Web Site Content Protection Solution. Protecting Web Site Content with.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

ETHICAL HACKING A LICENCE TO HACK
How to Ensure Your Business Survives, Even if Your Server Crashes Backup Fast, Recover Faster Fast and Reliable Disaster Recovery, Data Protection, System.
Which server is right for you? Get in Contact with us
For more profitable Business Management Have you used your IES today? Inventors of Software Established 1994 to bring you better, more productive and more.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network security policy: best practices
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Computer Crime and Information Technology Security
ShareTech 2015 Next-Gen UTM.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Dr.Backup Online Backup Service (888) (toll free)
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Security Architecture
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Introduction Journal Analysis and Optimization Journaling Uses and Benefits Understanding Costs and Implications Ongoing Management and Administration.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Welcome to Hosted VoIP Eric Thomas Founder & CEO, FreedomVOICE Systems. Creators of FreedomIQ Hosted VoIP PBX. Over twelve years experience as a leading.
Management Plan Goran Smajlagic S English 2100.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Computer Security By Duncan Hall.
Role Of Network IDS in Network Perimeter Defense.
Chapter 5 Managing Multi-user Databases 1. Multi-User Issues Database Administration Concurrency Control Database Security Database Recovery Page 307.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Kaspersky Small Office Security INTRODUCING New for 2014!
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Copyright © 2016 Pearson Education, Inc. CHAPTER 12: DATA AND DATABASE ADMINISTRATION Modern Database Management 12 th Edition Jeff Hoffer, Ramesh Venkataraman,
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
KEEPS – a system for UELMA preservation and security
Information Systems Security
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
KEEPS – a system for UELMA preservation and security
Managing Multi-user Databases
IS4680 Security Auditing for Compliance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
INFORMATION SYSTEMS SECURITY and CONTROL
Backup and restoration of data, redundancy
Designing IIS Security (IIS – Internet Information Service)
G061 - Network Security.
Presentation transcript:

Web Site Content Protection Solution

Protecting Web Site Content with

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. What is Lockstep?  Deliberate web site content corruption caused by hackers or other unauthorized system intruders.  Accidental web site content corruption caused by authoring mistakes, multiple-author collisions, equipment or software failures, or by natural (or unnatural) catastrophes. Software to protect web site content against two major, real-world threats:

Who Are We? Launched in 2002 Privately held company Based in Ontario Canada Providing Companies with multiple products with focus on network security Provide consulting, design, implementation, and support of Network Enterprise Solutions focusing on Internet, Intranet, Wireless, and Extranet Security

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Web Content Protection Solutions WebAgain  Site Recorder  “ …WebAgain and SiteRecorder are essential tools in the armory of every IT manager and security officer.” (Brian Pennington, EMS-global Security Consultant)

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. WebAgain “Ideal for a busy B2B/B2C environment where time is at a premium but the efficacy and veracity of the web site is paramount. WebAgain will ensure that your web site is available, reliable and has integrity.” – SC Magazine Protect your Web Site Content from Hackers

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Trends: Intrusions/Defacements Source: CERT Intrusions Source: alldas.de Defacements

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Business Risk  Damaged public image  Diminished customer good will  Time to restore service  Legal liability  Cost to recover content  Frustration, stress, anxiety

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Tough Questions  How can I prepare myself against the risk of hacker attack?  Can I automatically recover if I am hacked – or do I have to jump through hoops to solve the problem?  Can I know immediately if something goes wrong?  How can I evaluate what happened?

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. How WebAgain Works Internet Web Authors Content Archive WebAgain Server Public Web Servers Administrator 9. Restore 7. Detect 3. Publish 4. Monitor 1. Author 6. Hack 10. Alert 5. Compare2. Archive 8. Quarantine

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. WebAgain Features  Automatic Hack Detection  Maintains content archive  Monitors web sites 24x7  Detects any unauthorized content change  Automatic Hack Repair  Restores correct content  Quarantines bad content  Alerts administrators  Allows hack evaluation

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. WebAgain Benefits  Avoid embarrassment – protect your image  Reduce risk of legal liability – have the right content available, at the right time  Prevent theft – keep valuable information from being stolen from your users  Save time, frustration and money – be proactive, not reactive  Be informed – know what happens, when it happens  Improve web publishing quality – maintain a “single truth” about what content should really be Availability, Reliability, Integrity

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. System Requirements  WebAgain Server  Windows NT/2000/XP  Administrator Interface  Windows 98/ME/NT/2000/XP  Monitored web sites  Any operating system  Any web server  Web site access  FTP  FrontPage Server Extensions  Shared Folder

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Other Approaches  Tripwire for Web Pages  Detects change, but does not correct – substitutes “notification page”  Only works with Apache web servers  Requires software addition to web server  Watchguard ServerLock  Makes web server “read only”  Does not allow remote administration  Difficult to administer when server hosts many logical domains

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. WebAgain Questions? ? When will you get DEFACED or worse?

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. SiteRecorder  Archive  Audit  Roll-back  Restore Protect your Web Site Content from Accidental Corruption

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Accidental Threats  Authoring mistakes  Accidental content deletion  Multiple author collisions  Equipment or software failures  Natural (or unnatural) disasters 75% of all data corruption is due to accidental, not intentional causes.

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Business Risk  Damaged public image  Diminished customer good will  Time to restore service  Legal liability  Cost to recover content  Frustration, stress, anxiety

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. Tough Questions  How can I know when a problem occurs?  How can I know exactly what was on my site at a particular point in time?  How quickly can I roll back to a known good configuration?  How can I restore to a completely new system if my equipment fails?  How can I satisfy external audit requirements?

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. How SiteRecorder Works Internet Public Web Servers Administrator 2. Monitor Author 6. Alert SiteRecorder Server 3. Compare 1. Baseline 7. Evaluate 5. Update Content Archive 4. Change 8. Restore

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. SiteRecorder Features  Automatic Archive / Audit  Monitors web sites remotely  Detects any content change  Archives each change  Creates definitive audit trail  Alerts administrators  Easy Roll-back / Restore  Evaluate changes  Roll back to known good configuration  Restore complete site

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. SiteRecorder Benefits  Don't worry – protection is automatic  Backups will always happen, even if you forget  Save time – recovery is easy  Roll back to a version you like if a mistake is made  Restore the complete site if a catastrophe happens  Know the truth – be sure what your web site looked like at any point in time  Satisfy your auditors – automatically alert them when you make a change  Save money - compared with the cost to recover your content the old way  Be prepared - if your building burns down, your content can be safe in another place

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. System Requirements  SiteRecorder Server  Windows NT/2000/XP  Administrator Interface  Windows 98/ME/NT/2000/XP  Monitored web sites  Any operating system  Any web server  Web site access  FTP  FrontPage Server Extensions  Shared Folder

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. SiteRecorder Competition  Traditional back up solutions (e.g. Legato)  Usually backs up only once per day  No change notification  No audit trail of all changes  No remote monitoring  No preview before restore  Not optimized for web sites  Custom scripting  Complex, requires much more training  Not easily replicated to other sites

Web Site Content Protection Software Copyright  2001 Lockstep Systems, Inc. SiteRecorder Questions? ?

TDC Consulting