SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
 
	
  
	
  
	
  
	
  
Will	
  Bechtel	
  
Director	
  of	
  Product	
  Management	
  -­‐	
  WAS	
  
Steve	
  McBride	
  
Director	
  of	
  Product	
  Management	
  –	
  WAF	
  
Qualys	
  Inc.,	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  April	
  2014	
  
QualysGuard	
  Web	
  Applica@on	
  Security	
  
Transforming	
  IT	
  Security	
  &	
  Compliance	
  
DETECTION
PREVENTION
REMEDIATION
FORENSICS
WebAppScanning MalwareDetection
WebApplicationFirewall
Exploits
BURPSuiteSourceCode
Log Analysis
WEB APPS
Qualys	
  Strategy	
  for	
  Web	
  App	
  Security	
  
•  Detec@on	
  
–  WAS,	
  MDS	
  
•  Protec@on	
  
–  WAF	
  (GA	
  3/2014)	
  
•  Monitoring/Forensics	
  
–  Log	
  Analysis	
  (Beta	
  Q4/2014)	
  
•  Remedia@on	
  
–  Interac>ve	
  Tes>ng	
  Tools*	
  
–  Remedia>on	
  Workflow*	
  
–  SCA	
  Correla>on*	
  
2	
  
*Services in development
DETECT
ANALYZE
PROTECT
COMPLY
Discovery Catolog
VulnAppScanningMalwareDetection
WebAppFirewall PCI OWASP
WEB APPS
Benefits	
  of	
  QG	
  WAS	
  Approach	
  
QualysGuard	
  plaHorm	
  delivers	
  integrated	
  soluJons	
  
•  Distributed	
  Scanning	
  
–  Cloud/Internal/Virtual	
  
•  Highly	
  Automated	
  
–  Integrated	
  Browser	
  
•  Accurate	
  
–  Low	
  False-­‐PosiJve	
  Rate	
  
•  Integrated	
  
–  Reuse	
  QA	
  Selenium	
  	
  
FuncJonal	
  TesJng	
  Scripts	
  
3	
  
Uses	
  the	
  Extensible	
  QG	
  Cloud	
  PlaHorm	
  
	
  
4	
  
Expanding	
  to	
  Real-­‐Time	
  Big	
  Data	
  and	
  CorrelaJon	
  
QG	
  WAS	
  SoluJon	
  
QG	
  WAS	
  does	
  for	
  Web	
  Apps	
  what	
  QG	
  VM	
  does	
  for	
  devices	
  
5	
  
Automated	
  and	
  conJnuous	
  cycle	
  	
  
Web	
  Applica@ons	
  
MiJgate	
  
Discover	
  and	
  Catalog	
  
Remediate	
  
and	
  Audit	
  
RI	
  SK	
  
IdenJfy	
  
VulnerabiliJes	
  
QG	
  WAS	
  Today	
  
Best	
  PracJces	
  Scanning	
  SoluJon	
  	
  
•  Collabora@on	
  
–  Involve	
  all	
  the	
  ApplicaJon	
  
Stakeholders	
  
•  Ease	
  of	
  Use	
  
–  Dashboard/Wizards/Context	
  
sensiJve	
  
•  Vulnerability	
  Metrics	
  
–  Tag	
  based	
  reporJng	
  
–  Configurable	
  Formats	
  
6	
  
QG	
  WAS	
  +	
  MDS	
  	
  
Integrated	
  Website	
  Malware	
  Monitoring	
  –	
  Completed!	
  
•  Malware	
  Protec@on	
  
–  Safeguard	
  your	
  website	
  
users	
  and	
  brand	
  
reputaJon	
  
•  4	
  Detec@on	
  Techniques	
  
–  AnJvirus	
  –	
  for	
  documents	
  
–  HeurisJc	
  
–  ReputaJon	
  
–  Behavioral	
  
•  Addresses	
  
–  Zero	
  Day	
  Risk	
  
7	
  
QG	
  WAS	
  	
  
A_ack	
  Proxy	
  IntegraJon	
  –	
  Phase	
  1	
  –Completed!	
  
•  Store	
  and	
  manage	
  
–  Burp	
  scan	
  data	
  	
  
–  Share	
  safely	
  
•  Act	
  on	
  Burp	
  scan	
  findings	
  
–  Associate	
  with	
  web	
  app	
  
–  Mark	
  as	
  risk	
  accepted,	
  etc	
  
–  Filter	
  based	
  on	
  a_ributes	
  
	
  
8	
  
QG	
  WAS	
  	
  
Sitemap	
  implementaJon	
  –	
  Completed!	
  
•  Visually	
  Navigate	
  Site	
  
–  Drill	
  in/Drill	
  Out	
  
–  Issue	
  counts	
  at	
  each	
  level	
  
–  Filter	
  	
  
•  Ac@ons	
  
–  Create	
  new	
  web	
  app	
  
–  Black	
  list	
  
–  White	
  list	
  
	
  
9	
  
QG	
  WAS	
  DirecJons	
  in	
  2014	
  
Full	
  Web	
  App	
  TesJng	
  SoluJon	
  	
  
	
  
•  Addi@onal	
  Interac@ve	
  Tools	
  
Support	
  (Burp/ZAP)	
  
–  Store	
  Manual	
  Findings	
  
–  Trend/Report	
  with	
  Automated	
  
findings	
  
–  Complete	
  Web	
  App	
  TesJng	
  
Picture	
  
–  Send	
  WAS	
  A_ack	
  Requests	
  to	
  
a_ack	
  proxies	
  	
  
•  Remedia@on	
  Workflow	
  
	
  
•  SCA	
  Correla@on	
  
10	
  
WAS	
  Roadmap	
  
WAS 3.3
Q2 2014
•  Bulk Update
•  Update info across
multiple web apps
•  Easy to make partitioned
or global changes
•  Supports changing one or
many attributes
•  Ignore sensitive content
findings
•  Cancel scans in schedule
status
•  Check report quotas
WAS 3.4
Q3 2014
•  Multi Scan/Schedule
•  Manages large scale scan
jobs
•  Scan jobs batched by tags
•  Groups scan data by job
WAS 3.5
Q4 2014
•  Scheduled Reporting
•  Send on scheduled basis
•  Users sent link to report
•  Report Templates
•  Save report options as
report template.
QG WAS Customers:
•  Deploy	
  virtual	
  patches	
  to	
  WAF	
  using	
  
the	
  vulnerabiliJes	
  idenJfied	
  in	
  WAS	
  
–  WAS	
  already	
  supports	
  Imperva,	
  F5,	
  
Citrix,	
  Beeware	
  
•  Combine	
  WAS	
  and	
  MDS	
  scanning	
  of	
  
sites	
  
•  WAF	
  to	
  provide	
  WAS/MDS	
  with	
  site	
  
resource	
  structure	
  to	
  ensure	
  complete	
  
scanning	
  coverage	
  
WAS
VM
QualysGuard	
  PlaHorm	
  SoluJons	
  
Seamless	
  integraJon	
  with	
  other	
  Qualys	
  services	
  
12	
  
MDS
WAF
LM
How	
  OrganizaJons	
  Leverage	
  WAS	
  
MicrosoY	
  
•  BUSINESS	
  CHALLENGE	
  
–  Assess	
  the	
  security	
  of	
  thousands	
  of	
  web	
  apps/	
  short	
  turn	
  around	
  @mes	
  
–  h_p://www.qualys.com/customers/success-­‐stories/reigning-­‐in-­‐global-­‐
web-­‐applicaJon-­‐security-­‐risk-­‐at-­‐microsoi/	
  
	
  
•  WHY	
  THEY	
  CHOSE	
  QUALYSGUARD	
  
–  Proven	
  more	
  accurate	
  than	
  other	
  web	
  applica@on	
  scanners	
  
–  Comprehensive	
  reports	
  -­‐	
  acJonable	
  informaJon	
  	
  
–  A	
  highly	
  accurate,	
  extensive	
  database	
  of	
  up	
  to	
  date	
  security	
  checks	
  
–  Easiest	
  to	
  use	
  
13	
  
14	
  
Why	
  do	
  we	
  win?	
  
•  Strengths	
  
–  Scale	
  (We	
  can	
  easily	
  handle	
  about	
  10000	
  apps	
  in	
  a	
  subscrip@on)	
  
– Most	
  are	
  seat	
  licensed	
  and	
  installed	
  in	
  the	
  enterprise	
  (High	
  TCO)	
  
–  Data	
  Correla@on,	
  single	
  dashboard	
  for	
  DAST	
  ac@vi@es	
  
– Not	
  one	
  at	
  a	
  Jme	
  events,	
  correlaJon	
  done	
  by	
  default	
  
–  Cost,	
  per	
  app	
  pricing	
  beats	
  out	
  seat	
  licenses	
  for	
  most	
  compe@tors	
  
– No	
  longer	
  have	
  to	
  make	
  the	
  choice	
  of	
  what	
  to	
  scan	
  
–  TAM,	
  we	
  don’t	
  sell	
  and	
  walk	
  away!	
  
– Our	
  people	
  make	
  a	
  huge	
  difference.	
  	
  We	
  make	
  the	
  customer	
  successful!	
  
	
  
15	
  
WAS Benefits
Integration with QualysGuard Platform
Reduced TCO
Scan Everything
Total	
  Cost	
  of	
  Ownership	
  (TCO)	
  
•  Understanding	
  the	
  components	
  for	
  AppSec	
  
–  People	
  
– Keeping	
  it	
  simple,	
  $140,000	
  salary	
  +	
  benefits	
  
– Able	
  to	
  complete	
  ~40	
  ApplicaJon	
  Assessments	
  per	
  year	
  
–  Tools	
  	
  
– A_ack	
  Proxy	
  
– Legacy	
  ApplicaJon	
  Scanner	
  with	
  maintenance	
  and	
  a	
  server	
  to	
  run	
  it	
  on	
  
$10,000	
  
•  TCO	
  =	
  Total	
  Cost/Total	
  Produc@vity	
  
–  150,000/40=	
  $3750	
  Per	
  ApplicaJon	
  
	
  
16	
  
Why	
  do	
  we	
  lose?	
  
•  Improvement	
  Opportuni@es	
  
–  Head	
  to	
  Head	
  comparisons	
  against	
  known	
  vulnerable	
  apps	
  
– We	
  don’t	
  play	
  that	
  game.	
  	
  Don’t	
  let	
  them.	
  
–  Difficult	
  to	
  manage	
  at	
  scale	
  
– Bulk	
  Edits	
  and	
  Scans	
  are	
  coming	
  soon.	
  
–  Technologies	
  we	
  don’t	
  support	
  
– Adobe	
  Flash,	
  Oracle	
  Java,	
  Silverlight	
  etc	
  …	
  (appx	
  3%	
  of	
  sites	
  on	
  the	
  
Internet)	
  
–  OTHERS???	
  
17	
  
WAS	
  ASV	
  Growth	
  -­‐	
  Aggregate	
  
18	
  
WAS	
  Subscriber	
  Growth	
  -­‐	
  Aggregate	
  
19	
  
Summary	
  
•  Most	
  scalable,	
  automated	
  and	
  cost	
  effecJve	
  DAST	
  
soluJon	
  on	
  the	
  market	
  today.	
  
•  QualysGuard	
  plaHorm	
  integrates	
  web	
  applicaJon	
  
security	
  into	
  the	
  enterprise.	
  
	
  
20	
  
21	
  
Web	
  Applica@on	
  Firewall	
  
GA	
  announced	
  at	
  RSA	
  2014	
  
3/2014	
  
Are	
  everywhere.	
  	
  
Web	
  ApplicaJons	
  
HTTP	
  Powers	
  Your	
  Business	
  
Do	
  everything.	
  
HTTP	
  
Why	
  worry	
  about	
  web	
  applicaJons?	
  	
  
“99%	
  of	
  all	
  applicaJons	
  tested	
  in	
  2012	
  have	
  one	
  or	
  more	
  
serious	
  security	
  vulnerabiliJes.	
  
	
  And	
  with	
  a	
  median	
  number	
  of	
  vulnerabili@es	
  per	
  app	
  of	
  13,	
  	
  
it’s	
  no	
  wonder	
  that	
  applicaJon-­‐level	
  a_acks	
  are	
  a	
  focus	
  for	
  hackers.”	
  
“Only	
  13%	
  complied	
  [with	
  the	
  OWASP	
  Top	
  10]	
  
on	
  first	
  submission.”	
  	
  
We’re	
  vulnerable.	
  	
  Now	
  what?	
  
Suto,	
  Larry,	
  Analyzing	
  the	
  EffecJveness	
  of	
  Web	
  ApplicaJon	
  Firewalls,	
  Nov.	
  2011.	
  h_p://www.slideshare.net/lbsuto/analyzing-­‐
the-­‐effecJvess-­‐of-­‐web-­‐applicaJon-­‐firewalls	
  
TEKSystems	
  Network	
  Services.	
  h_p://www.teksystems.com/resources/pressroom/2013/teksystems-­‐cyber-­‐security-­‐month.	
  
“WAF	
  solu@ons	
  must	
  be	
  tuned	
  by	
  a	
  trained	
  professional.”	
  	
  (Suto,	
  4)	
  
“Only	
  15%	
  were	
  very	
  confident	
  they	
  have	
  
security-­‐related	
  skill	
  sets…”	
  
	
  
“Half	
  of	
  respondents	
  believe	
  the	
  lack	
  of	
  
qualified	
  security	
  talent...”	
  
what	
  if	
  I	
  had…	
  
•  Adap@ve,	
  responsive	
  security	
  that	
  updates	
  
itself	
  
•  Near-­‐immediate	
  deployment	
  
•  Minimal	
  administra@ve	
  overhead	
  
•  No	
  security	
  exper@se	
  required	
  
•  Mul@ple	
  architectures	
  
Qualys	
  Approach	
  
Always	
  the	
  best	
  protec@on	
  
Qualys	
  WAF	
  expert	
  security	
  ruleset	
  is	
  built	
  and	
  
maintained	
  by	
  dedicated	
  security	
  researchers	
  
based	
  upon	
  the	
  latest	
  intel	
  and	
  trends	
  across	
  
the	
  Qualys	
  customer	
  base.	
  	
  WAF	
  sensors	
  self-­‐
update	
  with	
  latest	
  soiware	
  and	
  rules.	
  
Scalable	
  
Deploy	
  as	
  many	
  WAF	
  sensors	
  as	
  you	
  need,	
  on	
  
mulJple	
  datacenter	
  and	
  Cloud	
  plaHorms	
  
Manage	
  your	
  protected	
  sites,	
  WAF	
  clusters,	
  
and	
  security	
  events	
  from	
  a	
  single	
  UI	
  
26	
  
Integrated	
  in	
  QualysGuard	
  
Automated	
  setup	
  from	
  WAS	
  
QualysGuard	
  WAS	
  and	
  WAF	
  share	
  
informaJon	
  about	
  web	
  sites	
  and	
  their	
  
weaknesses,	
  speeding	
  deployment	
  of	
  
personalized	
  security	
  policies.	
  
Correlated	
  events	
  
QualysGuard	
  WAS	
  and	
  VM	
  can	
  conJnuously	
  
scan	
  your	
  sites	
  to	
  find	
  vulnerabiliJes	
  
WAF	
  sensors	
  bring	
  visibility	
  to	
  live	
  threats	
  
27	
  
Single	
  SaaS	
  Administra@on	
  Point	
  
Enforcement	
  Points	
  As	
  Needed	
  
Qualys’	
  Distributed	
  SoluJon	
  
28	
  
WAF	
  
WAF	
  
WAF	
  
WAF	
  
QualysGuard	
  
Cloud	
  PlaHorm	
  
WAF	
  
WAF	
  
SoluJon	
  Architecture	
  
29	
  
WAF	
  
WAF	
  
WAF	
  
WAF	
  
“clean”	
  traffic	
  
Reverse	
  Proxy	
  OperaJon	
  
•  Direct	
  traffic	
  to	
  WAF	
  
–  DNS	
  
–  Load	
  Balancer	
  ConfiguraJon	
  
•  WAF	
  sensor	
  inspects	
  all	
  traffic	
  
and	
  forwards	
  to	
  origin	
  
•  Server	
  responses	
  are	
  inspected	
  
upon	
  egress	
  
Security	
  Ruleset	
  
31	
  
SQL
Injection
Cross Site
Scripting
Information
leakage
Command
Injection
Remote File
Inclusion
LDAP
Injection
SSI Injection
Xpath
Injection
Local File
Inclusion
Three-­‐Step	
  ConfiguraJon	
  
Define	
  your	
  Site	
  
Shared	
  site	
  profile	
  with	
  WAS	
  
Associate	
  a	
  WAF	
  (cluster)	
  
Associate	
  a	
  Security	
  Policy	
  
	
  
32	
  
Building	
  a	
  Security	
  Policy	
  
Built	
  around	
  expert	
  
rules	
  for	
  known	
  threats	
  
User	
  adjusts	
  sensi@vity	
  
according	
  to	
  their	
  
business	
  context	
  and	
  
tolerance	
  
	
  
33	
  
Defining	
  and	
  Deploying	
  a	
  WAF	
  Cluster	
  
Give	
  it	
  a	
  name	
  
Copy	
  your	
  “personaliza@on	
  
code”	
  
Paste	
  the	
  code	
  when	
  
deploying	
  your	
  appliances	
  
34	
  
Available	
  for	
  mulJple	
  plaHorms	
  
35	
  
Amazon	
  EC2	
  -­‐	
  GA	
   VMware	
  vCenter	
  -­‐	
  Beta	
  
Exchange	
  &	
  Sharepoint	
  
Edi>on	
  (TBD)	
  
MicrosoD	
  Hyper-­‐V	
  
and	
  Azure	
  (H2	
  2014)	
  
New	
  HW	
  Appliance	
  ?	
  
Pricing	
  
•  Priced	
  per	
  Applica@on	
  protected	
  
– Includes	
  2	
  virtual	
  appliances	
  
•  Express	
  Lite	
  
– 	
  Starts	
  at	
  1,995	
  EUR	
  for	
  one	
  applicaJon	
  
•  Express	
  
– 	
  Starts	
  at	
  2,995	
  EUR	
  for	
  one	
  applicaJon	
  
•  Enterprise	
  
– Starts	
  at	
  9,995	
  EUR	
  for	
  one	
  applicaJon	
  
WAF	
  Roadmap	
  
WAF 1.1 (Portal 2.4)
Q2 2014
•  VMware image provisioning
•  Support for non-standard
HTTP ports
•  Workflow improvements (site
and policy components)
WAF 1.2 (Portal 2.5)
Q3 2014
•  UI improvements
•  Tab management on event
pages
•  Improved dashboard
functionality
•  Improved SSL certificate
support
•  Improved appliance support
and support for additional
virtualization platforms
WAF 1.3 (Portal 2.6)
Q4 2014
•  WAS Results influence WAF
security engine
•  Support for customized
block pages
•  Improved visibility into
appliance networking and
troubleshooting
Thank You
wbechtel@qualys.com
smcbride@qualys.com
fcatucci@qualys.com
ConJnuous	
  Security	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Mobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTGMobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTGRomuald SZKUDLAREK
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msftCss sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msftAlert Logic
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...CloudPassage
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Jason Mashak
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer OverviewStanimir Markov
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Jason Mashak
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSAlert Logic
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Ryan Hodgin
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsAlert Logic
 
Day 3: Security Auditing and Compliance
Day 3: Security Auditing and ComplianceDay 3: Security Auditing and Compliance
Day 3: Security Auditing and ComplianceVMware Tanzu
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 

Was ist angesagt? (20)

Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Mobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTGMobile Security at OWASP - MASVS and MSTG
Mobile Security at OWASP - MASVS and MSTG
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msftCss sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer Overview
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Day 3: Security Auditing and Compliance
Day 3: Security Auditing and ComplianceDay 3: Security Auditing and Compliance
Day 3: Security Auditing and Compliance
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 

Ähnlich wie QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Application Firewall

SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)hayesct
 
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)SolarWinds
 
Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionDevOps.com
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
IW14 Session: webMethods World
IW14 Session: webMethods WorldIW14 Session: webMethods World
IW14 Session: webMethods WorldSoftware AG
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationKacy Clarke
 
Cloud Migration - The Earlier You Instrument, The Faster You Go
Cloud Migration - The Earlier You Instrument, The Faster You GoCloud Migration - The Earlier You Instrument, The Faster You Go
Cloud Migration - The Earlier You Instrument, The Faster You GoKevin Downs
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
 
SolarWinds SAM Product Overview & Feature Highlights
SolarWinds SAM Product Overview & Feature HighlightsSolarWinds SAM Product Overview & Feature Highlights
SolarWinds SAM Product Overview & Feature HighlightsSolarWinds
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesAvi Networks
 
WAF Deployment proposal
WAF Deployment proposalWAF Deployment proposal
WAF Deployment proposalJeremy Quadri
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Frameworkjpubal
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...CA Technologies
 
Building a Cloud Native Platform with WSO2 Private PaaS
Building a Cloud Native Platform with WSO2 Private PaaSBuilding a Cloud Native Platform with WSO2 Private PaaS
Building a Cloud Native Platform with WSO2 Private PaaSWSO2
 
(ENT306) Application Portfolio Migration | AWS re:Invent 2014
(ENT306) Application Portfolio Migration | AWS re:Invent 2014(ENT306) Application Portfolio Migration | AWS re:Invent 2014
(ENT306) Application Portfolio Migration | AWS re:Invent 2014Amazon Web Services
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire ServicesMarlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire ServicesMarlabs
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesSoftware Guru
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 

Ähnlich wie QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Application Firewall (20)

SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
 
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
SolarWinds Federal Webinar - Maximizing Your Deployment with Appstack (Jan2016)
 
Connect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API ProtectionConnect Ops and Security with Flexible Web App and API Protection
Connect Ops and Security with Flexible Web App and API Protection
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
IW14 Session: webMethods World
IW14 Session: webMethods WorldIW14 Session: webMethods World
IW14 Session: webMethods World
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
 
Cloud Migration - The Earlier You Instrument, The Faster You Go
Cloud Migration - The Earlier You Instrument, The Faster You GoCloud Migration - The Earlier You Instrument, The Faster You Go
Cloud Migration - The Earlier You Instrument, The Faster You Go
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
SolarWinds SAM Product Overview & Feature Highlights
SolarWinds SAM Product Overview & Feature HighlightsSolarWinds SAM Product Overview & Feature Highlights
SolarWinds SAM Product Overview & Feature Highlights
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application Services
 
WAF Deployment proposal
WAF Deployment proposalWAF Deployment proposal
WAF Deployment proposal
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
 
Building a Cloud Native Platform with WSO2 Private PaaS
Building a Cloud Native Platform with WSO2 Private PaaSBuilding a Cloud Native Platform with WSO2 Private PaaS
Building a Cloud Native Platform with WSO2 Private PaaS
 
(ENT306) Application Portfolio Migration | AWS re:Invent 2014
(ENT306) Application Portfolio Migration | AWS re:Invent 2014(ENT306) Application Portfolio Migration | AWS re:Invent 2014
(ENT306) Application Portfolio Migration | AWS re:Invent 2014
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services
 
Marlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire ServicesMarlabs Capabilities Overview: Guidewire Services
Marlabs Capabilities Overview: Guidewire Services
 
Encontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de AplicacionesEncontrando la Aguja en el Rendimiento de Aplicaciones
Encontrando la Aguja en el Rendimiento de Aplicaciones
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 

Mehr von Risk Analysis Consultants, s.r.o.

RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRisk Analysis Consultants, s.r.o.
 
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringQualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 

Mehr von Risk Analysis Consultants, s.r.o. (20)

Best practice v testování zranitelností
Best practice v testování zranitelnostíBest practice v testování zranitelností
Best practice v testování zranitelností
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Představení nástroje Nuix
Představení nástroje NuixPředstavení nástroje Nuix
Představení nástroje Nuix
 
FTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalaceFTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalace
 
Použití EnCase EnScript
Použití EnCase EnScriptPoužití EnCase EnScript
Použití EnCase EnScript
 
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
 
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
 
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringQualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
 
QualysGuard InfoDay 2014 - Asset management
QualysGuard InfoDay 2014  - Asset managementQualysGuard InfoDay 2014  - Asset management
QualysGuard InfoDay 2014 - Asset management
 
QualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WASQualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WAS
 
QualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy complianceQualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy compliance
 
QualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability managementQualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability management
 
Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7
 
Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7
 
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic ImagerVybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
 
QualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys QuestionnaireQualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys Questionnaire
 
QualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QGQualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QG
 
QualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application FirewallQualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application Firewall
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 

Kürzlich hochgeladen

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Kürzlich hochgeladen (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 

QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Application Firewall

  • 1.           Will  Bechtel   Director  of  Product  Management  -­‐  WAS   Steve  McBride   Director  of  Product  Management  –  WAF   Qualys  Inc.,                                                                                                                                          April  2014   QualysGuard  Web  Applica@on  Security   Transforming  IT  Security  &  Compliance  
  • 2. DETECTION PREVENTION REMEDIATION FORENSICS WebAppScanning MalwareDetection WebApplicationFirewall Exploits BURPSuiteSourceCode Log Analysis WEB APPS Qualys  Strategy  for  Web  App  Security   •  Detec@on   –  WAS,  MDS   •  Protec@on   –  WAF  (GA  3/2014)   •  Monitoring/Forensics   –  Log  Analysis  (Beta  Q4/2014)   •  Remedia@on   –  Interac>ve  Tes>ng  Tools*   –  Remedia>on  Workflow*   –  SCA  Correla>on*   2   *Services in development
  • 3. DETECT ANALYZE PROTECT COMPLY Discovery Catolog VulnAppScanningMalwareDetection WebAppFirewall PCI OWASP WEB APPS Benefits  of  QG  WAS  Approach   QualysGuard  plaHorm  delivers  integrated  soluJons   •  Distributed  Scanning   –  Cloud/Internal/Virtual   •  Highly  Automated   –  Integrated  Browser   •  Accurate   –  Low  False-­‐PosiJve  Rate   •  Integrated   –  Reuse  QA  Selenium     FuncJonal  TesJng  Scripts   3  
  • 4. Uses  the  Extensible  QG  Cloud  PlaHorm     4   Expanding  to  Real-­‐Time  Big  Data  and  CorrelaJon  
  • 5. QG  WAS  SoluJon   QG  WAS  does  for  Web  Apps  what  QG  VM  does  for  devices   5   Automated  and  conJnuous  cycle     Web  Applica@ons   MiJgate   Discover  and  Catalog   Remediate   and  Audit   RI  SK   IdenJfy   VulnerabiliJes  
  • 6. QG  WAS  Today   Best  PracJces  Scanning  SoluJon     •  Collabora@on   –  Involve  all  the  ApplicaJon   Stakeholders   •  Ease  of  Use   –  Dashboard/Wizards/Context   sensiJve   •  Vulnerability  Metrics   –  Tag  based  reporJng   –  Configurable  Formats   6  
  • 7. QG  WAS  +  MDS     Integrated  Website  Malware  Monitoring  –  Completed!   •  Malware  Protec@on   –  Safeguard  your  website   users  and  brand   reputaJon   •  4  Detec@on  Techniques   –  AnJvirus  –  for  documents   –  HeurisJc   –  ReputaJon   –  Behavioral   •  Addresses   –  Zero  Day  Risk   7  
  • 8. QG  WAS     A_ack  Proxy  IntegraJon  –  Phase  1  –Completed!   •  Store  and  manage   –  Burp  scan  data     –  Share  safely   •  Act  on  Burp  scan  findings   –  Associate  with  web  app   –  Mark  as  risk  accepted,  etc   –  Filter  based  on  a_ributes     8  
  • 9. QG  WAS     Sitemap  implementaJon  –  Completed!   •  Visually  Navigate  Site   –  Drill  in/Drill  Out   –  Issue  counts  at  each  level   –  Filter     •  Ac@ons   –  Create  new  web  app   –  Black  list   –  White  list     9  
  • 10. QG  WAS  DirecJons  in  2014   Full  Web  App  TesJng  SoluJon       •  Addi@onal  Interac@ve  Tools   Support  (Burp/ZAP)   –  Store  Manual  Findings   –  Trend/Report  with  Automated   findings   –  Complete  Web  App  TesJng   Picture   –  Send  WAS  A_ack  Requests  to   a_ack  proxies     •  Remedia@on  Workflow     •  SCA  Correla@on   10  
  • 11. WAS  Roadmap   WAS 3.3 Q2 2014 •  Bulk Update •  Update info across multiple web apps •  Easy to make partitioned or global changes •  Supports changing one or many attributes •  Ignore sensitive content findings •  Cancel scans in schedule status •  Check report quotas WAS 3.4 Q3 2014 •  Multi Scan/Schedule •  Manages large scale scan jobs •  Scan jobs batched by tags •  Groups scan data by job WAS 3.5 Q4 2014 •  Scheduled Reporting •  Send on scheduled basis •  Users sent link to report •  Report Templates •  Save report options as report template.
  • 12. QG WAS Customers: •  Deploy  virtual  patches  to  WAF  using   the  vulnerabiliJes  idenJfied  in  WAS   –  WAS  already  supports  Imperva,  F5,   Citrix,  Beeware   •  Combine  WAS  and  MDS  scanning  of   sites   •  WAF  to  provide  WAS/MDS  with  site   resource  structure  to  ensure  complete   scanning  coverage   WAS VM QualysGuard  PlaHorm  SoluJons   Seamless  integraJon  with  other  Qualys  services   12   MDS WAF LM
  • 13. How  OrganizaJons  Leverage  WAS   MicrosoY   •  BUSINESS  CHALLENGE   –  Assess  the  security  of  thousands  of  web  apps/  short  turn  around  @mes   –  h_p://www.qualys.com/customers/success-­‐stories/reigning-­‐in-­‐global-­‐ web-­‐applicaJon-­‐security-­‐risk-­‐at-­‐microsoi/     •  WHY  THEY  CHOSE  QUALYSGUARD   –  Proven  more  accurate  than  other  web  applica@on  scanners   –  Comprehensive  reports  -­‐  acJonable  informaJon     –  A  highly  accurate,  extensive  database  of  up  to  date  security  checks   –  Easiest  to  use   13  
  • 14. 14  
  • 15. Why  do  we  win?   •  Strengths   –  Scale  (We  can  easily  handle  about  10000  apps  in  a  subscrip@on)   – Most  are  seat  licensed  and  installed  in  the  enterprise  (High  TCO)   –  Data  Correla@on,  single  dashboard  for  DAST  ac@vi@es   – Not  one  at  a  Jme  events,  correlaJon  done  by  default   –  Cost,  per  app  pricing  beats  out  seat  licenses  for  most  compe@tors   – No  longer  have  to  make  the  choice  of  what  to  scan   –  TAM,  we  don’t  sell  and  walk  away!   – Our  people  make  a  huge  difference.    We  make  the  customer  successful!     15   WAS Benefits Integration with QualysGuard Platform Reduced TCO Scan Everything
  • 16. Total  Cost  of  Ownership  (TCO)   •  Understanding  the  components  for  AppSec   –  People   – Keeping  it  simple,  $140,000  salary  +  benefits   – Able  to  complete  ~40  ApplicaJon  Assessments  per  year   –  Tools     – A_ack  Proxy   – Legacy  ApplicaJon  Scanner  with  maintenance  and  a  server  to  run  it  on   $10,000   •  TCO  =  Total  Cost/Total  Produc@vity   –  150,000/40=  $3750  Per  ApplicaJon     16  
  • 17. Why  do  we  lose?   •  Improvement  Opportuni@es   –  Head  to  Head  comparisons  against  known  vulnerable  apps   – We  don’t  play  that  game.    Don’t  let  them.   –  Difficult  to  manage  at  scale   – Bulk  Edits  and  Scans  are  coming  soon.   –  Technologies  we  don’t  support   – Adobe  Flash,  Oracle  Java,  Silverlight  etc  …  (appx  3%  of  sites  on  the   Internet)   –  OTHERS???   17  
  • 18. WAS  ASV  Growth  -­‐  Aggregate   18  
  • 19. WAS  Subscriber  Growth  -­‐  Aggregate   19  
  • 20. Summary   •  Most  scalable,  automated  and  cost  effecJve  DAST   soluJon  on  the  market  today.   •  QualysGuard  plaHorm  integrates  web  applicaJon   security  into  the  enterprise.     20  
  • 21. 21   Web  Applica@on  Firewall   GA  announced  at  RSA  2014   3/2014  
  • 22. Are  everywhere.     Web  ApplicaJons   HTTP  Powers  Your  Business   Do  everything.   HTTP  
  • 23. Why  worry  about  web  applicaJons?     “99%  of  all  applicaJons  tested  in  2012  have  one  or  more   serious  security  vulnerabiliJes.    And  with  a  median  number  of  vulnerabili@es  per  app  of  13,     it’s  no  wonder  that  applicaJon-­‐level  a_acks  are  a  focus  for  hackers.”   “Only  13%  complied  [with  the  OWASP  Top  10]   on  first  submission.”    
  • 24. We’re  vulnerable.    Now  what?   Suto,  Larry,  Analyzing  the  EffecJveness  of  Web  ApplicaJon  Firewalls,  Nov.  2011.  h_p://www.slideshare.net/lbsuto/analyzing-­‐ the-­‐effecJvess-­‐of-­‐web-­‐applicaJon-­‐firewalls   TEKSystems  Network  Services.  h_p://www.teksystems.com/resources/pressroom/2013/teksystems-­‐cyber-­‐security-­‐month.   “WAF  solu@ons  must  be  tuned  by  a  trained  professional.”    (Suto,  4)   “Only  15%  were  very  confident  they  have   security-­‐related  skill  sets…”     “Half  of  respondents  believe  the  lack  of   qualified  security  talent...”  
  • 25. what  if  I  had…   •  Adap@ve,  responsive  security  that  updates   itself   •  Near-­‐immediate  deployment   •  Minimal  administra@ve  overhead   •  No  security  exper@se  required   •  Mul@ple  architectures  
  • 26. Qualys  Approach   Always  the  best  protec@on   Qualys  WAF  expert  security  ruleset  is  built  and   maintained  by  dedicated  security  researchers   based  upon  the  latest  intel  and  trends  across   the  Qualys  customer  base.    WAF  sensors  self-­‐ update  with  latest  soiware  and  rules.   Scalable   Deploy  as  many  WAF  sensors  as  you  need,  on   mulJple  datacenter  and  Cloud  plaHorms   Manage  your  protected  sites,  WAF  clusters,   and  security  events  from  a  single  UI   26  
  • 27. Integrated  in  QualysGuard   Automated  setup  from  WAS   QualysGuard  WAS  and  WAF  share   informaJon  about  web  sites  and  their   weaknesses,  speeding  deployment  of   personalized  security  policies.   Correlated  events   QualysGuard  WAS  and  VM  can  conJnuously   scan  your  sites  to  find  vulnerabiliJes   WAF  sensors  bring  visibility  to  live  threats   27  
  • 28. Single  SaaS  Administra@on  Point   Enforcement  Points  As  Needed   Qualys’  Distributed  SoluJon   28   WAF   WAF   WAF   WAF   QualysGuard   Cloud  PlaHorm   WAF   WAF  
  • 29. SoluJon  Architecture   29   WAF   WAF   WAF   WAF   “clean”  traffic  
  • 30. Reverse  Proxy  OperaJon   •  Direct  traffic  to  WAF   –  DNS   –  Load  Balancer  ConfiguraJon   •  WAF  sensor  inspects  all  traffic   and  forwards  to  origin   •  Server  responses  are  inspected   upon  egress  
  • 31. Security  Ruleset   31   SQL Injection Cross Site Scripting Information leakage Command Injection Remote File Inclusion LDAP Injection SSI Injection Xpath Injection Local File Inclusion
  • 32. Three-­‐Step  ConfiguraJon   Define  your  Site   Shared  site  profile  with  WAS   Associate  a  WAF  (cluster)   Associate  a  Security  Policy     32  
  • 33. Building  a  Security  Policy   Built  around  expert   rules  for  known  threats   User  adjusts  sensi@vity   according  to  their   business  context  and   tolerance     33  
  • 34. Defining  and  Deploying  a  WAF  Cluster   Give  it  a  name   Copy  your  “personaliza@on   code”   Paste  the  code  when   deploying  your  appliances   34  
  • 35. Available  for  mulJple  plaHorms   35   Amazon  EC2  -­‐  GA   VMware  vCenter  -­‐  Beta   Exchange  &  Sharepoint   Edi>on  (TBD)   MicrosoD  Hyper-­‐V   and  Azure  (H2  2014)   New  HW  Appliance  ?  
  • 36. Pricing   •  Priced  per  Applica@on  protected   – Includes  2  virtual  appliances   •  Express  Lite   –   Starts  at  1,995  EUR  for  one  applicaJon   •  Express   –   Starts  at  2,995  EUR  for  one  applicaJon   •  Enterprise   – Starts  at  9,995  EUR  for  one  applicaJon  
  • 37. WAF  Roadmap   WAF 1.1 (Portal 2.4) Q2 2014 •  VMware image provisioning •  Support for non-standard HTTP ports •  Workflow improvements (site and policy components) WAF 1.2 (Portal 2.5) Q3 2014 •  UI improvements •  Tab management on event pages •  Improved dashboard functionality •  Improved SSL certificate support •  Improved appliance support and support for additional virtualization platforms WAF 1.3 (Portal 2.6) Q4 2014 •  WAS Results influence WAF security engine •  Support for customized block pages •  Improved visibility into appliance networking and troubleshooting