O documento discute como a Trustwave, uma empresa global de segurança cibernética, oferece várias soluções de segurança, incluindo testes de penetração, gerenciamento de vulnerabilidades, firewalls de aplicações web e proteção contra fraudes bancárias. Apresenta também as tendências de ataques cibernéticos ao longo dos anos e como a empresa ajuda clientes a evitar notas falsas em caixas eletrônicos.
2. A Trustwave é umacompaniaglobal com uma base de clientesmundial e líder da indústria de meios de pagamentos Fundadaem 1995 Mais de 600 funcionáriosem23 paises, nosseiscontinentes Mais de Um Milhão de clientesemtodo o mundo Sedemundialem Chicago; EscritóriosRegionaisemLondres, São Paulo - Brasil e Sydney Tecnologiapatenteadae vencedora de váriosprêmiosinternacionais: NAC, DLP, Criptografia, UTM, IPS, IDS, Web Application Firewall (WAF), SIEM, Scanning de Vulnerabilidades, … 5 Magic Quadrants YTD, 2 more in process DLP+ENC 2010 Hot Security Product SIEMBest Enterprise Security Solution Forrester 9 out of 10 rating NAC solution 2011 SC Magazine Europe Best DLP Solution
3. O Relatório de Segurança Global de 2011 da Trustwave, analisa dados coletados a partir de mais de 2.300 testes de penetração e mais de 200 incidentes de segurança e investigações de comprometimento conduzidas em 2010. Vazamento de Informações !!! Referência:https://www.trustwave.com/GSR
25. OsElementos de Compliance e Segurança Nossos Elementos são os blocos de construção para suas necessidades de segurança e compliance. A Trustwave pode ajudar a encontrar a Fórmula Correta para o seu Negócio. Nossas soluções podem ser implementadas individualmente ou como um pacote para ajudar as empresas a atingirem seus objetivos de negócio.
Trustwave 360 Application Security bridges the gap between expert manual testing and automated protection. Swap OS Patches with Application Performance
WebDefend Sees Deeper Layer 7 visibility – TCP Packet(here from slide 2)One of the differentiators of WebDefend is this bi-directional inspection. Most security products only look at inbound traffic coming into your environment, looking for something malicious in it, looking to see if someone they’re trying to attack you, or trying to extract data from you. And that’s the key point to make – WebDefend also looks at the response to the transaction, checking if there is any sensitive information in that outbound flow. WebDefend inspects the request, it inspects the response; WebDefend inspects all the way down to the complete set of request and response data. Yes, we look for the obvious stuff like CCN, SSN, etc from an outbound perspective, but we’re also checking to see if there is anything in the response data that indicates any environment type data, say an error message after your application dies that tells the world that you are running a SQL Server database and displays a table name, that kind of information is not strictly speaking security related but it is – it’s telling an attacker information about your environment. Now they have a little more information about how to attack you, how to tailor the attack vectors to be specific to your environment, perhaps by not running Oracle database tools in an attack since you’re running SQL Server. So the more environmental data that is leaked, the easier it is to attack you.So WebDefend is very much a BI-DIRECTIONAL tool, which makes it a security device, a Web-specific DLP type device, looking for leakage of information. Also, whenever you see events in WebDefend, you always are shown what was detected in the request, and what was detected in the response, so you actually get to see the full picture of this caused that, or this was the result of that, so it’s a very good informational tool as well.
Scaling WebDefend.You can start out a single system, a manager and a sensor all rolled into one device, or create a ‘n’-tier architecture where you have sensors in different locations around the network, and they all report back to the manager.The sensors do all the heavy lifting, they profile the traffic, they perform traffic analysis and detection, they execute the blocking mechanisms, and they send all the event data back to the manager.The WebDefend manager does all the event aggregation reporting type functions and also the policy control. The user performs all the policy management on the manager, and the policies are pushed out to the sensors. High Availability: you can set up High Availability on any of the devices; each individual sensor and manager can have an failover pair and failover works on an active/active or active/passive basis, the usual failover choices.