Hello, welcome to visit Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring, and the official website of Wuxi Dehang Technology Co., Ltd!

 1512008412106430.png   Service hotline 138-618-32237

 Wuxi Monitoring

system integration

Product classification

contact us

Enterprise name: Wuxi Dehang Technology Co., Ltd

Contact: Mr. Liu

Tel.: 0510-68289990

Mobile: 13861832237

Email: [email protected]

Website: nabenjixie.cn

Address: Room 1202, No. 99 Zhaoshangcheng Road, Wuxi, Jiangsu

Welcome to Wuxi Security Monitoring, Wuxi Monitoring, Wuxi Remote Monitoring - the official website of Wuxi Dehang Technology Co., Ltd!

Web application protection

Your current location: home page >> system integration >> Web application protection

      In recent years, the security problems of Web applications faced by various organizations of governments and enterprises have become more and more complex, and security threats are growing rapidly, especially the mixed threat risks, such as hacker attacks, worms, DDoS attacks, SQL injection, cross site scripting, and the use of Web application security vulnerabilities, which have greatly troubled users and caused serious damage to information networks and core businesses, Internal maintenance personnel are tired of dealing with the remedy of web application security vulnerabilities firewall Limited to its own detection mechanism and protection depth, it has been difficult to solve many current Web application security problems.          
      Web Application Firewall (WAF for short) is a new product in the international security community, which is used to solve the security problems in the Web application layer  


Imperva SecureSphere? Web application firewall  


The only automated web application firewall in the industry


Is your web application secure?  


Web application is the main target of attack; According to the FBI survey in 2006, 92% of enterprises have been attacked by successful web applications in the past 12 months. These attacks can lead to devastating results ranging from serious damage to profile data to brand damage, legal proceedings and fines.  


Both the security administrator and the management organization have noticed this fact. Since traditional security products cannot prevent web application attacks, new compliance regulations now mandate application layer protection. For many enterprises, meeting current security and compliance requirements is a thorny problem.  


Protect your applications and business with Imperva


Imperva's SecureSphere Web application firewall can protect Web applications and sensitive data. Moreover, the firewall has the characteristics of simple deployment, automation, adjustable security, low operating costs, etc. SecureSphere provides your enterprise with a set of practical and highly secure solutions to ensure that the enterprise can solve the latest challenges related to transaction data security and compliance.


 waf.gif



Automated web application security

SecureSphere ® The Web application firewall implements automatic Web attack protection, thus changing the way enterprises protect applications and sensitive data. Imperva's dynamic modeling technology automatically builds a legal behavior model and automatically adjusts it according to application changes in the future, so as to keep the application protection of SecureSphere always up to date and accurate, without manual configuration or adjustment. The deployment of SecureSphere can be completed within a few minutes. It does not need to modify the original infrastructure, and it can protect individual applications from The server And the whole application system of the network. Imperva's transparent inspection technology has a throughput capacity of thousands of megabits and a waiting time as short as sub millisecond. It also provides a variety of high availability options to meet the most demanding data center requirements. For large-scale deployment, the SecureSphere MX management server can centralize and simplify configuration, monitoring and reporting.


Comprehensive attack protection


SecureSphere Web application firewall uses multiple security protection to provide the highest level of protection. These protections include dynamic configuration files, HTTP protocol verification, platform attack security, and associated attack confirmation.


 waf2.gif

Automatic Applied Learning – Imperva's Dynamic Modeling

SecureSphere's unique dynamic modeling technology can automatically learn the structure, elements and expected usage patterns of protected Web applications. The dynamic model continuously and automatically detects effective application modifications and incorporates them into the application rule file. By comparing Web requests with model rules, SecureSphere can detect unacceptable behaviors with high precision and prevent malicious activities.



The dynamic configuration file overcomes the biggest defect related to the absolute security model: it needs to manually create and update a huge white list that may contain hundreds or even thousands of URLs, form fields, parameters, and cookies. Dynamic configuration file technology can automatically build accurate configuration files without manual configuration or adjustment.


Latest security solutions from Imperva ADC

Imperva Application Protection Center (ADC) is an internationally renowned security research institution. They continue to investigate new vulnerabilities reported around the world, analyze abuse traffic from various real Web sites, and conduct preliminary vulnerability studies to identify the latest threats. The result of this research is the latest protection measures on each layer of SecureSphere, including signature update, protocol verification rules and association rules.

In addition to the latest attack protection, ADC also provides optional ADC knowledge services. ADC knowledge provides in-depth business application knowledge, pre built compliance reports, and best practices from compliance and security experts.

HTTP protocol verification

HTTP protocol verification can prevent massive protocol abuse, including buffer overflow, malicious coding, HTTP * * * * and illegal server operations. Flexible rules allow users to strictly comply with RFC standards or allow minor deviations from specific applications.

Platform and network attack protection

SecureSphere prevents attacks targeting known web server vulnerabilities, middleware vulnerabilities, and platform vulnerabilities. From Bugtraq, CVE Snort.、 More than 4000 signatures from Imperva ADC and other sources provide comprehensive protection against such attacks. In addition to identifying known worms, SecureSphere also identifies emerging new Web worms by detecting unique attribute combinations with Web worm attack characteristics.

SecureSphere integrates the stateful network firewall, which can resist illegal users, protocols and network attacks from internal and external sources. It meets mandatory best practice security requirements and can prevent sensitive web applications from being used by unnecessary protocols.

Web Service Protection

Using its dynamic configuration file technology, SecureSphere can also create legal Web service behavior models including XML files, elements, attributes, schemas, variables, and SOAP operations. Any attempt to tamper with normal Web service behavior will be detected and blocked.

Unmatched accuracy

Imperva's unique correlation attack confirmation technology associates the cross security layer and long-term violations to accurately identify the most complex attacks. Individual violations may not be able to identify attacks accurately, but they can be identified without question by associating unique combinations of violations. No other solution can match the accuracy achieved through correlation attack verification.



Transparent deployment

No application or network modification required

The transparent inspection technology uniquely enables SecureSphere to be deployed in any environment without modifying the original applications, servers or networks. SecureSphere provides comprehensive and accurate application security, and does not require enterprises to redesign web applications, modify IP or DNS settings, or update authentication schemes.

The kernel based transparent check separates the security from the deployment mode, so that SecureSphere can support the following operation modes:

. Transparent bridge – simple to deploy, able to provide the best performance in the industry
. Router – Used for network segmentation, routing and network address translation
. Reverse proxy - used for content modification, such as cookie signature and URL rewriting
. Transparent proxy - used to quickly deploy content modification without changing the network
. Off line monitoring program – zero risk monitoring and analysis.

Gigabit performance

SecureSphere provides a throughput of thousands of megabits per second, tens of thousands of transactions, and can maintain the waiting time at the sub millisecond level. This performance level is one order of magnitude higher than the competitor's method, which ensures a completely transparent deployment. After using SecureSphere, security will never affect data center service level agreements or application performance.

High availability

SecureSphere supports many high availability options, which enables it to be deployed in some of the world's largest networks. Availability options include:
Imperva high availability (IMPPHA) provides sub second failover
Virtual Router Redundancy Protocol (VRRP) for router or agent deployment
Active active and active passive redundancy for external availability mechanisms
The interface for fault short circuit is used to ensure the availability of a single gateway
. Non online deployment for zero risk monitoring and evaluation


 waf3.gif


operation

Automated rule maintenance

The implementation of the traditional white list security model requires continuous manual adjustment. When the Web application is modified, the whitelist of the application firewall must be updated. The automatic modeling technology can automatically establish the model of the Web application and automatically adjust the model according to the application modification, so manual adjustment is no longer required. SecureSphere administrators can still modify the application rule model and create customized rules.

Centralized management

SecureSphere can be deployed as an independent device or extended to protect distributed data centers. For large environments, including hybrid Web and database deployments, the SecureSphere MX management server can provide centralized configuration, monitoring, and reporting. The management server simplifies the management of large enterprise environment and ASP environment through hierarchical organization grouping, granular management permissions and unique task oriented workflow.

Enterprise level report

SecureSphere provides rich graphical report functions, enabling customers to easily understand security status and meet regulatory compliance requirements. SecureSphere provides both predefined and fully customizable web-based reports. You can view reports on demand, or send reports by email daily, weekly, or monthly. SecureSphere's reporting platform provides an immediate and comprehensive way to understand security, compliance, and content delivery issues.


Monitoring and alarm

The real-time dashboard provides a high-level system status and security event view. Alarms can be easily searched and sorted, and can also be directly linked to the corresponding security rules. To flexibly integrate with security event management products, SecureSphere supports syslog, SNMP, and direct ODBC access.

Apply User Tracking

SecureSphere's dynamic modeling technology automatically obtains the name of the Web application user and associates all subsequent session activities with this specific user name. As a result, SecureSphere can uniquely monitor, enforce, and audit rules by user.

Optional database protection

The SecureSphere Web application firewall has been extended to monitor and protect Oracle, MS-SQL Server, DB2, Sybase and Informix databases. SecureSphere database security gateway can prevent external attacks and internal personnel abuse, thus providing end-to-end security for the data center. In addition, it can also use SecureSphere's application user tracking to trace individual SQL queries to Web users. This common user tracking capability provides unparalleled knowledge of database requests, modifications, and violations.


Typical customers


 GE. jpg Caterpillar. png Olympic Costumes.png Murata Electronic.png

  • Online Service
  • contact number
    thirteen billion eight hundred and sixty-one million eight hundred and thirty-two thousand two hundred and thirty-seven
  • Online Message
  • Mobile website
  • Online consultation
    Welcome to leave us a message
    Please enter your message here, and we will contact you as soon as possible.
    full name
    contacts
    Telephone
    Landline/mobile number
    mailbox
    mailbox
    address
    address