SlideShare ist ein Scribd-Unternehmen logo
1 von 22
© 2015 Imperva, Inc. All rights reserved.
Stop Account Takeover Attacks,
Right in Their Tracks
Narayan Makaram
Director, Product Marketing, Application Security
September 22, 2015
© 2015 Imperva, Inc. All rights reserved.
Speaker
2
Narayan Makaram
Dir., Product Marketing, Imperva
© 2015 Imperva, Inc. All rights reserved.
Agenda
• Account Takeover – A Real Problem
• Anatomy of Account Takeover Attack
• Best Practices
– Protecting Web Applications
– Real-time Threat Intelligence
• Account Takeover Protection
– Credential and Device Intelligence
– Customer Use-Case
• Questions?
3
© 2015 Imperva, Inc. All rights reserved.
Web Account Takeover
A Real Problem
1
4
© 2015 Imperva, Inc. All rights reserved.5
Adobe
36,000,000
Target
70,000,000
EBAY
145,000,000
Anthem
80,000,000
Home Depot
56,000,000
JPMC
76,000,000
US OPM
21,000,000
201520142013
Evernote
50,000,000
Primera
11,000,000
Ashley
Madison
39,000,000
Majority of Security Breaches Caused by Web App Attacks
• 75% of cyber-attacks target web applications1
• 79 average number of serious vulnerabilities / website2
• 1 in 5 vulnerabilities on websites allowed attackers
access to sensitive data3
$ 5.85M in 2014 average cost of a data breach
in US alone, up from $5.4M in 20134
1. Gartner Research
2. WhiteHat Website Security Statistics Report, 12th Edition
3. 2015 Internet Security Threat Report
4. 2014 Ponemon Cost of Breach Report
© 2015 Imperva, Inc. All rights reserved.
Majority of Web Attacks Involve Account Takeover
6
Cyber criminals are using stolen credentials to login as genuine customers
and perform unauthorized transactions without the victim’s knowledge
Source: Verizon 2015 DBIR Report
50%
of web attacks
are using stolen credentials
© 2015 Imperva, Inc. All rights reserved.
Anatomy of Account Takeover Attack
7
HARVEST CREDENTIALS
Hacker
Stolen
credentials
TEST CREDENTIALS
Botnet
Control
Server
Joe
Mary
Elvis
xxxxx
xxxxx
xxxxx
GAIN ACCESS
Web Servers
new
MITB/
Phishing
STEAL ASSETS
Assets
Medical
Records
Intellectual
Property
Banking
Financial
© 2015 Imperva, Inc. All rights reserved.
Web
Server
TR
Database
Server
NG
Firewall
Perimeter Defenses Are Not Enough
Non-HTTP
Attacks
IPS
IDS
HTTP/HTTPS
Traffic
Attacks
Perimeter Defenses DO NOT
Prevent:
• SQL Injection
• Cross-Site Scripts
• Direct Object Ref.
• Session Hijacking
• Exploit Known Vulns.
• Site-Scraping
• Comment Spam
• DDoS Attacks
• Account Takeovers
• Transactional Fraud
60%
of web attacks
pass through
perimeter defenses
8
© 2015 Imperva, Inc. All rights reserved.
Web Account Takeover
Best Practices for
- Protecting Web Applications
- Crowd-sourced Threat Intelligence
2
9
© 2015 Imperva, Inc. All rights reserved.
Web
Server
TR
Database
Server
NG
Firewall
SecureSphere WAF: Prevents Web Application Attacks
Non Web
Attacks
IPS
IDS
Web App Attacks
including
Account Takeover
HTTP/HTTPS
Traffic
Crowd-Sourced Threat Intelligence
• Reputation Service
• Bot & DDoS Protection
• Account Takeover Protection
10
SecureSphere
Web App Firewall
new
© 2015 Imperva, Inc. All rights reserved.
ThreatRadar: Crowd-sourced Threat Intelligence
11
Reputation
Service
Phishing URLs
Anonymous proxies
TOR networks
Bad IP Geo-locations
Malicious IP addresses
Comment Spammers
Prevents Bad Sources (IP’s)
Bot & DDoS
Protection
Classifies Bots or Humans
Good or Bad Bots
App (Layer 7) DDoS Attacks
Eliminates 30% of Unwanted Bot Traffic
Account Takeover
ProtectionPrevents Credential Reconnaissance
Credential Stuffing Attacks
Brute-force Dictionary Attacks
Privileged Account Attacks
Detects Suspicious Device Behavior
Device Reputation
Device Evasion Techniques
Device-Account Associations
Device detection/mitigation policies
© 2015 Imperva, Inc. All rights reserved.
WAF Correlation: Improves Efficiency and Productivity
12
SecureSphere WAF Correlation Engine
ProtocolValidation
AttackSignatures
ApplicationProfiling
TRReputationDetection
TRBot/DDoSProtection
Increases Accuracy
Improves SOC
Efficiency
Removes Unwanted
Traffic
Reduces Threats
TRATOProtection
NEW
Improve User
Protection/Experience
© 2015 Imperva, Inc. All rights reserved.
Web Account Takeover
Account Takeover Protection
- Credential Intelligence
- Device Intelligence
3
13
© 2015 Imperva, Inc. All rights reserved.
Detecting Account Takeover
Using Credential Intelligence
www.bank.com
Test credentialsAttacker uses bots to test
• Stolen credentials
• Weak passwords
• Privileged accounts
Suspicious Activity
• Attacker uses bots to test stolen credentials
• Repeated login failures triggers checks
against ThreatRadar Cloud
• Successful match confirms stolen/weak
credentials were used
• Sources are are automatically blocked
Check failed
credentials
Stolen
credentials
Weak
passwords
Privileged
Accounts
ThreatRadar
Login failures
Med-Risk (ALERT) = (Failed Logins to Multiple Accounts) + (Brute-Force attack Weak Passwords)
High-Risk (BLOCK) = (Failed Logins to Multiple Accounts) + (Evidence of Stolen Credentials)
+ (TR Bot Protection detected known bot client)
WAF Mitigation Rules
14
© 2015 Imperva, Inc. All rights reserved.
Detecting Account Takeover
Using Device Intelligence
www.webstore.com
ThreatRadar
Med-Risk (ALERT) = Device (w/ prior fraud) + Device (associated multiple accounts)
High-Risk (BLOCK) = Device (w/ prior fraud) + Device (associated w/ multiple accounts)
+ (TR known bot client)
WAF MITIGATION RULES:
Device Profiling1
identification1
Device Risk Evaluation
Returns device
Risk-Score
2
Device Risk Score = Low/Medium/High
reputation
association
evasion
2
3 WAF Mitigation Rules
Correlates device
Risk-Score with
other TR services
to Alert or Block
3
15
© 2015 Imperva, Inc. All rights reserved.
Account Takeover – Reports
Identifies Compromised Accounts
16
Account 1
Account 2 Account 3
compromised
Device with BAD-
reputation with
access to accounts
compromised
compromised
Account 1
Account 2 Account 3
compromised
Device exhibiting risky
behavior – access to
multiple accounts, but with
NO bad-reputation
compromised
compromised
Attackers use
evasion techniques
having access to
accounts TOR
Emulators
Geo
mismatch
Account 1
Account 2
compromised
compromised
Compromised Accounts
Report
© 2015 Imperva, Inc. All rights reserved.
Account Takeover: Banking Customer Example
17
PROBLEMS
• Bot, DDoS, MITB, and Phishing attacks on the rise
• Brute-force attacks using stolen credentials
• Denial-of-service - automated account lockouts
• Security Ops and Fraud Team overwhelmed with
manual analysis of alerts/logs (reactive approach)
BENEFITS OF IMPERVA SOLUTION
• Proactive detection BEFORE fraud is committed
• Improved frictionless user experience
• Reduced workload for Security Ops
• Actionable device intelligence usable for Fraud IR
SOLUTION NEEDS
• Detect ATO based on known user/device activity
• Visibility to humans versus bot traffic
• Visibility into compromised user accounts
• Reduce (friction) need for step-up authentication
• Device threat intelligence that can be used by
backend fraud investigation teams
• One of the largest banks
• Losing $500K / month in ATO and/or fraud
• 20% of on-line payments need investigation
© 2015 Imperva, Inc. All rights reserved.
Known
Attackers
Anonymous Proxies
TOR Networks, Bots
OWASP Top-10
Web Attacks
Undesirable
Geo-locations
Web Fraud
App DDoS
Scrapers
Phishing Sites
Comment
Spammers
Web App
Vulnerabilities
Web Apps
Web App Firewall
Complete Protection Against Web Threats
Suspicious Devices
Credential Stuffing
18
© 2015 Imperva, Inc. All rights reserved.
Gartner “Magic Quadrant for Web Application Firewalls” by Jeremy D'Hoinne, Adam Hils, Greg Young, Nicole Papadopoulos, 15 June 2015.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon
request from Imperva. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with
the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner
disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
THE ONLY LEADER
TWO CONSECUTIVE YEARS
Gartner Magic
Quadrant for
Web Application
Firewalls
© 2015 Imperva, Inc. All rights reserved.
Web Account Takeover
Questions?
4
20
© 2015 Imperva, Inc. All rights reserved.
Imperva Technical Deep Dive Demo Series
Upcoming Demos:
• September 29: Imperva Incapsula DDoS Protection
• October 6: Imperva Skyfence
• October 13: Imperva SecureSphere Web Application Firewall
• October 20: Imperva SecureSphere Database Activity Monitor
Register Now: www.imperva.com/Resources/Videos
4
21
Stop Account Takeover Attacks, Right in their Tracks

Weitere ähnliche Inhalte

Was ist angesagt?

Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringImperva
 
Extend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS EnvironmentExtend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS EnvironmentImperva
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalImperva
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelSkybox Security
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the ThreatIBM Security
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 

Was ist angesagt? (20)

Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity MonitoringSophisticated Incident Response Requires Sophisticated Activity Monitoring
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
 
Extend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS EnvironmentExtend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS Environment
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack Survival
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 

Andere mochten auch

Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverIMMUNIO
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...Visa
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceImperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksImperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.Imperva
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud AttacksImperva
 
Automation of Web Application Attacks
Automation of Web Application AttacksAutomation of Web Application Attacks
Automation of Web Application AttacksImperva
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedWeb Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedImperva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 

Andere mochten auch (20)

Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
The Quiet Rise of Account Takeover
The Quiet Rise of Account TakeoverThe Quiet Rise of Account Takeover
The Quiet Rise of Account Takeover
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
Automation of Web Application Attacks
Automation of Web Application AttacksAutomation of Web Application Attacks
Automation of Web Application Attacks
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedWeb Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 

Ähnlich wie Stop Account Takeover Attacks, Right in their Tracks

Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...apidays
 
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...apidays
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxdaniahendric
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsPaul Hobbs
 
Hybrid website security from Indusface
Hybrid website security from IndusfaceHybrid website security from Indusface
Hybrid website security from IndusfaceInfosys
 
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...WSO2
 

Ähnlich wie Stop Account Takeover Attacks, Right in their Tracks (20)

Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
 
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Hybrid website security from Indusface
Hybrid website security from IndusfaceHybrid website security from Indusface
Hybrid website security from Indusface
 
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
 

Mehr von Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Mehr von Imperva (19)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Stop Account Takeover Attacks, Right in their Tracks

  • 1. © 2015 Imperva, Inc. All rights reserved. Stop Account Takeover Attacks, Right in Their Tracks Narayan Makaram Director, Product Marketing, Application Security September 22, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. Speaker 2 Narayan Makaram Dir., Product Marketing, Imperva
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda • Account Takeover – A Real Problem • Anatomy of Account Takeover Attack • Best Practices – Protecting Web Applications – Real-time Threat Intelligence • Account Takeover Protection – Credential and Device Intelligence – Customer Use-Case • Questions? 3
  • 4. © 2015 Imperva, Inc. All rights reserved. Web Account Takeover A Real Problem 1 4
  • 5. © 2015 Imperva, Inc. All rights reserved.5 Adobe 36,000,000 Target 70,000,000 EBAY 145,000,000 Anthem 80,000,000 Home Depot 56,000,000 JPMC 76,000,000 US OPM 21,000,000 201520142013 Evernote 50,000,000 Primera 11,000,000 Ashley Madison 39,000,000 Majority of Security Breaches Caused by Web App Attacks • 75% of cyber-attacks target web applications1 • 79 average number of serious vulnerabilities / website2 • 1 in 5 vulnerabilities on websites allowed attackers access to sensitive data3 $ 5.85M in 2014 average cost of a data breach in US alone, up from $5.4M in 20134 1. Gartner Research 2. WhiteHat Website Security Statistics Report, 12th Edition 3. 2015 Internet Security Threat Report 4. 2014 Ponemon Cost of Breach Report
  • 6. © 2015 Imperva, Inc. All rights reserved. Majority of Web Attacks Involve Account Takeover 6 Cyber criminals are using stolen credentials to login as genuine customers and perform unauthorized transactions without the victim’s knowledge Source: Verizon 2015 DBIR Report 50% of web attacks are using stolen credentials
  • 7. © 2015 Imperva, Inc. All rights reserved. Anatomy of Account Takeover Attack 7 HARVEST CREDENTIALS Hacker Stolen credentials TEST CREDENTIALS Botnet Control Server Joe Mary Elvis xxxxx xxxxx xxxxx GAIN ACCESS Web Servers new MITB/ Phishing STEAL ASSETS Assets Medical Records Intellectual Property Banking Financial
  • 8. © 2015 Imperva, Inc. All rights reserved. Web Server TR Database Server NG Firewall Perimeter Defenses Are Not Enough Non-HTTP Attacks IPS IDS HTTP/HTTPS Traffic Attacks Perimeter Defenses DO NOT Prevent: • SQL Injection • Cross-Site Scripts • Direct Object Ref. • Session Hijacking • Exploit Known Vulns. • Site-Scraping • Comment Spam • DDoS Attacks • Account Takeovers • Transactional Fraud 60% of web attacks pass through perimeter defenses 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Web Account Takeover Best Practices for - Protecting Web Applications - Crowd-sourced Threat Intelligence 2 9
  • 10. © 2015 Imperva, Inc. All rights reserved. Web Server TR Database Server NG Firewall SecureSphere WAF: Prevents Web Application Attacks Non Web Attacks IPS IDS Web App Attacks including Account Takeover HTTP/HTTPS Traffic Crowd-Sourced Threat Intelligence • Reputation Service • Bot & DDoS Protection • Account Takeover Protection 10 SecureSphere Web App Firewall new
  • 11. © 2015 Imperva, Inc. All rights reserved. ThreatRadar: Crowd-sourced Threat Intelligence 11 Reputation Service Phishing URLs Anonymous proxies TOR networks Bad IP Geo-locations Malicious IP addresses Comment Spammers Prevents Bad Sources (IP’s) Bot & DDoS Protection Classifies Bots or Humans Good or Bad Bots App (Layer 7) DDoS Attacks Eliminates 30% of Unwanted Bot Traffic Account Takeover ProtectionPrevents Credential Reconnaissance Credential Stuffing Attacks Brute-force Dictionary Attacks Privileged Account Attacks Detects Suspicious Device Behavior Device Reputation Device Evasion Techniques Device-Account Associations Device detection/mitigation policies
  • 12. © 2015 Imperva, Inc. All rights reserved. WAF Correlation: Improves Efficiency and Productivity 12 SecureSphere WAF Correlation Engine ProtocolValidation AttackSignatures ApplicationProfiling TRReputationDetection TRBot/DDoSProtection Increases Accuracy Improves SOC Efficiency Removes Unwanted Traffic Reduces Threats TRATOProtection NEW Improve User Protection/Experience
  • 13. © 2015 Imperva, Inc. All rights reserved. Web Account Takeover Account Takeover Protection - Credential Intelligence - Device Intelligence 3 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Detecting Account Takeover Using Credential Intelligence www.bank.com Test credentialsAttacker uses bots to test • Stolen credentials • Weak passwords • Privileged accounts Suspicious Activity • Attacker uses bots to test stolen credentials • Repeated login failures triggers checks against ThreatRadar Cloud • Successful match confirms stolen/weak credentials were used • Sources are are automatically blocked Check failed credentials Stolen credentials Weak passwords Privileged Accounts ThreatRadar Login failures Med-Risk (ALERT) = (Failed Logins to Multiple Accounts) + (Brute-Force attack Weak Passwords) High-Risk (BLOCK) = (Failed Logins to Multiple Accounts) + (Evidence of Stolen Credentials) + (TR Bot Protection detected known bot client) WAF Mitigation Rules 14
  • 15. © 2015 Imperva, Inc. All rights reserved. Detecting Account Takeover Using Device Intelligence www.webstore.com ThreatRadar Med-Risk (ALERT) = Device (w/ prior fraud) + Device (associated multiple accounts) High-Risk (BLOCK) = Device (w/ prior fraud) + Device (associated w/ multiple accounts) + (TR known bot client) WAF MITIGATION RULES: Device Profiling1 identification1 Device Risk Evaluation Returns device Risk-Score 2 Device Risk Score = Low/Medium/High reputation association evasion 2 3 WAF Mitigation Rules Correlates device Risk-Score with other TR services to Alert or Block 3 15
  • 16. © 2015 Imperva, Inc. All rights reserved. Account Takeover – Reports Identifies Compromised Accounts 16 Account 1 Account 2 Account 3 compromised Device with BAD- reputation with access to accounts compromised compromised Account 1 Account 2 Account 3 compromised Device exhibiting risky behavior – access to multiple accounts, but with NO bad-reputation compromised compromised Attackers use evasion techniques having access to accounts TOR Emulators Geo mismatch Account 1 Account 2 compromised compromised Compromised Accounts Report
  • 17. © 2015 Imperva, Inc. All rights reserved. Account Takeover: Banking Customer Example 17 PROBLEMS • Bot, DDoS, MITB, and Phishing attacks on the rise • Brute-force attacks using stolen credentials • Denial-of-service - automated account lockouts • Security Ops and Fraud Team overwhelmed with manual analysis of alerts/logs (reactive approach) BENEFITS OF IMPERVA SOLUTION • Proactive detection BEFORE fraud is committed • Improved frictionless user experience • Reduced workload for Security Ops • Actionable device intelligence usable for Fraud IR SOLUTION NEEDS • Detect ATO based on known user/device activity • Visibility to humans versus bot traffic • Visibility into compromised user accounts • Reduce (friction) need for step-up authentication • Device threat intelligence that can be used by backend fraud investigation teams • One of the largest banks • Losing $500K / month in ATO and/or fraud • 20% of on-line payments need investigation
  • 18. © 2015 Imperva, Inc. All rights reserved. Known Attackers Anonymous Proxies TOR Networks, Bots OWASP Top-10 Web Attacks Undesirable Geo-locations Web Fraud App DDoS Scrapers Phishing Sites Comment Spammers Web App Vulnerabilities Web Apps Web App Firewall Complete Protection Against Web Threats Suspicious Devices Credential Stuffing 18
  • 19. © 2015 Imperva, Inc. All rights reserved. Gartner “Magic Quadrant for Web Application Firewalls” by Jeremy D'Hoinne, Adam Hils, Greg Young, Nicole Papadopoulos, 15 June 2015. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Imperva. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. THE ONLY LEADER TWO CONSECUTIVE YEARS Gartner Magic Quadrant for Web Application Firewalls
  • 20. © 2015 Imperva, Inc. All rights reserved. Web Account Takeover Questions? 4 20
  • 21. © 2015 Imperva, Inc. All rights reserved. Imperva Technical Deep Dive Demo Series Upcoming Demos: • September 29: Imperva Incapsula DDoS Protection • October 6: Imperva Skyfence • October 13: Imperva SecureSphere Web Application Firewall • October 20: Imperva SecureSphere Database Activity Monitor Register Now: www.imperva.com/Resources/Videos 4 21

Hinweis der Redaktion

  1. Large scale data breaches continue to occur in spite of the money companies are spending on security defenses. Cyber criminals have stolen millions of records including user credentials, credit cards, SSN numbers, medical records and intellectual property. 75% of the cyber-attacks target web-applications according to Gartner Research, because they are easily accessible from the internet, and they provide lucrative entry points to valuable data. Web attacks are common because most websites today contain vulnerabilities. An average of 79 serious vulnerabilities exist per web-site according to WhiteHat website security stats. 1 in 5 vulnerabilities discovered on legitimate websites were considered critical – allow attackers to access sensitive data, alter websites content, compromise visitors computers As a result, data breaches due to web application attacks have been increasing. $5.85 M is the average cost per data breach accoring to the latest Ponemon Report
  2. PROBLEM: Over 50% of web application attacks in 2014 involved stolen credentials according to the latest Verizon DBIR report, followed by other types of attacks – backdoor to CnC, SQLi, Remote File Inclusions, etc. An Account Takeover attack is where, a cyber criminal uses stolen credentials to login as a genuine customer, perform unauthorized transactions without the victims knowledge, and in some cases commit fraud. This is a real problem that is impacting many banks and e-commerce sites today.
  3. Here is anatomy of a typical Account Takeover Attack: Harvest Credentials: Hackers purchase harvested credentials from various data breaches, and use launch account takeover attacks. Test Credentials: They test various credentials using bot networks that may be hiding behind TOR networks and proxy servers. Gain access: They bypass next generation firewalls and perimeter controls to launch web-based attacks that appear as legitimate traffic Steal Assets: Once they are in, they perform fraudulent transactions transferring money, stealing medical records or intellectual property. Alternatively, a hacker can grab user credentials from a Man-In-The-Browser attack or Phishing attack, and take over a user account on the web-site entirely skipping the TEST CREDENTIALS step.
  4. Present day perimeter defenses like – IPS/IDS or NG Firewalls are unable to stop web-based threats. According to the Verizon 2014 Report, 60% of the web application attacks by-pass current perimeter defenses. <click> Even-though NG-Firewalls are increasingly becoming application aware, they cannot detect the following types of OWASP Top-10 technical attacks, business logic attacks, include account takeover and fraud.
  5. Web Application Firewall protect in-coming HTTP traffic against web-based attacks that easily by-pass NG Firewalls, such as SQL-Injection, Cross Site Scripting, and those in the OWASP top-10. WAF customers can subscribe to the following Threat Radar services: Reputation: Insights based on reputation of source IP address Bot Protections: distinguishes threats coming from humans and bot networks Account Takeover protection: Protects website user accounts from attack and takeover – This a new subscription service is part of the latest SecureSpehere 11.5 release.
  6. ThreatRadar is Imperva’s crowd-sourced threat intelligence that arms the SecureSphere WAF with security policies and signatures that help detect web app attacks with incredible accuracy. This threat intel is gathered from leading threat researchers in Imperva’s Application Defense Center (ADC), combined with live attack information gathered from the community of SecureSphere WAF customers (who have opted in to share information). ThreatRadar feed is key to improving the detection accuracy of web app attacks and improve the signal to noise ratio of web traffic. We offer 3 types of subscription feeds. Reputation Service: Blocks web traffic from IP address with Bad-Reputation, such as malicious sites, bad geo-locations, sites sitting behind TOR networks/proxies, phishing sites, etc. Bot & DDoS Protection: Eliminates 30% of unwanted traffic coming from botnets and sites launching DDoS attacks. We get DDoS attack information from Imperva Incapsula, which offers Cloud-based DDoS protection. Account Takeover Protection service is new: Here we provide 2 types of threat intelligence to protect web user accounts from takeover attempts. Credential Intelligence – to prevent credential reconnaissance, which is a first stage in launching ATO attacks Device Intelligence – where we detect suspicious device behavior based on previous knowledge of devices with bad reputation, that have exhibited suspicious behavior such using evasion techniques, associated with multiple accounts. We use device detection/mitigation policies to determine whether to allow/deny login.
  7. SecureSphere WAF correlates the outputs of several detection engines to improve the signal to noise ratio of web traffic, before the traffic hits the web-server. The overall benefits correlating the results are – Removes unwanted traffic and reduces threats (e.g. Bot and DDoS traffic) Increases detection accuracy and improves efficiency of SOC by reducing alerts (e.g. Reputation) Improves User Protection and User Experience – no need for step-up authentication (e.g. ATO) Some of these engines are available by default in the WAF to perform. But not ALL of the engines have to be sued sequentially for protection. - Protocol Validation: checks if HTTP traffic complies with RFC standards. Attack signatures: Over 8000 attack signatures are used to check against known web attack vectors Application Profiling: is used to dynamically discovers application interfaces (URLs) and base-line acceptable user behavior. It eliminates the need for for manually updating checks as the application changes. ThreatRadar engines: are optional subscription services that provide threat intelligence feeds, which improve the attack detection accuracy Reputation sevrice, Bot/DDoS protection service, and ATO Protection which is the new service in the 11.5 release. WAF policies can use a combination of these threat feeds to determine the RISK level of a specific attack. We will see some examples of policies in the next few slides
  8. The SecureSphere WAF invokes ThreatRadar API calls after certain policy thresholds are met, such as Repeated login failures checked against a repository of stolen credentials, weak password, or privileged accounts/passwords Identifies repeated failures from same device (IP addr) to multiple accounts Mitigation Policies running on the WAF evaluates the results returned by ThreatRadar. Policy 1: Generate ALERT, when (X failed logins to multiple accounts are initiated from same IP) AND (a Brute-force attack is detected using Weak Passwords) Policy 2: BLOCK login, when ((X failed logins to multiple accounts are initiated from same IP) AND (TR returns evidence of Stolen Creds in use) AND (TR Bot Protection detects that the IP addr is a previously known Bot client)
  9. Now, let us look at how the WAF detects account takeover and takes policy-based mitigation action. Device Profiling: WAF injects java script to every device that attempts to log into the web application. The java script profiles the device and identifies if it is a new or returning devices accessing the web application. Risk Rules Evaluation: After every user successfully logs into WAF, the WAF invokes the ThreatRadar API that evaluates the risk rule using correlation of device reputation, evasion, and association. The rule determines the legitimacy of every user that logs in, and returns a risk score of low/medium/high. Mitigation Rules: The Risk score returned from ThreatRadar is correlated with other feeds in the WAF to determine the mitigation action performed on a specific web-login attempt. The results of this WAF Mitigation rule determines the mitigation action – Audit, Alert or Block.
  10. SecureSphere WAF has an ability to identify compromised users, based on mitigation action taken for each of the login attempts. It also enables the administrator to get a report of all compromised accounts, so he/she can schedule a password reset or lock-out the compromised accounts.
  11. Currently a very large bank is considering/evaluating the ATO ThreatRadar subscription service for their WAF installation. They are currently losing about $500K/month in ATO and/or Fraud. 20% of their online payments needs investigation for possible fraud. Here is a brief overview of the PROBLEM they are facing, their SOLUTION NEEDS, and how SecureSphere WAF is helping them. PROBLEM: The bank is seeing a significant increase in automated attacks such as Bots, MITB, DDoS and Phishing attacks They are also seeing bots using brute-force mechanisms to login to user accounts using stolen credentials These brute-force attacks result in account lockout, when several logins fail. Impacts banks business and reputation. Both Sec-Ops and Fraud teams are overwhelmed in manual analysis of logs records and attending to alerts. SOLUTION NEEDS: Bank want to proactively detect, what percentage of these attacks are via ATO, using known user/device behavior Need visibility into Bot vs human traffic, and visibility into compromised accounts with better accuracy - whose passwords have to be quickly reset Need additional threat intelligence related to the accounts and the device used to login, so the Fraud teams at the backend can improve IR processes SecureSphere WAF with ATO subscription is enabling them to: Proactively detect ATO attempts BEFORE fraud can be committed. Identify what percentage of fraudulent transactions are as result of ATO, versus legitimate users committing fraud. Enables them to detect automated attacks without step-up authentication which hurts user experience. Sec-Ops does not have to fight fires on a daily basis, since the noisy bots generating brute-force attacks have been addressed The Device Risk Score returned by ThreatRadar includes the reason why a specific Login attempt was flagged as HIGH-RSIK, which can be captured in reports that the Fraud Team can use in IR processes. Overall, Proactive ATO detection BEFORE fraud is committed, reduced work load on Sec-Ops and Fraud teams, and policy based mitigation actions have helped the bank save costs and improve ROI.
  12. In summary, the SecureSphere Web Application Firewall helps protect businesses against all types of Web application threats including Web attacks like SQL injection, bots, known malicious sources, and requests from prohibited or undesirable countries. It also stops business logic attacks like site scraping, comment spam in forums and message boards, phishing attacks and application DDoS attacks. SecureSphere can prevent Web fraud and man-in-the-browser attacks through its fraud prevention capabilities. It can also virtually patch vulnerabilities by integrating with application scanners and through its own inherent application security defenses. Overall, SecureSphere offers the most accurate and complete Web application security available and Imperva continually researches emerging Web threats to ensure that it will fully protect Web applications today and in the future. This, coupled with its scalable centralized management and its flexible and transparent deployment, is why SecureSphere is the most trusted Web application firewall in the world.
  13. Gartner Magic Quadrant Imperva has consistently innovated and led the market for data security, as the Gartner Magic Quadrant for Web Application Firewalls shows. If you’re not familiar with Web Application Firewalls, or WAFs as we call them, Gartner describes them by saying they provide “protection for custom Web applications that would otherwise go unprotected by other technologies.” In other words, the applications that drive business for organizations are exposed without a WAF. We are the Leader in this Magic Quadrant, which demonstrates our ability to deliver value to customers and outpace not just the competition, but more importantly, the hackers. What Gartner says about Leaders is that “In addition to providing technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements.” You can see that every other vendor finds themselves falling short on the Vision dimension. Challengers are typically selling a WAF as a bolt-on afterthought to their main product line. And Niche Players are focused on a regional market or narrow use cases. What that means in practical terms is that the other vendors here are not focused on data center security. We are unique in our vision and our ability to deliver on that vision. Credit: Gartner, Magic Quadrant for Web Application Firewalls, Jeremy D'Hoinne, Adam Hils, Greg Young, Joseph Feiman, 17 June 2014
  14. https://www.imperva.com/ld/technical_deep_dive.asp