© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product.

Slides:



Advertisements
Similar presentations
Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
Advertisements

Enterprise Content Management Departmental Solutions Enterprisewide Document/Content Management at half the cost of competitive systems ImageSite is:
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Quarri Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri. All other product or service names are the property.
DATABASE APPLICATION DEVELOPMENT SAK 3408 The Web and DBMS.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Remote Networking Architectures
Web Integration to an Appx Backend Server. Unix web servers + CGI Win2K web servers + ASP Win2K web servers + ODBC Processing requests Generating HTML.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Upgrading to Novell ® SecureLogin 3.5 Rod Tietjen,
Access Gateway Operation
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
 Secure Release Here is a service developed by Pharos systems to facilitate more secure, convenient and flexible printing.  Instead of sending the job.
Implementing File and Print Services
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Interoperability Tests for IEC Scott Neumann November 12, 2009.
Note: You need to customize slides 2, 5, 7 and 8 before using this presentation, and delete slide 1.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
JavaScript, Fourth Edition
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Introducing Reporting Services for SQL Server 2005.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
1 Tradedoubler & Mobile Mobile web & app tracking technical overview.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Remote Desktop Services in Windows Server 2008 R2.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Shai Tirosh Windows Server Regional Director artNET Experts.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
Module 7 Planning and Deploying Messaging Compliance.
Apache JMeter By Lamiya Qasim. Apache JMeter Tool for load test functional behavior and measure performance. Questions: Does JMeter offers support for.
Strong Authentication to any Application Using SecureLogin and NMAS TM Scott Kiester and John Jolly Software Engineer Novell, Inc.
11 WORKING WITH PRINTERS Chapter 10. Chapter 10: WORKING WITH PRINTERS2 THE WINDOWS SERVER 2003 PRINTER MODEL  Locally attached printers Printers that.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
© F5 Networks, Inc. 1 How Does DNS Work? A user browses to A user browses to
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Deploy Web Application Target Production Server. Web Server + Web Application Server (Archived) Web Server Web Application Server /webapps/${webapp}.war.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Web and Proxy Server.
BUILD SECURE PRODUCTS AND SERVICES
Product Overview.
Virtual Private Network (VPN)
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Product Overview.
Chapter 2: System Structures
Product Overview.
Web Software Model CS 4640 Programming Languages for Web Applications
PaperCutMF Product Overview – Konica Minolta
Communicating Electronically
Jon Peppler, Menlo Security Channels
McAfee Internet Security McAfee Helpline
Lecture 22 Inheritance Richard Gesick.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Designing IIS Security (IIS – Internet Information Service)
LO1 - Know about aspects of cyber security
Presentation transcript:

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners. F5 BIG-IP and Quarri POQ ► Clients can leverage existing F5 BIG-IP appliances for enforcement of POQ deployments ► Connection of client browser and web server security extends F5’s essential web security features to include:  Zero-hour malware defenses on browser endpoint  Information controls to prevent saving, copying, printing and screen-capturing browser-delivered information ► Organizations that deploy BIG-IP LTM as a front-end device for multiple independent web applications can require the use of a protected browser without modifications to any of their protected web applications

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners. BIG-IP - POQ Integration 1.Web site or application request is made 2.BIG-IP intercepts it and sends to POQ Server for validation using an iRule. (v10 and v11 are supported.) 3.If POQ session ID does not exist, BIG-IP redirects the client to the POQ server 4.POQ secure browser is launched

© 2012 Quarri Technologies Confidential and Proprietary Information. Quarri and the Quarri logo are trademarks of Quarri Technologies. All other product or service names are the property of their respective owners. ► Quarri, F5 collaborated on iRules POQ script ► iRule script implements POQ enforcement logic ► Supports BIG-IP LTM V10 and V11 ► Available today via Quarri technical support  Script bundled in next release of POQ (3.0) ► General integration approach:  Configure a pool for the POQ Server(s), no need to be sticky  Create a virtual server for POQ Server and set default pool to above  Create iRule, paste script into it, modify static parameters in script to local deployment needs  Attach iRule to webapp virtual server to be secured iRules – POQ Script