Presentation is loading. Please wait.

Presentation is loading. Please wait.

Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.

Similar presentations


Presentation on theme: "Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM."— Presentation transcript:

1

2 Before: Servers Behind Firewalls

3 Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM

4 Servers Placed in DMZ

5 Holes Punched in Firewall…

6

7 Internet Facing Servers are at Risk

8 And Through Them - Entire Network

9 Why Are Web Servers Vulnerable? Complexity Mix of software from different vendors Web masters have administrative privileges

10 How Are Web Servers Attacked? Code injected through HTTP requests –Typically using a buffer-overflow vulnerability Attack used to: –Deface web site –Install Trojan horse –Plant backdoors –Attack deeper into the organization

11 Attack Scenario

12

13

14

15

16 Solution: WaveBreaker

17 File System NetworkRegistryProcesses OS Services IIS Applications WaveBreaker Architecture

18 WaveBreaker Interception Layer File System NetworkRegistryProcesses IIS Authorizer Admin console

19 WaveBreaker Architecture File System NetworkRegistryProcesses WaveBreaker Interception Layer IIS Authorizer Admin console

20 File System WaveBreaker Interception Layer WaveBreaker Architecture NetworkRegistryProcesses OK Authorizer IIS Admin console

21 WaveBreaker Architecture File System NetworkRegistryProcesses WaveBreaker Interception Layer IIS Authorizer OK Admin console

22 WaveBreaker Architecture File System NetworkRegistryProcesses WaveBreaker Interception Layer X X Authorizer IIS WaveBreaker’s performance overhead: Approximately 5% Admin console !

23 WaveBreaker: Product Highlights Intrusion-proof protection for Microsoft®-IIS based applications Prevents: –Opening backdoors –Planting Trojan horses – Web site defacement –Attacks deeper into the corporate network Attacks are blocked in real-time Out-of-the-box security schemes provide instant protection Easily configurable to support any web application Security logs alert security administrators of attack attempts

24 Simple Management

25 Full Event Monitoring

26 Conclusion Business drivers and competitive market no longer permit keeping mission critical servers behind firewalls. Internet-facing web applications are and will be vulnerable. WaveBreaker can provide the shielding needed to deploy internet-facing servers.

27 Thank you.


Download ppt "Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM."

Similar presentations


Ads by Google