  If this value changes at any time, the exception will be instantly flagged as “stale” and require re-approval 19
  • 20. Without eSERT  Correcting each additional security vulnerability may cause other functional issues  Thus, a high number of vulnerabilities corrected at once will yield more functional defects Vulnerabilities Time 2007 2008 2009 Untitled 1 Untitled 2 20
  • 21. With eSERT  Using eSERT to keep security vulnerabilities to a minimum reduces the number of functional defects introduced Vulnerabilities Time 2007 2009 Untitled 1 21
  • 22. New Features Summary Feature Version 2.0 (APEX 4.0) Version 2.1 (APEX 4.1) Exceptions & Notations ✓ ✓ Social Stream ✓ ✓ Enhanced UI ✓ ✓ PDF Reports ✓ ✓ Import/Export ✓ ✓ Scheduled Evaluations ✓ Single Workspace Install ✓ SaaS (eSERT Cloud) Cloud Only 22
  • 23. ESERT V2 D E M O N S T R A T I O N 23
  • 24. ESERT CLOUD 24
  • 25. eSERT Cloud  eSERT cloud is a affordable hosted service where anyone can upload their APEX applications and get an instant security evaluation via eSERT  Interactive Dashboard with summary results  PDF Summary Report (typically 100+ pages) 25
  • 26. How it Works - 5 Simple Steps 1) Create an account at http://enkitec.com/sert 2) Request a workspace to upload your APEX applications into 3) Purchase evaluation credits (1 credit = 1 application evaluation) 4) Select an application to evaluate 5) View and/or download the results 26
  • 27. ESERT CLOUD D E M O N S T R A T I O N 27
  • 28. SUMMARY 28
  • 29. Summary  eSERT provides you with the ability to easily and quickly identify and remedy most APEX security vulnerabilities  Its designed to be used both during and after development, not as a checkpoint at the end  As a side-effect, your developers will become more security-conscious by using eSERT and incorporate secure best practices by default 29
  • 30. Customers Across All Industries  Private Sector  Public Sector  Multi-Channel Retailer  Intelligence Agency  Massive application with Over 300  Over 100 internal applications Concurrent Users  Local Government  Major Defense Contractor  Internal Applications  Hundreds of applications  Civilian Agency  Major Healthcare Provider  Internet Facing  Infrastructure Management e-Commerce Application  Higher Education  DOD Agency  Logistical Reports & Info  Multiple Major Universities  Access to student & research information 30
  • 31. Statement of Direction  Version 2.2 - Q4 2012  APEX 4.2 Support  Based on actual release date  Additional Reports & Analytics  Scheduled Evaluation Enhancements  Team Development Integration 31
  • 32. Licensing  eSERT  Per Instance of APEX  Per APEX Workspace  Per APEX Application  eSERT Cloud  Per Evaluation of an Application  Volume discounts available 32
  • 33. Want More Details?  Contact us for details & pricing  sales@enkitec.com  Americas  +1 972 607 3751  EMEA  +44 7944 654510  http://www.enkitec.com/sert 33

Hinweis der Redaktion

  1. Welcome to the sumnevaSERT demonstration. sumnevaSERT is an APEX-based tool that evaluates your APEX applications for common security vulnerabilities and provides the requires steps to fix them.\n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. here millions of e-mail addresses and their corresponding owner names were compromised.\n\nMost, if not all of these events could have been prevented. However, we live in a reactive society; we don’t make changes until the breach occurs, which is always too late.\n
  8. In today’s world, our customers expect quick turnaround for all things IT - including the applications which we’re all charged with developing. This pressure falls squarely on our shoulders, and we often knowingly take shortcuts that we know are wrong, as that’s the only way we can meet our deadlines.\n
  9. Unfortunately, we have all become quite the experts at making excuses for taking these shortcuts:\n - Not enough time\n - No one care enough about the application to steal the data\n - It’s internal only - which is the biggest threat, since most data is stolen from authorized users\n - Our users can barely use the system, let alone hack it. But what you may not be considering is their willingness to give their credentials to someone who can hack it\n - We run Oracle, Oracle is secure, thus our applications are secure\n
  10. All of these excuses spell out a recipe for disaster. Given the stresses that we’re under combined with the lack of time we have to complete our development, its not only possible - but probable that our applications - APEX & otherwise - have security vulnerabilities that we could easily fix - if we only had the time to identify them.\n
  11. \n
  12. This is why we developed sumnevaSERT - which stands for Security Evaluation & Review Tool. sumnevaSERT is designed to quickly evaluate & identify common security vulnerabilities in your APEX applications. \n\nIt will run on both APEX 3.2 & 4.0, and support any edition of the Oracle Database, as long as it’s 10gR2 or greater.\n\nIt can even be completely customized to meet your organization’s specific security and/or QA requirements.\n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. sumnevaSERT will not secure everything. It is simply a layer in your security plan. But it’s a powerful layer, as the threats that it will identify and help you mitigate will make your APEX applications much more secure.\n\nYou’ll still need a strong overall security policy, which should include but not be limited to strong passwords, physical access control, code audity and security best practices.\n
  30. \n
  31. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  32. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  33. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  34. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  35. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  36. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  37. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  38. Licensing will be done on a per-instance basis. If you have any questions about pricing, please contact Sumneva at sales@sumneva.com or by calling us at 703-879-4615.\n\n
  39. \n
  40. \n
  41. \n
  42. Thank you for taking the time to watch this overview of sumnevaSERT. Please visit sumneva.com for more information on our services.\n