SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
©2023 OPSWAT, Inc. Proprietary and Confidential
OPSWAT and F5/NGINX:
Layered Security to
Protect Web Applications
OPSWAT / F5/NGINX Webinar
Wednesday, January 25, 2023
Adam Rocker & Damian Curry
Prepared for:
Prepared by:
©2023 OPSWAT, Inc. Proprietary and Confidential
We Protect the World’s
Critical Infrastructure
OUR MISSION
20 Years of Cybersecurity
Innovation and Growth
Critical Infrastructure Protection
Professional Services OEM Enterprise
Best Solution – Web Application Security
"OPSWAT embodies three
major features we judges
look for to become
winners: understanding
tomorrow’s threats, today,
providing a cost-effective
solution and innovating in
unexpected ways that can
help mitigate cyber risk
and get one step ahead of
the next breach."
OPSWAT and F5 Partnership
https://www.opswat.com/videos/how-to-integrate-
metadefender-icap-with-f5
OEM Partner since 2005 (OESIS)
ICAP Integration Partner since 2017
John Wagnon
Pete Silva
App Security:
Risks and Challenges
Application Security: Growth, Needs, and Challenges
Notables CIP Incidents – 2021/2022
Data courtesy: Industrial Cyber, Takepoint Research
Oldsmar water
treatment plant hack
Water & Waste
Colonial
Pipeline targeted
by DarkSide ransomwar
e hackers
Pipelines
Cyberattack Disrupts
Operations At Molson
Coors
Food & Agriculture
KIA core systems were
shut down by a
suspected
DoppelPaymer
ransomware attack
Automotive
Elekta was hit by a
ransomware attack
Healthcare
Application Security – Shared Concerns
© Copyright OPSWAT 2021. All rights reserved.
34%
28%
40%
46%
54%
66%
54%
38%
45%
50%
59%
62%
66%
73%
0% 20% 40% 60% 80%
Post outbreak
mitigation expenses
Lawsuits
Regulatory fines
Ransomware payouts
Denial of
service/infrastructure
Reputation damage
Loss in business or
revenue
By Location of Corporate Headquarters
United States
Other Countries
Application Security – Shared Responsibility
Same as with a CSP, cybersecurity responsibilities exist between
various security solutions and vendors
Application Security: The Blind Spots
1/3 of organizations with a web application for file uploads do not scan all file uploads to
detect malicious files.
1/5 of these organizations scan with just one anti-virus engine.
2/3 of organizations with a file upload web portal do not sanitize file uploads with Content
Disarm and Reconstruct (CDR) to prevent unknown malware and Zero-day attacks.
32%
18%
65%
Blind Spots galore!
Please rate your organization’s level of implementation for each of the following file
upload security best practices.
30%
32%
46%
52%
53%
54%
61%
61%
64%
71%
32%
33%
37%
31%
31%
33%
27%
25%
27%
22%
27%
31%
12%
12%
13%
12%
11%
9%
7%
6%
10%
4%
5%
5%
3%
1%
2%
4%
2%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Remove embedded threats with Content Disarm and
Reconstruction Technology (CDR)
Randomize uploaded file names
Verify actual file type versus relying on the extension
Use simple error messages – e.g., excluding information like
directory paths that can be used to gain system entry
Set a maximum file name length and size
Check files for vulnerabilities
Limit the specific types of files that can be uploaded
Store uploaded files outside the web root folder
Scan all files for malware
Authenticate users
Fully implemented
Partially implemented
Not implemented
I don't know
© Copyright OPSWAT 2021. All rights reserved.
Blind Spot: Data Sanitization (prevent zero-day)
Does your company use CDR (Content Disarm and Reconstruction) for data sanitization to
disarm embedded threats (e.g., macros in word documents or scripts in pdfs)?
35%
37%
16%
12% Yes
No
I’ve never heard of CDR
I've heard of CDR, but don't know if my
company uses it
Application Security Compliance Mandates
© Copyright OPSWAT 2021. All rights reserved.
ISO 27001
Applies nearly universally
• Annex: A.12.2 Scan for malware before
using any files received via networks or
any storage device
PCI DSS
Payment Card Industry Data
Security Standard
Applies to any company handling
payment data
• PCI DSS Requirement 5: Protect all
systems against malware and update
anti-virus software or programs regularly
HIPAA
The Health Insurance Portability and
Accountability Act of 1996
Applies to Healthcare and insurance
providers and their business
associates, or any partner entity
accessing patient health information
(PHI)
§ 164.308(a)(5)(ii)(B) Protection from
Malicious Software
NERC CIP
North American Electric Reliability
Critical Infrastructure Protection
Applies to all US energy providers
• CIP-007-6 – Malicious Code Prevention
NIST 800-53
Applies to all U.S. Federal
information systems
• SI-3 Malicious Code Protection
Others:
GDPR
General Data Protection
Regulation
FISMA
Federal Information Security
Management Act of 2002
Security Infrastructure & Platform Integrations
Which deployment stack would you like to have plug-and-play security integrations for?
n = would benefit from plug and play solutions
Google, Oracle, Java,
Zscaler, Netscope
Other
2%
6%
8%
35%
37%
48%
74%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other. Please specify:
A10
Envoy
Nginx
F5
Citrix
VMware
61% choose one of
F5 or Nginx
(16% choose both)
© Copyright OPSWAT 2021. All rights reserved.
App Security:
Technologies
MetaDefender Core™
Technology Platform
Challenges
File-based evasive malware and zero-day attacks
Sensitive data leakage and staying compliant
Too many security tools and technologies
Complex systems, few qualified professionals
Solution
Inspect all incoming files for malware
Data sanitization to prevent zero-day attacks
Detect and manage sensitive information in files
Multiple security technologies in a single platform
Application Security
MetaDefender Core™
Technology Platform
Benefits
Malware protection and data breach prevention
Protect sensitive data in files
Comprehensive, easy-to-integrate platform
Features
Multiscanning with 30+ AV engines
Deep CDR (Content Disarm and Reconstruction)
Proactive DLP (Data Loss Prevention)
Wide file type support including nested archives
Application Security
MetaDefender ICAP™
Benefits
Out-of-the-box integration into
existing infrastructure, fast setup and POC
Comprehensive security and data
protection technologies, additive security
Low overhead maintenance
Features
All MetaDefender Core platform technologies
Integrates with any ICAP-enabled
device (secure gateway, proxies, WAF, SSL
inspectors)
Native integration with NGINX Plus and NGINX
Open Source
Application Security
Why NGINX?
What is NGINX?
§ Fastest web server available
§ Started open source, now part of F5
§ HA, health monitoring, DNS system
discovery
§ RESTful API, cloud native
§ Load balancer, reverse proxy
§ API gateway, media streaming
Use Cases:
§ Follows traditional ICAP use cases
§ Custom web apps with file upload capability
§ Migrating to the cloud
§ Cloud-native, containers, k8s
Multiscanning
• Combine 30+ commercial anti-
malware engines into one
platform for faster detection
• Combine analysis
mechanisms/techniques
(Signatures, Heuristics, AI/ML,
Emulation, etc.) to increase
detection ratio
• Detection optimization and
normalization
• Complements AV on endpoint
Multiple layers of defense
How It Works
OPSWAT Metascan
Simultaneous analysis with multiple anti-malware engines
• 30+ commercial anti-malware engines in one solution
• Combined analysis based on signatures, heuristics, AI/ML,
algorithms, emulation, and NGAV accelerates detection of
new and evolving malware
• Improved malware detection rate ~100%
• Faster outbreak detection- proactive defense-in-depth
dramatically reduces Mean Time to Detect (MTTD)
• Lower false positives
Adding more anti-malware engines increases detection rates to nearly 100% and reduces Mean Time to Detect (MTTD) by 25%
4 Engines 8 Engines 12 Engines 16 Engines 20 Engines Max Engines
Detection 88.70% 90.70% 92.70% 95.20% 95.70% 99.40%
MTTD (hours) 132.32 115.2 107.76 102.48 100.54
88.70%
90.70%
92.70%
95.20% 95.70%
99.40%
132.32
115.2
107.76
102.48 100.54
0
20
40
60
80
100
120
140
60.00%
65.00%
70.00%
75.00%
80.00%
85.00%
90.00%
95.00%
100.00%
Detection of top 10000 threats
Source: https://metadefender.opswat.com, September 2021
© Copyright OPSWAT 2021. All rights reserved.
• Proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD)
• Combined application of proprietary technologies (heuristics, AI/ML, algorithms per vendor accelerates discovery of new and evolving
malware
Improved Malware Detection through Multiscanning
Deep CDR
How It Works
Verify file type and identify all
active embedded content in
file
IDENTIFY & SCAN
Remove all the potentially malicious
content and reconstruct the file with
only legitimate components
SANITIZE (DEEP CDR)
Generate a threat-free file
with full functionality and
quarantine the original file
USE
Deep CDR
• Supports 120+ file types (including
many regional-specific Office Suites,
such as Hancom and Ichitaro)
• 200+ conversion options
• Verify 4,500+ file types
• 50+ detailed configuration for
different file types
• Maintains file usability
• Achieves fast sanitization without
impacting performance
How It Works
Recursive Sanitization
• Embedded documents in a document
• Archives inside an archive
• Attachments in an email
• Real Archives
• TAR / ZIP / RAR / CAB
• Common files
• Office Suite (docx, xlsx, pptx, etc.)
• PDF
• Images (jpg, png, bmp, etc.)
How CDR Works
Examples
Deep CDR
Malware Features Solution Result
BLINDINGCAN
North Korea
• Reported by FBI/CISA in Aug 2020,
• use Attached Template to link to a malicious file
Deep CDR removes
all linked files
No malware
downloaded
Locky
ransomware
attack
• Delivered by email with an attached MS Word file containing
malicious macro
• Enabled macro drops the malware
• The malware detects whether it is running within a virtual
machine or a physical machine and relocate of instruction code.
Deep CDR removes
Macros
No malware
downloaded
Cobalt Strike
Backdoor
• Exploited MS vulnerabilities CVE-2021-40444
• Docx file contains an ActiveX object to download an HTML file
• HTML file downloads several files and Cobalt Strike malware
payload
Deep CDR removes
OLE objects
No shellcode
dropped
Proactive DLP
How It Works
Detect and Redact Watermark Remove Metadata
Proactive DLP
Highlights
• Supported sensitive information:
• Social Security Numbers
• Credit Card Numbers
• IPv4 addresses
• Classless Inter-Domain Routing (CIDR)
• Custom Regular Expressions (RegEx)
• Optical Character Recognition (OCR)
• Recursive detection
• More than 70 supported file types
• Individualized certainty level for each type of
sensitive information
• Advanced detection policy
How It Works
MetaDefender Core™
Deployment Options
Deployments
MetaDefender Core integrates with your
existing security architecture via REST API
MetaDefender Core Container deploys in
your containerization environments such as
Docker and Kubernetes
MetaDefender Cloud integrates with
IaaS environments like AWS, or with your existing
SaaS products like Salesforce for cloud-based
analysis.
MetaDefender ICAP Server integrates with
web apps (via Ingress, WAF, LB or API Gateway) or
Storage (NAS)
Application Security
Zero Trust
It’s a journey, not a destination
Technology
Better together! The F5/NGINX/OPSWAT
combination moves the needle when
implementing zero trust
©2023 OPSWAT, Inc. Proprietary and Confidential
Thank You!

Contenu connexe

Tendances

Hashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewHashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewStenio Ferreira
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD PipelineJames Wickett
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Come Fly With Me: Database Migration Patterns with Flyway
Come Fly With Me: Database Migration Patterns with FlywayCome Fly With Me: Database Migration Patterns with Flyway
Come Fly With Me: Database Migration Patterns with FlywayJoris Kuipers
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Clean Infrastructure as Code
Clean Infrastructure as Code Clean Infrastructure as Code
Clean Infrastructure as Code QAware GmbH
 
Deploy 22 microservices from scratch in 30 mins with GitOps
Deploy 22 microservices from scratch in 30 mins with GitOpsDeploy 22 microservices from scratch in 30 mins with GitOps
Deploy 22 microservices from scratch in 30 mins with GitOpsOpsta
 
Micro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMicro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMiki Lombardi
 
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices ArchitecturesUnit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices ArchitecturesNGINX, Inc.
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
Event Driven Architecture (EDA) Reference Architecture
Event Driven Architecture (EDA) Reference ArchitectureEvent Driven Architecture (EDA) Reference Architecture
Event Driven Architecture (EDA) Reference ArchitectureBob Rhubart
 
Agile Integration with APIs and Containers Workshop
Agile Integration with APIs and Containers Workshop Agile Integration with APIs and Containers Workshop
Agile Integration with APIs and Containers Workshop Nicole Maselli
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Amazon Web Services
 
Google Associate Cloud Engineer Certification Tips
Google Associate Cloud Engineer Certification TipsGoogle Associate Cloud Engineer Certification Tips
Google Associate Cloud Engineer Certification TipsDaniel Zivkovic
 
Nightwatch JS for End to End Tests
Nightwatch JS for End to End TestsNightwatch JS for End to End Tests
Nightwatch JS for End to End TestsSriram Angajala
 
Apache Kafka in the Insurance Industry
Apache Kafka in the Insurance IndustryApache Kafka in the Insurance Industry
Apache Kafka in the Insurance IndustryKai Wähner
 

Tendances (20)

Hashicorp Corporate and Product Overview
Hashicorp Corporate and Product OverviewHashicorp Corporate and Product Overview
Hashicorp Corporate and Product Overview
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Come Fly With Me: Database Migration Patterns with Flyway
Come Fly With Me: Database Migration Patterns with FlywayCome Fly With Me: Database Migration Patterns with Flyway
Come Fly With Me: Database Migration Patterns with Flyway
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Clean Infrastructure as Code
Clean Infrastructure as Code Clean Infrastructure as Code
Clean Infrastructure as Code
 
Deploy 22 microservices from scratch in 30 mins with GitOps
Deploy 22 microservices from scratch in 30 mins with GitOpsDeploy 22 microservices from scratch in 30 mins with GitOps
Deploy 22 microservices from scratch in 30 mins with GitOps
 
Micro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMicro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - Plansoft
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
 
Azure purview
Azure purviewAzure purview
Azure purview
 
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices ArchitecturesUnit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
Api Gateway
Api GatewayApi Gateway
Api Gateway
 
Event Driven Architecture (EDA) Reference Architecture
Event Driven Architecture (EDA) Reference ArchitectureEvent Driven Architecture (EDA) Reference Architecture
Event Driven Architecture (EDA) Reference Architecture
 
Agile Integration with APIs and Containers Workshop
Agile Integration with APIs and Containers Workshop Agile Integration with APIs and Containers Workshop
Agile Integration with APIs and Containers Workshop
 
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
Observability for Modern Applications (CON306-R1) - AWS re:Invent 2018
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
Google Associate Cloud Engineer Certification Tips
Google Associate Cloud Engineer Certification TipsGoogle Associate Cloud Engineer Certification Tips
Google Associate Cloud Engineer Certification Tips
 
Nightwatch JS for End to End Tests
Nightwatch JS for End to End TestsNightwatch JS for End to End Tests
Nightwatch JS for End to End Tests
 
Apache Kafka in the Insurance Industry
Apache Kafka in the Insurance IndustryApache Kafka in the Insurance Industry
Apache Kafka in the Insurance Industry
 

Similaire à Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX

How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureOPSWAT
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with SparrowJason Sohn
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 

Similaire à Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX (20)

How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 

Plus de NGINX, Inc.

【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法NGINX, Inc.
 
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナーNGINX, Inc.
 
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法NGINX, Inc.
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3NGINX, Inc.
 
Managing Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & KubecostManaging Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & KubecostNGINX, Inc.
 
Manage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with ObservabilityManage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with ObservabilityNGINX, Inc.
 
Accelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with AutomationAccelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with AutomationNGINX, Inc.
 
Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101NGINX, Inc.
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX, Inc.
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXNGINX, Inc.
 
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!NGINX, Inc.
 
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...NGINX, Inc.
 
Protecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINXProtecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINXNGINX, Inc.
 
NGINX Kubernetes API
NGINX Kubernetes APINGINX Kubernetes API
NGINX Kubernetes APINGINX, Inc.
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXNGINX, Inc.
 
Installing and Configuring NGINX Open Source
Installing and Configuring NGINX Open SourceInstalling and Configuring NGINX Open Source
Installing and Configuring NGINX Open SourceNGINX, Inc.
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXNGINX, Inc.
 
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptxHow to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptxNGINX, Inc.
 
Kubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティKubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティNGINX, Inc.
 
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...NGINX, Inc.
 

Plus de NGINX, Inc. (20)

【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
 
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
 
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
 
Managing Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & KubecostManaging Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & Kubecost
 
Manage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with ObservabilityManage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with Observability
 
Accelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with AutomationAccelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with Automation
 
Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
 
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
 
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
 
Protecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINXProtecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINX
 
NGINX Kubernetes API
NGINX Kubernetes APINGINX Kubernetes API
NGINX Kubernetes API
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
 
Installing and Configuring NGINX Open Source
Installing and Configuring NGINX Open SourceInstalling and Configuring NGINX Open Source
Installing and Configuring NGINX Open Source
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
 
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptxHow to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
 
Kubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティKubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティ
 
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...
Software Delivery and the Rube Goldberg Machine: What Is the Problem We Are T...
 

Dernier

Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
20240330_고급진 코드를 위한 exception 다루기
20240330_고급진 코드를 위한 exception 다루기20240330_고급진 코드를 위한 exception 다루기
20240330_고급진 코드를 위한 exception 다루기Chiwon Song
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfTobias Schneck
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
Kubernetes go-live checklist for your microservices.pptx
Kubernetes go-live checklist for your microservices.pptxKubernetes go-live checklist for your microservices.pptx
Kubernetes go-live checklist for your microservices.pptxPrakarsh -
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Mastering Kubernetes - Basics and Advanced Concepts using Example Project
Mastering Kubernetes - Basics and Advanced Concepts using Example ProjectMastering Kubernetes - Basics and Advanced Concepts using Example Project
Mastering Kubernetes - Basics and Advanced Concepts using Example Projectwajrcs
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 

Dernier (20)

Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
20240330_고급진 코드를 위한 exception 다루기
20240330_고급진 코드를 위한 exception 다루기20240330_고급진 코드를 위한 exception 다루기
20240330_고급진 코드를 위한 exception 다루기
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
Kubernetes go-live checklist for your microservices.pptx
Kubernetes go-live checklist for your microservices.pptxKubernetes go-live checklist for your microservices.pptx
Kubernetes go-live checklist for your microservices.pptx
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Mastering Kubernetes - Basics and Advanced Concepts using Example Project
Mastering Kubernetes - Basics and Advanced Concepts using Example ProjectMastering Kubernetes - Basics and Advanced Concepts using Example Project
Mastering Kubernetes - Basics and Advanced Concepts using Example Project
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 

Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX

  • 1. ©2023 OPSWAT, Inc. Proprietary and Confidential OPSWAT and F5/NGINX: Layered Security to Protect Web Applications OPSWAT / F5/NGINX Webinar Wednesday, January 25, 2023 Adam Rocker & Damian Curry Prepared for: Prepared by:
  • 2. ©2023 OPSWAT, Inc. Proprietary and Confidential We Protect the World’s Critical Infrastructure OUR MISSION
  • 3. 20 Years of Cybersecurity Innovation and Growth Critical Infrastructure Protection Professional Services OEM Enterprise
  • 4. Best Solution – Web Application Security "OPSWAT embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach."
  • 5. OPSWAT and F5 Partnership https://www.opswat.com/videos/how-to-integrate- metadefender-icap-with-f5 OEM Partner since 2005 (OESIS) ICAP Integration Partner since 2017 John Wagnon Pete Silva
  • 7. Application Security: Growth, Needs, and Challenges
  • 8. Notables CIP Incidents – 2021/2022 Data courtesy: Industrial Cyber, Takepoint Research Oldsmar water treatment plant hack Water & Waste Colonial Pipeline targeted by DarkSide ransomwar e hackers Pipelines Cyberattack Disrupts Operations At Molson Coors Food & Agriculture KIA core systems were shut down by a suspected DoppelPaymer ransomware attack Automotive Elekta was hit by a ransomware attack Healthcare
  • 9. Application Security – Shared Concerns © Copyright OPSWAT 2021. All rights reserved. 34% 28% 40% 46% 54% 66% 54% 38% 45% 50% 59% 62% 66% 73% 0% 20% 40% 60% 80% Post outbreak mitigation expenses Lawsuits Regulatory fines Ransomware payouts Denial of service/infrastructure Reputation damage Loss in business or revenue By Location of Corporate Headquarters United States Other Countries
  • 10. Application Security – Shared Responsibility Same as with a CSP, cybersecurity responsibilities exist between various security solutions and vendors
  • 11. Application Security: The Blind Spots 1/3 of organizations with a web application for file uploads do not scan all file uploads to detect malicious files. 1/5 of these organizations scan with just one anti-virus engine. 2/3 of organizations with a file upload web portal do not sanitize file uploads with Content Disarm and Reconstruct (CDR) to prevent unknown malware and Zero-day attacks. 32% 18% 65%
  • 12. Blind Spots galore! Please rate your organization’s level of implementation for each of the following file upload security best practices. 30% 32% 46% 52% 53% 54% 61% 61% 64% 71% 32% 33% 37% 31% 31% 33% 27% 25% 27% 22% 27% 31% 12% 12% 13% 12% 11% 9% 7% 6% 10% 4% 5% 5% 3% 1% 2% 4% 2% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Remove embedded threats with Content Disarm and Reconstruction Technology (CDR) Randomize uploaded file names Verify actual file type versus relying on the extension Use simple error messages – e.g., excluding information like directory paths that can be used to gain system entry Set a maximum file name length and size Check files for vulnerabilities Limit the specific types of files that can be uploaded Store uploaded files outside the web root folder Scan all files for malware Authenticate users Fully implemented Partially implemented Not implemented I don't know © Copyright OPSWAT 2021. All rights reserved.
  • 13. Blind Spot: Data Sanitization (prevent zero-day) Does your company use CDR (Content Disarm and Reconstruction) for data sanitization to disarm embedded threats (e.g., macros in word documents or scripts in pdfs)? 35% 37% 16% 12% Yes No I’ve never heard of CDR I've heard of CDR, but don't know if my company uses it
  • 14. Application Security Compliance Mandates © Copyright OPSWAT 2021. All rights reserved. ISO 27001 Applies nearly universally • Annex: A.12.2 Scan for malware before using any files received via networks or any storage device PCI DSS Payment Card Industry Data Security Standard Applies to any company handling payment data • PCI DSS Requirement 5: Protect all systems against malware and update anti-virus software or programs regularly HIPAA The Health Insurance Portability and Accountability Act of 1996 Applies to Healthcare and insurance providers and their business associates, or any partner entity accessing patient health information (PHI) § 164.308(a)(5)(ii)(B) Protection from Malicious Software NERC CIP North American Electric Reliability Critical Infrastructure Protection Applies to all US energy providers • CIP-007-6 – Malicious Code Prevention NIST 800-53 Applies to all U.S. Federal information systems • SI-3 Malicious Code Protection Others: GDPR General Data Protection Regulation FISMA Federal Information Security Management Act of 2002
  • 15. Security Infrastructure & Platform Integrations Which deployment stack would you like to have plug-and-play security integrations for? n = would benefit from plug and play solutions Google, Oracle, Java, Zscaler, Netscope Other 2% 6% 8% 35% 37% 48% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other. Please specify: A10 Envoy Nginx F5 Citrix VMware 61% choose one of F5 or Nginx (16% choose both) © Copyright OPSWAT 2021. All rights reserved.
  • 17. MetaDefender Core™ Technology Platform Challenges File-based evasive malware and zero-day attacks Sensitive data leakage and staying compliant Too many security tools and technologies Complex systems, few qualified professionals Solution Inspect all incoming files for malware Data sanitization to prevent zero-day attacks Detect and manage sensitive information in files Multiple security technologies in a single platform Application Security
  • 18. MetaDefender Core™ Technology Platform Benefits Malware protection and data breach prevention Protect sensitive data in files Comprehensive, easy-to-integrate platform Features Multiscanning with 30+ AV engines Deep CDR (Content Disarm and Reconstruction) Proactive DLP (Data Loss Prevention) Wide file type support including nested archives Application Security
  • 19. MetaDefender ICAP™ Benefits Out-of-the-box integration into existing infrastructure, fast setup and POC Comprehensive security and data protection technologies, additive security Low overhead maintenance Features All MetaDefender Core platform technologies Integrates with any ICAP-enabled device (secure gateway, proxies, WAF, SSL inspectors) Native integration with NGINX Plus and NGINX Open Source Application Security
  • 20. Why NGINX? What is NGINX? § Fastest web server available § Started open source, now part of F5 § HA, health monitoring, DNS system discovery § RESTful API, cloud native § Load balancer, reverse proxy § API gateway, media streaming Use Cases: § Follows traditional ICAP use cases § Custom web apps with file upload capability § Migrating to the cloud § Cloud-native, containers, k8s
  • 21. Multiscanning • Combine 30+ commercial anti- malware engines into one platform for faster detection • Combine analysis mechanisms/techniques (Signatures, Heuristics, AI/ML, Emulation, etc.) to increase detection ratio • Detection optimization and normalization • Complements AV on endpoint Multiple layers of defense How It Works
  • 22. OPSWAT Metascan Simultaneous analysis with multiple anti-malware engines • 30+ commercial anti-malware engines in one solution • Combined analysis based on signatures, heuristics, AI/ML, algorithms, emulation, and NGAV accelerates detection of new and evolving malware • Improved malware detection rate ~100% • Faster outbreak detection- proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD) • Lower false positives
  • 23. Adding more anti-malware engines increases detection rates to nearly 100% and reduces Mean Time to Detect (MTTD) by 25% 4 Engines 8 Engines 12 Engines 16 Engines 20 Engines Max Engines Detection 88.70% 90.70% 92.70% 95.20% 95.70% 99.40% MTTD (hours) 132.32 115.2 107.76 102.48 100.54 88.70% 90.70% 92.70% 95.20% 95.70% 99.40% 132.32 115.2 107.76 102.48 100.54 0 20 40 60 80 100 120 140 60.00% 65.00% 70.00% 75.00% 80.00% 85.00% 90.00% 95.00% 100.00% Detection of top 10000 threats Source: https://metadefender.opswat.com, September 2021 © Copyright OPSWAT 2021. All rights reserved. • Proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD) • Combined application of proprietary technologies (heuristics, AI/ML, algorithms per vendor accelerates discovery of new and evolving malware Improved Malware Detection through Multiscanning
  • 24. Deep CDR How It Works Verify file type and identify all active embedded content in file IDENTIFY & SCAN Remove all the potentially malicious content and reconstruct the file with only legitimate components SANITIZE (DEEP CDR) Generate a threat-free file with full functionality and quarantine the original file USE
  • 25. Deep CDR • Supports 120+ file types (including many regional-specific Office Suites, such as Hancom and Ichitaro) • 200+ conversion options • Verify 4,500+ file types • 50+ detailed configuration for different file types • Maintains file usability • Achieves fast sanitization without impacting performance How It Works
  • 26. Recursive Sanitization • Embedded documents in a document • Archives inside an archive • Attachments in an email • Real Archives • TAR / ZIP / RAR / CAB • Common files • Office Suite (docx, xlsx, pptx, etc.) • PDF • Images (jpg, png, bmp, etc.) How CDR Works
  • 27. Examples Deep CDR Malware Features Solution Result BLINDINGCAN North Korea • Reported by FBI/CISA in Aug 2020, • use Attached Template to link to a malicious file Deep CDR removes all linked files No malware downloaded Locky ransomware attack • Delivered by email with an attached MS Word file containing malicious macro • Enabled macro drops the malware • The malware detects whether it is running within a virtual machine or a physical machine and relocate of instruction code. Deep CDR removes Macros No malware downloaded Cobalt Strike Backdoor • Exploited MS vulnerabilities CVE-2021-40444 • Docx file contains an ActiveX object to download an HTML file • HTML file downloads several files and Cobalt Strike malware payload Deep CDR removes OLE objects No shellcode dropped
  • 28. Proactive DLP How It Works Detect and Redact Watermark Remove Metadata
  • 29. Proactive DLP Highlights • Supported sensitive information: • Social Security Numbers • Credit Card Numbers • IPv4 addresses • Classless Inter-Domain Routing (CIDR) • Custom Regular Expressions (RegEx) • Optical Character Recognition (OCR) • Recursive detection • More than 70 supported file types • Individualized certainty level for each type of sensitive information • Advanced detection policy How It Works
  • 30. MetaDefender Core™ Deployment Options Deployments MetaDefender Core integrates with your existing security architecture via REST API MetaDefender Core Container deploys in your containerization environments such as Docker and Kubernetes MetaDefender Cloud integrates with IaaS environments like AWS, or with your existing SaaS products like Salesforce for cloud-based analysis. MetaDefender ICAP Server integrates with web apps (via Ingress, WAF, LB or API Gateway) or Storage (NAS) Application Security
  • 31. Zero Trust It’s a journey, not a destination Technology Better together! The F5/NGINX/OPSWAT combination moves the needle when implementing zero trust
  • 32. ©2023 OPSWAT, Inc. Proprietary and Confidential Thank You!