SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Intelligent


The  Best  Defense  Against  Web  Application  Attacks
Intelligent  
   No.1  in  Korean  
   Web  Application  Firewall  Market  

      When  it  comes  to  web  application  firewall,  WAPPLES  is  it!  

     WAPPLES  is  the  web  application  firewall(WAF)  selected  by  most  customers.  Its  unique  and  original  
     smart  security  engine  cuts  off  even  unknown  attacks,  performs  precise  and  perfect  detection,  and
     delivers  the  best  performance  even  with  all  types  of  embedded  security  functions.  With  its  easy  security
     setup  and  convenience  of  operation,  WAPPLES  is  leading  the  popularization  of  web  application  firewall
     and  securing  a  broad  range  of  customers.  




                                             >>
                                                       Immediate  detection  of  mutated  attacks  by  embedded  smart  engine
              Perfect  detection,
                                                       Precise  detection  through  the  analysis  of  attack  techniques
             high-­level  security
                                                       Prevents  false-­positive  detection  through  logical  multi-­detection  techniques




         Delivers  consistent
          high  performance                  >>        Delivers  high  performance  through  optimized  attack  detection  
                                                       Maintains  high  performance  in  high-­level  security  environments




                                             >>
                                                       Installation  without  changing  the  existing  system  
       Easy  and  convenient                           Intuitive  security  setup  using  the  setup  wizard
            security  control                          Integrated  control  of  a  number  of  web  application  firewalls  (optional)  




                                             >>
                                                       Supports  various  network  environments  including  
                                                       inline/reverse  proxy/monitoring/High  Availability(HA)  configuration,  etc.  
         Support  for  various
          web  environments                            Provides  a  lineup  of  various  products  
                                                       for  small-­/medium-­/large-­scale  web  service  environments




      Item              Logical  Analysis  Method  (WAPPLES)                                Pattern  Matching  Method  (other  firewalls)

   Detection        Analyzes,  assesses,  and  judges  the  types  of  attacks             Judges  the  signs  of  attack  by  comparing  whether  or  
                    through  the  logical  analysis  engine  embedded  in                  not  they  correspond  to  the  pattern  registered  by  
    method
                    the  product                                                           the  Manager


   Detection        Selects  pre-­established  policies  such  as  recommended             The  Administrator  has  to  register  the  patterns  per
    setup           policies  or  controls  by  setting  the  level  of  26  rules         individual  attack,  or  expert  updating  service  is  required.

                    No  change  in  performance  due  to  security  setup  
  Detection                                                                                As  the  number  of  patterns  increases,  performance  
                    Maintains  the  same  performance  in  test  and  
 performance                                                                               continues  to  deteriorate.                                                                                                                    
                    actual  operation  environments


 Response  to       Immediately  cuts  off  a  mutated  attack  through                    Cutting-­off  is  activated  only  after  registering  the  new  
mutated  attacks    the  analysis  of  its  core  mechanism                                attack  pattern  to  prevent  mutated  attack.



                                                  [  Comparison  of  web  applicatoin  firewall  detection  methods  ]
Security  &  Performance

Security  -­  Smart  security  that  precisely  defends  against  mutated  attacks
 Precise  detection  of  attacks  on  the  web                                                    Prevention  of  leak  of  personal  information  
  >  Defends  against  various  mutated  attacks  through                                           >  Accurate  inspection  and  cutoff  of  personal  information  
        smart  logical  analysis                                                                          based  on  a  verification  mechanism
  >  Precise  analysis  of  traffic  based  on  optimized  rules                                          (Luhn  algorithm:  ISO/IEC  7812,  etc.)
        by  attack  type
                                                                                                    >  Inspection  and  cutoff  of  personal  information  in  attached  files
  >  Prevents  false-­positive  detection  through  a  combination  of  
        positive  and  negative  models                                                             >  Masks  important  information,  automatic  conversion  
                                                                                                          of  forbidden  words

 Protection  of  web  servers                                                                     Detection  of  attacks  on  encoded  traffic
  >  Prevents  the  faking  and  modification  of  Cookie  and  Hidden  Field                       >  Detects  attack  on  the  web  through  the  decoding  of  
  >  Cuts  off  attacks  on  the  application-­level  web  service  (DDoS)                                HTTPS  communication  (SSL/TLS)
  >  Prevents  the  disclosure  of  web  server-­related  information                               >  Linked  to  web-­encoding  solution  based  on  application  
                                                                                                          programs




                                                       WAPPLES  MS  




            INTERNET                                                                   WAPPLES


                                     Network             Switch                                                             Switch                 Web           DataBase
                                     Firewall                                                                                                     Server          Server


                                                                           Configuration  of  WAPPLES  HA


                                  [  Applied  example  of  configuration  of  WAPPLES  HA  and  WAPPLES  management  system(MS)  ]


                     *  WAPPLES  MS  is  a  management  system  that  carries  out  the  integrated  management  of  multiple  units  of  WAPPLES.  (optional)




Performance  
-­  Consistent  high  performance  through  logical  analysis-­based  detection  engine
Logical  analysis-­based  detection  engine  COCEP  embedded                                            Support  for  enterprise  web  service  environments
  >  Optimizes  attack-­detecting  performance  through  logical  analysis                                >  Supports  10G  broadband  (WAPPLES-­5000)
  >  Delivers  consistent  performance  while  maintaining  high-­level  security                         >  Supports  Gigabit  Ethernet  and  Fast  Ethernet
                                                                                                          >  Supports  Hardware-­based  accelerated  SSL  (optional)
Convenience  &  Stability




                                                        [ Main screen showing the management tools ]


  Convenience  
  -­  Simple  management  environment  for  the  optimal  operation  of  security
  Simple  installation  and  application                                             Support  for  efficient  operation  
    >  No  need  for  change  of  network  and  web  applications                      >  Supports  various  configuration  environments  such  as  
          for  installation                                                                  inline,  reverse  proxy,  monitoring,  etc.
    >  Provides  as  basics  the  recommended  policies  verified                      >  Manages  multiple  WAPPLESs  with  one  integrated  
          in  a  variety  of  customer  environments                                         management  tool  (if  WAPPLES  MS  is  selected)
    >  Establishes  optimized  security  policies  with  just  clicks
          (Windows-­like  GUI)
  Flexible  response  to  the  web  environment                                      Visualization  of  detection  information
    >  URI  access  control  through  automatic  learning                              >  Personalizes  the  Administrator’s  screen  through
    >  Smart  IP  access  control  reflecting  the  risk  rate  and                          the  tab  and  docking  functions
          frequency  of  attack                                                        >  Provides  statistics  on  intrusion  and  graphic  charts  
                                                                                             including  web  traffic
                                                                                       >  Supports  the  printout  of  reports  and  extraction  of  
                                                                                             various  forms  of  graphs


  Stability  -­  Uninterrupted  service  through  real-­time  response    
  Support with uninterrupted service                                                    Real-time check on operational status
    >  Active-­Active,  Active-­Standby  configuration  for  HA                           >  Maintains  its  own  integrity  using  WatchDog
    >  Supports  HA  configuration  without  a  separate                                  >  Auditing  and  external  notification  by  recording  the  
          switching  device                                                                     operation  state  
    >  Supports  bypass  with  uninterrupted  web  service  in                            >  Remote  notice  service  through  the  central  control  
          any  environment                                                                      system  (optional)  




           Inline  mode                                     Reverse  proxy  /                               HA  (High  Availability)  
                                                            Monitoring  mode                                configuration  




                                               [  Configuration  Diagram  for  the  Installed  WAPPLES  ]
Product  Specifications
                                                                             Form
  Class           Model         Package Design              Throughput
                                                                             Factor
                                                                                        Network Interface       Power Supply      Memory           CPU

                                                                                         2 x 10/100/1000
                 WAPPLES                                                    1U Rack      BaseTX                                               Intel Dual
   Value



                                                            100Mbps                                            AC100~240V
                                                                                                                                    2GB       Core
                 -50                                                        Type         4 x 10/100/1000       50/60Hz 200W
                                                                                         BaseTX Bypass                                        2.5GHz x 1

                 WAPPLES                                                                                                                      Intel
                                                                            1U Rack      8 x 10/100/1000       AC100~240V                     Quad Core
                 -100                                       500Mbps                                                                 4GB
                                                                            Type         BaseTX Bypass         50/60Hz 300W                   Xeon
   Performance




                 Type2                                                                                                                        2.4GHz x 1

                                                                                         8 x 10/100/1000
                                                                                         BaseTX Bypass         AC100~240V                     Intel
                 WAPPLES
                                                            2Gbps           2U Rack      2 x 1000 BaseSFP      50/60Hz 400W         8GB       Quad Core
                 -1000                                                                                         Redundant                      Xeon
                                                                            Type          Optional
                 Type2                                                                    2 x 1000 Base        Power Supply                   2.33GHz x 2
                                                                                          Optical Bypass
                                                                                         2 x 10/100/1000
                                                                                         BaseTX
                                                                                         8 x 10/100/1000       AC100~240V                     Intel
                                                                                         BaseTX Bypass
                 WAPPLES                                    4Gbps           2U Rack                            50/60Hz 400W                   Quad Core
                                                                                         4 x 1000 BaseSFP                           16GB
                                                                                                               Redundant                      Xeon
                 -2000                                                      Type
                                                                                          Optional             Power Supply                   2.66 GHz x 2
                                                                                          2 x 1000 Base
                                                                                          Optical Bypass
   High-End




                                                                                         2 x 10/100/1000
                                                                                         BaseTX
                                                                                         8 x 10/100/1000
                                                                                         BaseTX Bypass
                                                                                         4 x 1000 BaseSFP      AC 100~240V                    Intel
                                                            6Gbps           2U Rack      2 x 1000 Base         50/60Hz 500W                   Nehalem
                                                                                         Optical Bypass                             16GB
                 WAPPLES                                                    Type                               Redundant                      2.4GHz
                                                                                          Optional             Power Supply                   5.86 GT/s x 2
                 -5000                                                                    4 x 1000 Base
                                                                                          Optical Bypass
                                                                                          2 x 10G Base
                                                                                          Optical Bypass



Awards  and      Certifications  
                                                                          Awards

                                                                            >  11.  2008  Grand  Prize  in  Intelligence  from  the  Society  of  Korea  
                                                                                  Intelligence  System
                                                                            >  04.  2009  Grand  Prize  in  New  Software  Product  from  the  Ministry  
                                                                                  of  Knowledge  and  Economy  of  Korea
                                                                            >  11.  2009  Korean  Prime  Minister’s  Award  in  new  technology  
                                                                                  development  and  utilization  for  2009
                                                                            >  02.  2010  Won  the  9th  Top  Award  for  ROK  corporate  
                                                                                  SW  competitiveness
Certification

>  CC  certification  from  the  National  Intelligence  Service  (NIS)  of  Korea  (EAL4  class)
  >  GS  certification  from  the  Information  Technology  Association
  >  Equipped  with  NIS-­verified  encryption  modules  
  >  Electromagnetic  compatibility  registration  (EMI)  certification
  >  PCI-­DSS  compliance  certification
Intelligent



                                                     The  Best  Defense  Against  Web  Application  Attacks
                                                           Perfect  detection,  high-­level  security
                                                           Delivers  consistent  high  performance
                                                           Easy  and  convenient  security  control
                                                           Support  for  various  web  environments

                                                     Verified  Quality  and  Competitiveness
                                                           No.  1  in  Korean  web  application  firewall  market  
                                                           Grand  Prize  in  New  Software  Product  from  the  
                                                           Ministry  of  Knowledge  and  Economy  of  Korea
                                                           Grand  Prize  in  Intelligence  from  the  Society  of  
                                                           Korea  Intelligence  System
                                                           CC  certification  from  the  National  Intelligence  
                                                           Service  (NIS)  of  Korea  (EAL4  class)
                                                           GS  certification  from  the  Information  Technology  
                                                           Association
                                                           Equipped  with  NIS-­verified  encryption  modules
                                                           EMI  registration  certification




Penta  Security  Systems  Inc.
Hanjin  Shipping  Bldg.,  20th  Fl.  25-­11  Yoido-­dong,
Youngdeungpo-­ku,  Seoul,  Korea  150-­949
Tel  :  02-­780-­7728  /  Fax  :  02-­786-­5281  /  www.pentasecurity.com
Any  inquries  :  02-­2125-­6668  /  sale@pentasecurity.com
Penta  Security  Systems  K.K.
Akasaka  ascend  Bldg  3F  3-­2-­8  Akasaka  ,  Minato-­ku,  Tokyo  107-­0052,Japan
TEL:  81-­3-­5573-­8191    FAX:  81-­3-­5573-­8193
Email:  japan@pentasecurity.com


 Penta Security Systems Inc. 2010, All rights are reserved.
WAPPLES is trademark of Penta Security Systems Inc.                                                                   100831-EW-A1

Weitere ähnliche Inhalte

Was ist angesagt?

50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetElliott Lowe
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayLiberteks
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00Bố Su
 
Descripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG FirewallDescripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG Firewallrivefapy
 

Was ist angesagt? (20)

50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Finjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheetFinjan Vital Security for Web datasheet
Finjan Vital Security for Web datasheet
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
50357 a enu-module00
50357 a enu-module0050357 a enu-module00
50357 a enu-module00
 
Descripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG FirewallDescripcion Tecnica del Barracuda NG Firewall
Descripcion Tecnica del Barracuda NG Firewall
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 

Andere mochten auch

F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerDavid McGeough
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Akamai Technologies
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 
Tripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...United Security Providers AG
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareCloudflare
 

Andere mochten auch (8)

F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 
Tripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best PracticesTripwire IP360 Vulnerability Management Scanning Best Practices
Tripwire IP360 Vulnerability Management Scanning Best Practices
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
 

Ähnlich wie Wapples brochure v1 4 eng

Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudTjylen Veselyj
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks Array Networks
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks Array Networks
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...IEEEGLOBALSOFTTECHNOLOGIES
 
Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...JPINFOTECH JAYAPRAKASH
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsGlobalDots
 
Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Sandeep Yadav
 

Ähnlich wie Wapples brochure v1 4 eng (20)

Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
JAVA 2013 IEEE NETWORKSECURITY PROJECT NICE: Network Intrusion Detection and ...
 
Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...Nice network intrusion detection and countermeasure selection in virtual netw...
Nice network intrusion detection and countermeasure selection in virtual netw...
 
Firewall
FirewallFirewall
Firewall
 
Web Access Firewall
Web Access FirewallWeb Access Firewall
Web Access Firewall
 
Ds e class-nsa_e8500_us
Ds e class-nsa_e8500_usDs e class-nsa_e8500_us
Ds e class-nsa_e8500_us
 
Ds nsa series_4500
Ds nsa series_4500Ds nsa series_4500
Ds nsa series_4500
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDotsCloud Web Application Firewall - GlobalDots
Cloud Web Application Firewall - GlobalDots
 
Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Enterprise Network Design and Deployment
Enterprise Network Design and Deployment
 

Wapples brochure v1 4 eng

  • 1. Intelligent The  Best  Defense  Against  Web  Application  Attacks
  • 2. Intelligent   No.1  in  Korean   Web  Application  Firewall  Market   When  it  comes  to  web  application  firewall,  WAPPLES  is  it!   WAPPLES  is  the  web  application  firewall(WAF)  selected  by  most  customers.  Its  unique  and  original   smart  security  engine  cuts  off  even  unknown  attacks,  performs  precise  and  perfect  detection,  and delivers  the  best  performance  even  with  all  types  of  embedded  security  functions.  With  its  easy  security setup  and  convenience  of  operation,  WAPPLES  is  leading  the  popularization  of  web  application  firewall and  securing  a  broad  range  of  customers.   >> Immediate  detection  of  mutated  attacks  by  embedded  smart  engine Perfect  detection, Precise  detection  through  the  analysis  of  attack  techniques high-­level  security Prevents  false-­positive  detection  through  logical  multi-­detection  techniques Delivers  consistent high  performance >> Delivers  high  performance  through  optimized  attack  detection   Maintains  high  performance  in  high-­level  security  environments >> Installation  without  changing  the  existing  system   Easy  and  convenient Intuitive  security  setup  using  the  setup  wizard security  control Integrated  control  of  a  number  of  web  application  firewalls  (optional)   >> Supports  various  network  environments  including   inline/reverse  proxy/monitoring/High  Availability(HA)  configuration,  etc.   Support  for  various web  environments Provides  a  lineup  of  various  products   for  small-­/medium-­/large-­scale  web  service  environments  Item Logical  Analysis  Method  (WAPPLES)   Pattern  Matching  Method  (other  firewalls) Detection Analyzes,  assesses,  and  judges  the  types  of  attacks   Judges  the  signs  of  attack  by  comparing  whether  or   through  the  logical  analysis  engine  embedded  in   not  they  correspond  to  the  pattern  registered  by   method the  product the  Manager Detection Selects  pre-­established  policies  such  as  recommended   The  Administrator  has  to  register  the  patterns  per setup policies  or  controls  by  setting  the  level  of  26  rules individual  attack,  or  expert  updating  service  is  required. No  change  in  performance  due  to  security  setup   Detection As  the  number  of  patterns  increases,  performance   Maintains  the  same  performance  in  test  and   performance continues  to  deteriorate.                                                                                                                     actual  operation  environments Response  to Immediately  cuts  off  a  mutated  attack  through   Cutting-­off  is  activated  only  after  registering  the  new   mutated  attacks the  analysis  of  its  core  mechanism attack  pattern  to  prevent  mutated  attack. [  Comparison  of  web  applicatoin  firewall  detection  methods  ]
  • 3. Security  &  Performance Security  -­  Smart  security  that  precisely  defends  against  mutated  attacks Precise  detection  of  attacks  on  the  web Prevention  of  leak  of  personal  information    >  Defends  against  various  mutated  attacks  through    >  Accurate  inspection  and  cutoff  of  personal  information          smart  logical  analysis        based  on  a  verification  mechanism  >  Precise  analysis  of  traffic  based  on  optimized  rules          (Luhn  algorithm:  ISO/IEC  7812,  etc.)        by  attack  type  >  Inspection  and  cutoff  of  personal  information  in  attached  files  >  Prevents  false-­positive  detection  through  a  combination  of          positive  and  negative  models  >  Masks  important  information,  automatic  conversion          of  forbidden  words Protection  of  web  servers Detection  of  attacks  on  encoded  traffic  >  Prevents  the  faking  and  modification  of  Cookie  and  Hidden  Field  >  Detects  attack  on  the  web  through  the  decoding  of    >  Cuts  off  attacks  on  the  application-­level  web  service  (DDoS)        HTTPS  communication  (SSL/TLS)  >  Prevents  the  disclosure  of  web  server-­related  information  >  Linked  to  web-­encoding  solution  based  on  application          programs WAPPLES  MS   INTERNET WAPPLES Network Switch Switch Web DataBase Firewall Server Server Configuration  of  WAPPLES  HA [  Applied  example  of  configuration  of  WAPPLES  HA  and  WAPPLES  management  system(MS)  ] *  WAPPLES  MS  is  a  management  system  that  carries  out  the  integrated  management  of  multiple  units  of  WAPPLES.  (optional) Performance   -­  Consistent  high  performance  through  logical  analysis-­based  detection  engine Logical  analysis-­based  detection  engine  COCEP  embedded Support  for  enterprise  web  service  environments  >  Optimizes  attack-­detecting  performance  through  logical  analysis        >  Supports  10G  broadband  (WAPPLES-­5000)  >  Delivers  consistent  performance  while  maintaining  high-­level  security  >  Supports  Gigabit  Ethernet  and  Fast  Ethernet  >  Supports  Hardware-­based  accelerated  SSL  (optional)
  • 4. Convenience  &  Stability [ Main screen showing the management tools ] Convenience   -­  Simple  management  environment  for  the  optimal  operation  of  security Simple  installation  and  application   Support  for  efficient  operation    >  No  need  for  change  of  network  and  web  applications    >  Supports  various  configuration  environments  such  as          for  installation        inline,  reverse  proxy,  monitoring,  etc.  >  Provides  as  basics  the  recommended  policies  verified    >  Manages  multiple  WAPPLESs  with  one  integrated          in  a  variety  of  customer  environments          management  tool  (if  WAPPLES  MS  is  selected)  >  Establishes  optimized  security  policies  with  just  clicks        (Windows-­like  GUI) Flexible  response  to  the  web  environment Visualization  of  detection  information  >  URI  access  control  through  automatic  learning  >  Personalizes  the  Administrator’s  screen  through  >  Smart  IP  access  control  reflecting  the  risk  rate  and          the  tab  and  docking  functions        frequency  of  attack  >  Provides  statistics  on  intrusion  and  graphic  charts          including  web  traffic  >  Supports  the  printout  of  reports  and  extraction  of          various  forms  of  graphs Stability  -­  Uninterrupted  service  through  real-­time  response     Support with uninterrupted service Real-time check on operational status  >  Active-­Active,  Active-­Standby  configuration  for  HA  >  Maintains  its  own  integrity  using  WatchDog  >  Supports  HA  configuration  without  a  separate    >  Auditing  and  external  notification  by  recording  the          switching  device        operation  state    >  Supports  bypass  with  uninterrupted  web  service  in    >  Remote  notice  service  through  the  central  control          any  environment        system  (optional)   Inline  mode     Reverse  proxy  / HA  (High  Availability)   Monitoring  mode     configuration   [  Configuration  Diagram  for  the  Installed  WAPPLES  ]
  • 5. Product  Specifications Form Class Model Package Design Throughput Factor Network Interface Power Supply Memory CPU 2 x 10/100/1000 WAPPLES 1U Rack BaseTX Intel Dual Value 100Mbps AC100~240V 2GB Core -50 Type 4 x 10/100/1000 50/60Hz 200W BaseTX Bypass 2.5GHz x 1 WAPPLES Intel 1U Rack 8 x 10/100/1000 AC100~240V Quad Core -100 500Mbps 4GB Type BaseTX Bypass 50/60Hz 300W Xeon Performance Type2 2.4GHz x 1 8 x 10/100/1000 BaseTX Bypass AC100~240V Intel WAPPLES 2Gbps 2U Rack 2 x 1000 BaseSFP 50/60Hz 400W 8GB Quad Core -1000 Redundant Xeon Type Optional Type2 2 x 1000 Base Power Supply 2.33GHz x 2 Optical Bypass 2 x 10/100/1000 BaseTX 8 x 10/100/1000 AC100~240V Intel BaseTX Bypass WAPPLES 4Gbps 2U Rack 50/60Hz 400W Quad Core 4 x 1000 BaseSFP 16GB Redundant Xeon -2000 Type Optional Power Supply 2.66 GHz x 2 2 x 1000 Base Optical Bypass High-End 2 x 10/100/1000 BaseTX 8 x 10/100/1000 BaseTX Bypass 4 x 1000 BaseSFP AC 100~240V Intel 6Gbps 2U Rack 2 x 1000 Base 50/60Hz 500W Nehalem Optical Bypass 16GB WAPPLES Type Redundant 2.4GHz Optional Power Supply 5.86 GT/s x 2 -5000 4 x 1000 Base Optical Bypass 2 x 10G Base Optical Bypass Awards  and      Certifications   Awards  >  11.  2008  Grand  Prize  in  Intelligence  from  the  Society  of  Korea          Intelligence  System  >  04.  2009  Grand  Prize  in  New  Software  Product  from  the  Ministry          of  Knowledge  and  Economy  of  Korea  >  11.  2009  Korean  Prime  Minister’s  Award  in  new  technology          development  and  utilization  for  2009  >  02.  2010  Won  the  9th  Top  Award  for  ROK  corporate          SW  competitiveness Certification >  CC  certification  from  the  National  Intelligence  Service  (NIS)  of  Korea  (EAL4  class)  >  GS  certification  from  the  Information  Technology  Association  >  Equipped  with  NIS-­verified  encryption  modules    >  Electromagnetic  compatibility  registration  (EMI)  certification  >  PCI-­DSS  compliance  certification
  • 6. Intelligent The  Best  Defense  Against  Web  Application  Attacks Perfect  detection,  high-­level  security Delivers  consistent  high  performance Easy  and  convenient  security  control Support  for  various  web  environments Verified  Quality  and  Competitiveness No.  1  in  Korean  web  application  firewall  market   Grand  Prize  in  New  Software  Product  from  the   Ministry  of  Knowledge  and  Economy  of  Korea Grand  Prize  in  Intelligence  from  the  Society  of   Korea  Intelligence  System CC  certification  from  the  National  Intelligence   Service  (NIS)  of  Korea  (EAL4  class) GS  certification  from  the  Information  Technology   Association Equipped  with  NIS-­verified  encryption  modules EMI  registration  certification Penta  Security  Systems  Inc. Hanjin  Shipping  Bldg.,  20th  Fl.  25-­11  Yoido-­dong, Youngdeungpo-­ku,  Seoul,  Korea  150-­949 Tel  :  02-­780-­7728  /  Fax  :  02-­786-­5281  /  www.pentasecurity.com Any  inquries  :  02-­2125-­6668  /  sale@pentasecurity.com Penta  Security  Systems  K.K. Akasaka  ascend  Bldg  3F  3-­2-­8  Akasaka  ,  Minato-­ku,  Tokyo  107-­0052,Japan TEL:  81-­3-­5573-­8191    FAX:  81-­3-­5573-­8193 Email:  japan@pentasecurity.com Penta Security Systems Inc. 2010, All rights are reserved. WAPPLES is trademark of Penta Security Systems Inc. 100831-EW-A1