SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Proteja suas Aplicações e esteja
Seguro
Vinicius Miranda, Sales Engineer
WestconGroup, vinicius.miranda@westcon.com
© F5 Networks, Inc 2
• A Importância da Proteção para suas Aplicações;
• Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação?
• Principais Ataques Direcionados para as Aplicações;
• Como a F5 Networks ajuda na Proteção das suas Aplicações?
• Duvidas;
Agenda
A Importância da Proteção para as
Aplicações
© F5 Networks, Inc 4
Business App Security Access
Proteção da Aplicação é igual a Proteção do Negócio?
Vazamento
de Dados
Roubo de
Credencial
Fraude
US$ 81
Milhões
8.695 casos no
Brasil entre
2014/2015 –
PwC 16
© F5 Networks, Inc 5
Como comprovar essa realidade?
Source: Akamai Report
Firewall Tradicional e Firewall de
Aplicação, qual é a Diferença???
© F5 Networks, Inc 7
Vamos entender…
“Next generation” Firewall
Characteristics
• Outbound USER inspection
• Who is doing what?
• “Trusted” users to Internet
Corporate
(users)
Web Application Firewall
Data center
(servers)
Characteristics
• Inbound APPLICATION protection
• Application delivery focus
• “Untrusted” users to data center
© F5 Networks, Inc 8
Ok…mas qual é a diferença entre eles?
Multiprotocol Security 
IP Reputation  
Web Attack Signatures 
Web Vulnerabilities Signatures  
Automatic Policy Learning 
URL, Parameter, Cookie and Form Protection 
Leverage Vulnerability Scan Results 
Principais Ataques Direcionados
para as Aplicações
© F5 Networks, Inc 10
Roubo de Credencial, Vazamento de Dados, Aplicações
Lentas…
SQL
Injection
Cross-Site
Scripting
XSS
Parameter
Tampering
© F5 Networks, Inc 11
Vulnerabilidades nas Aplicações WEB…
7%
2014
40%
2016
Como estar protegido diante deste Cenário?
Como a F5 Networks pode ajudar?
© F5 Networks, Inc 13
The New Perimeter Is An App Perimeter
Apps Are The Gateway to Data!
F5
SS
L
SS
L
SS
L
APP
PER-APP / PER-USER PERIMETER
SSL-visible ✖ ✔
Location-independent ✖ ✔
Session-based ✖ ✔
Continuous trust
verification
✖ ✔
Strategic control points ✖ ✔
App availability ✖ ✔
TRADITIONAL
TRADITIONAL NETWORK PERIMETER
App
© F5 Networks, Inc 14
Let’s talk about Web Application Firewall - WAF
• A Web application firewall protects Web
servers from malicious traffic and blocks
attempts to compromise the system.
• It prevents targeted attacks that include
cross-site scripting, SQL injection, forceful
browsing,cookie poisoning and invalid
input.
• The F5 BIG-IP® Application Security
Manager is a Web application firewall that
uses both positive and negative security
models to identify, isolate and block
sophisticated attacks without impacting
legitimate application transactions. ASM
© F5 Networks, Inc 15
The Value Of F5 Hybrid WAF Protection
Secure response
delivered
Request made
BIG-IP ASM security
policy checked
Server response
generated
Vulnerable
application
• Drop, block or forward request
• Application attack filtering & inspection
• SSL, TCP, HTTP DoS mitigation
Response inspection for errors
and leakage of sensitive
information
BIG-IP ASM security
policy enforced
• #1 Most Effective WAF (NSS Labs)
• 2780 signatures for best protection
• Enable transparent protection from ever-
changing threats
• Reduce risks from vulnerabilities with
dynamic VA/ DAST integrations
• Engage unique BOT detection
(rapid surfing, intervals, event sequence)
• #1 Most Deployed WAF (451 Research)
• 10 of OWASP attacks mitigated with on-box
reporting
• Deploy full-proxy or transparent full-proxy
(bridge mode)
© F5 Networks, Inc 16
Mitigate Attacks Across Flexible Environments
Internet
VIPRION Platform
Devices
Data Center
Load Balancing
+ DDoS Protection
+ Application Security
BIG-IP ASM
• Protect critical apps in the datacenter
• Install on any BIG-IP platform
• Deploy as an add-on to BIG-IPs in use or run it as a
standalone.
Protection in the datacenter
NO APP LEFT UNPROTECTED!
BIG-IP
Virtual Edition
Securing apps in the cloud
BIG-IP ASM VE
• Activate security services
close to apps that have
moved to the cloud
• Accelerate development
and test
Cloud-based app protection
Silverline Web App Firewall
• Fast activation of ASM protections
• Managed service for SaaS and tier 2
applications
• 24x7x365 SOC Support
© F5 Networks, Inc 17
ASM SILVERLINE
WAF
PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
Next Steps
• Visit us online at www.F5.com/security and for more information on F5 security
solutions.
• Contact your F5 solution expert to discuss effective security solutions that
meet specific needs of your organization and those you do business with.
Edifício Berrini Plaza
Rua Samuel Morse, 134 - 10º andar
Brooklin - São Paulo SP
Tel: +55 11 5054.4480
CEP: 04576-060
E-mail: info@cylk.com.br
Proteção da aplicação | Webinar CYLK, Westcon e F5

Contenu connexe

En vedette

Divac Foundation_2015 Overview
Divac Foundation_2015 OverviewDivac Foundation_2015 Overview
Divac Foundation_2015 Overview
Uros Delic
 

En vedette (13)

Cómo controlar la ansiedad por comer presentación.
Cómo controlar la ansiedad por comer presentación.Cómo controlar la ansiedad por comer presentación.
Cómo controlar la ansiedad por comer presentación.
 
ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6ใบงานสำรวจตนเอง M6
ใบงานสำรวจตนเอง M6
 
Boots
BootsBoots
Boots
 
Examen trimestral karenmenjivar
Examen trimestral karenmenjivarExamen trimestral karenmenjivar
Examen trimestral karenmenjivar
 
Miguel01
Miguel01Miguel01
Miguel01
 
CV + Work Sample
CV + Work Sample CV + Work Sample
CV + Work Sample
 
Higiene y seguridad
Higiene y seguridadHigiene y seguridad
Higiene y seguridad
 
บทที่ 1 เทคโนโลยีสารสนเทศและการสื่อสาร
บทที่ 1 เทคโนโลยีสารสนเทศและการสื่อสารบทที่ 1 เทคโนโลยีสารสนเทศและการสื่อสาร
บทที่ 1 เทคโนโลยีสารสนเทศและการสื่อสาร
 
Divac Foundation_2015 Overview
Divac Foundation_2015 OverviewDivac Foundation_2015 Overview
Divac Foundation_2015 Overview
 
Paranormal
ParanormalParanormal
Paranormal
 
The Douglases Worldwide
The Douglases Worldwide The Douglases Worldwide
The Douglases Worldwide
 
Autoestima y ansiedad, la importancia de tener
Autoestima y ansiedad, la importancia de tenerAutoestima y ansiedad, la importancia de tener
Autoestima y ansiedad, la importancia de tener
 
ชื่อ
ชื่อชื่อ
ชื่อ
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Proteção da aplicação | Webinar CYLK, Westcon e F5

  • 1. Proteja suas Aplicações e esteja Seguro Vinicius Miranda, Sales Engineer WestconGroup, vinicius.miranda@westcon.com
  • 2. © F5 Networks, Inc 2 • A Importância da Proteção para suas Aplicações; • Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação? • Principais Ataques Direcionados para as Aplicações; • Como a F5 Networks ajuda na Proteção das suas Aplicações? • Duvidas; Agenda
  • 3. A Importância da Proteção para as Aplicações
  • 4. © F5 Networks, Inc 4 Business App Security Access Proteção da Aplicação é igual a Proteção do Negócio? Vazamento de Dados Roubo de Credencial Fraude US$ 81 Milhões 8.695 casos no Brasil entre 2014/2015 – PwC 16
  • 5. © F5 Networks, Inc 5 Como comprovar essa realidade? Source: Akamai Report
  • 6. Firewall Tradicional e Firewall de Aplicação, qual é a Diferença???
  • 7. © F5 Networks, Inc 7 Vamos entender… “Next generation” Firewall Characteristics • Outbound USER inspection • Who is doing what? • “Trusted” users to Internet Corporate (users) Web Application Firewall Data center (servers) Characteristics • Inbound APPLICATION protection • Application delivery focus • “Untrusted” users to data center
  • 8. © F5 Networks, Inc 8 Ok…mas qual é a diferença entre eles? Multiprotocol Security  IP Reputation   Web Attack Signatures  Web Vulnerabilities Signatures   Automatic Policy Learning  URL, Parameter, Cookie and Form Protection  Leverage Vulnerability Scan Results 
  • 10. © F5 Networks, Inc 10 Roubo de Credencial, Vazamento de Dados, Aplicações Lentas… SQL Injection Cross-Site Scripting XSS Parameter Tampering
  • 11. © F5 Networks, Inc 11 Vulnerabilidades nas Aplicações WEB… 7% 2014 40% 2016 Como estar protegido diante deste Cenário?
  • 12. Como a F5 Networks pode ajudar?
  • 13. © F5 Networks, Inc 13 The New Perimeter Is An App Perimeter Apps Are The Gateway to Data! F5 SS L SS L SS L APP PER-APP / PER-USER PERIMETER SSL-visible ✖ ✔ Location-independent ✖ ✔ Session-based ✖ ✔ Continuous trust verification ✖ ✔ Strategic control points ✖ ✔ App availability ✖ ✔ TRADITIONAL TRADITIONAL NETWORK PERIMETER App
  • 14. © F5 Networks, Inc 14 Let’s talk about Web Application Firewall - WAF • A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. • It prevents targeted attacks that include cross-site scripting, SQL injection, forceful browsing,cookie poisoning and invalid input. • The F5 BIG-IP® Application Security Manager is a Web application firewall that uses both positive and negative security models to identify, isolate and block sophisticated attacks without impacting legitimate application transactions. ASM
  • 15. © F5 Networks, Inc 15 The Value Of F5 Hybrid WAF Protection Secure response delivered Request made BIG-IP ASM security policy checked Server response generated Vulnerable application • Drop, block or forward request • Application attack filtering & inspection • SSL, TCP, HTTP DoS mitigation Response inspection for errors and leakage of sensitive information BIG-IP ASM security policy enforced • #1 Most Effective WAF (NSS Labs) • 2780 signatures for best protection • Enable transparent protection from ever- changing threats • Reduce risks from vulnerabilities with dynamic VA/ DAST integrations • Engage unique BOT detection (rapid surfing, intervals, event sequence) • #1 Most Deployed WAF (451 Research) • 10 of OWASP attacks mitigated with on-box reporting • Deploy full-proxy or transparent full-proxy (bridge mode)
  • 16. © F5 Networks, Inc 16 Mitigate Attacks Across Flexible Environments Internet VIPRION Platform Devices Data Center Load Balancing + DDoS Protection + Application Security BIG-IP ASM • Protect critical apps in the datacenter • Install on any BIG-IP platform • Deploy as an add-on to BIG-IPs in use or run it as a standalone. Protection in the datacenter NO APP LEFT UNPROTECTED! BIG-IP Virtual Edition Securing apps in the cloud BIG-IP ASM VE • Activate security services close to apps that have moved to the cloud • Accelerate development and test Cloud-based app protection Silverline Web App Firewall • Fast activation of ASM protections • Managed service for SaaS and tier 2 applications • 24x7x365 SOC Support
  • 17. © F5 Networks, Inc 17 ASM SILVERLINE WAF PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
  • 18. Next Steps • Visit us online at www.F5.com/security and for more information on F5 security solutions. • Contact your F5 solution expert to discuss effective security solutions that meet specific needs of your organization and those you do business with. Edifício Berrini Plaza Rua Samuel Morse, 134 - 10º andar Brooklin - São Paulo SP Tel: +55 11 5054.4480 CEP: 04576-060 E-mail: info@cylk.com.br