Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.

Similar presentations


Presentation on theme: "The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks."— Presentation transcript:

1 The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks

2 Inconvenient Statistics Network Perimeter App Server Database of ALL threats are at the Web application layer. Gartner 70% of organizations have been hacked in the past two years through insecure Web apps. 73% Ponemon Institute

3 Hacker Threats Targeted Scans Advanced Persistent Threat (APT) Targets a specific site for any vulnerability. Script loaded onto a bot network to carry out attack. JANJUNEDEC Sophisticated, targeted attack (APT). Low and slow to avoid detection. Library Attacks Script run against multiple sites seeking a specific vulnerability. IP Scan Script Kiddie Generic scripts and tools against one site. Scripts & Tool Exploits Targeted Scan BotnetBotnet Human Hacker

4 The Cost of an Attack Theft RevenueReputation Sony Stolen Records | 100M Sony Direct Costs | $171M 28 day network closure Lost customers Security improvements Sony Lawsuits| $1-2B Ponemon Institute| Average breach costs $214 per record stolen

5 Deception Points - detect threats without false positives. Track individual devices Understand attacker’s capabilities and intent Adaptive responses, including block, warn and deceive. The Mykonos Advantage Deception-based Security Detect Track Profile Respond

6 Detection by Deception App Server Client Server Configuration Network Perimeter Database Firewall Query String Parameters Tar Traps Hidden Input Fields

7 Track Attackers Beyond the IP Track Software and Script Attacks Fingerprinting HTTP communications. Track Browser Attacks Persistent Token Capacity to persist in all browsers including various privacy control features. Track IP Address

8 Attacker threat level Smart Profile of Attacker Incident history Every attacker assigned a name

9 Respond and Deceive All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat.

10 Security Administration SMTP alerting Reporting (Pdf, HTML) CLI for exporting data into SIEM tool Web-based console Real-time On-demand threat information

11 Unified Protection Across Platforms App ServerDatabase Internal Virtualized Cloud Connective Tissue

12 Case Study & Customers “Within 20 minutes, ….we were looking at the activity taking place on our web applications.” “10% of our traffic was…malicious.” Keir Asher Senior Technical Analyst Brown Printing

13 2010 Cool Vendor Application Security “The smartest buy of the year for any organization with an online presence.” 1 st Place Winner, Security Innovators Throwdown 2010 SINET 16 Security Innovator 2011 1 st Place Information Security Wall Street Journal Technology Innovation Awards 2011


Download ppt "The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks."

Similar presentations


Ads by Google