SlideShare a Scribd company logo
1 of 2
Download to read offline
OVERVIEW
SECURE YOUR WEBSITES AND BUSINESS-CRITICAL
WEB APPLICATIONS
IT security threats are increasingly numerous and varied.
Web application attacks are of particular concern, with 97% of
security breaches caused by web vulnerabilities.1 Organizations
that must comply with PCI-DSS Requirement 6.6 should pay
particular attention to these threats. Yet traditional IT security
solutions, such as firewalls or intrusion detection/prevention
services (IDS/IPS), do not do enough to guard against Internet
attacks or offer comprehensive protection.
Web Application Firewalls (WAF) are designed to deter intruders
from exploiting vulnerabilities in web applications. They monitor
and inspect incoming traffic and intercept attacks before your
applications and data can be compromised. PCI DSS requires
either application code review or a web application firewall
(WAF) with proper positioning, configuration, administration,
and monitoring. However many organizations lack the security
personnel and expertise necessary to implement and tune a WAF
or remediate security incidents.
1 Barclays Card Services—January 2011
FACILITY FACT
SHEET
PRODUCT DATA
SHEET
SUNGARD SECURITY ANALYSTS FULLY
MANAGE YOUR WAF AND RESPOND
TO INCIDENTS 24/7
SunGard’s Managed Web Application
Firewall (WAF) safeguards websites and
business critical applications from Web
application attacks such as SQL injection,
cross-site scripting, OS command
injection as well as emerging threats
and zero-day exploits.
• SunGard’s Managed WAF service
provides 24/7 monitoring and incident
escalation by certified security
analysts, along with ongoing tuning
and management of the WAF.
Because the solution is managed,
SunGard eliminates the need for capital
expenditures, ongoing maintenance and
hardware or software updates. Instead,
customers pay an easily budgeted
monthly fee. The service can be deployed
rapidly and scales to meet immediate
and future needs.
• Implementing Managed WAF provides
support for compliance with PCI DSS
6.6, along with support for other
compliance mandates.
HOW IT WORKS: PROCESS FLOW
KEY BENEFITS
• Proven protection against web
application attacks, including zero
day attacks and emerging threats
• Fully managed service
• Supports PCI DSS 6.6 compliance
• Implement on-premise
or in hosted environments
MANAGED WEB
APPLICATION FIREWALL
LEGITIMATE USERS
ATTACKER
ATTACKER
NETWORK
FIREWALL
WEB
APPLICATION
FIREWALL
WEB
SERVERS
About SunGard Availability Services
SunGard Availability Services provides disaster recovery services, managed IT services,
information availability consulting services and business continuity management software.
To learn more, visit www.sungardas.com or call 1-888-270-3657.
Trademark information: SunGard and the SunGard logo are trademarks or registered trademarks of SunGard Data Systems Inc. or its
subsidiaries in the U.S. and other countries. All other trade names are trademarks or registered trademarks of their respective holders.
© 2013 SunGard. SEL-225 413
Connect with Us
BENEFITS
PROVEN PROTECTION
• Protects against SQL injection, cross-
site scripting, OS command injection
and other serious web attacks
• Automated learning engine develops
customized site security policies
• Web server cloaking and customizable
HTTP error handling shields web
servers from direct Internet access and
defeats fingerprinting attacks
• Whitelist-based filtering protects
against threats from unpublished
vulnerabilities in web server software
and applications
• Safeguards XML, JSON
and SOAP web services
• Protects against outbound data
theft and log data masking
LOWER COST, PREDICTABLE SERVICE MODEL
• Fully managed — Certified security
analysts provide proactive 24/7
monitoring and incident escalation as
well as ongoing tuning and
management of the WAF
• No capital expenses — you pay
predictable monthly fees with
no hidden costs
• Scale as needed
• No need to manage upgrades
or patching — you always have the
current product
• Can be implemented rapidly on-
premise or in hosted environments
with a non-invasive, no downtime
deployment mode, providing industry
leading security without physical
network changes
STRENGTHENED COMPLIANCE
• Meets PCI DSS requirement 6.6 to
install a web application firewall in front
of public facing web applications and
have security experts on hand to
manage the WAF on an ongoing basis
• Supports other compliance
mandates including HIPAA
IMPROVED PERFORMANCE, VISITOR EXPERIENCE
• Dynamic HTTP compression and static
content caching improve performance
• SSL termination and TCP connection
off-loading speed transfer rates by 50
to 100 percent
• Automatic fail-over and policy
synchronization ensure high availability
SUNGARD MANAGED SECURITY SERVICES
SunGard Managed Web Application Firewall is an important component of SunGard’s
suite of Managed Security services that supports a Defense in Depth Information Security
Strategy. Defense in Depth delivers a layered approach to security that relies on a series
of defenses, rather than on a single type of protection.
SUNGARD MANAGED WEB
APPLICATION FIREWALL

More Related Content

What's hot

Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationEduardo Garcia
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextAlgoSec
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protectioncentralohioissa
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass
 
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Business Cable Collaboration Group
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
Benefits of an Managed Service Provider
Benefits of an Managed Service ProviderBenefits of an Managed Service Provider
Benefits of an Managed Service ProviderThe TNS Group
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
Determining Scope for PCI DSS Compliance
Determining Scope for PCI DSS ComplianceDetermining Scope for PCI DSS Compliance
Determining Scope for PCI DSS ComplianceSchellman & Company
 
NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15Bilha Diaz
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Clint Walker
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security BenchmarkRahul Khengare
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
PA-DSS and Application Penetration Testing
PA-DSS and Application Penetration TestingPA-DSS and Application Penetration Testing
PA-DSS and Application Penetration TestingSchellman & Company
 

What's hot (20)

Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
Managing risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business contextManaging risk and vulnerabilities in a business context
Managing risk and vulnerabilities in a business context
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
Benefits of an Managed Service Provider
Benefits of an Managed Service ProviderBenefits of an Managed Service Provider
Benefits of an Managed Service Provider
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
Determining Scope for PCI DSS Compliance
Determining Scope for PCI DSS ComplianceDetermining Scope for PCI DSS Compliance
Determining Scope for PCI DSS Compliance
 
protect4s-product-sheet
protect4s-product-sheetprotect4s-product-sheet
protect4s-product-sheet
 
NEWSentinel_services15
NEWSentinel_services15NEWSentinel_services15
NEWSentinel_services15
 
Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015Infographic-1-MainFrame BlindSpots_082015
Infographic-1-MainFrame BlindSpots_082015
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
PA-DSS and Application Penetration Testing
PA-DSS and Application Penetration TestingPA-DSS and Application Penetration Testing
PA-DSS and Application Penetration Testing
 

Similar to collateral_datasheet_sungard

Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesHCLSoftware
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challengewebhostingguy
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallAvi Networks
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingValiant Technology
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered
 

Similar to collateral_datasheet_sungard (20)

Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policies
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Presentation Flow Part A – The Challenge
Presentation Flow Part A – The ChallengePresentation Flow Part A – The Challenge
Presentation Flow Part A – The Challenge
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application Firewall
 
Wi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless NetworkingWi-Fi 6: A New Era of Wireless Networking
Wi-Fi 6: A New Era of Wireless Networking
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Cisco Powered DRaaS eBook
Cisco Powered DRaaS eBookCisco Powered DRaaS eBook
Cisco Powered DRaaS eBook
 

More from Cheryl Goldberg

Allscripts Atlanta Womens
Allscripts Atlanta WomensAllscripts Atlanta Womens
Allscripts Atlanta WomensCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
can-you-think-like-a-fraudster-106948
can-you-think-like-a-fraudster-106948can-you-think-like-a-fraudster-106948
can-you-think-like-a-fraudster-106948Cheryl Goldberg
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 

More from Cheryl Goldberg (6)

Allscripts Atlanta Womens
Allscripts Atlanta WomensAllscripts Atlanta Womens
Allscripts Atlanta Womens
 
NuanceWhitepaperfinal
NuanceWhitepaperfinalNuanceWhitepaperfinal
NuanceWhitepaperfinal
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
can-you-think-like-a-fraudster-106948
can-you-think-like-a-fraudster-106948can-you-think-like-a-fraudster-106948
can-you-think-like-a-fraudster-106948
 
Akamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_FinalAkamai___WebSecurity_eBook_Final
Akamai___WebSecurity_eBook_Final
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 

collateral_datasheet_sungard

  • 1. OVERVIEW SECURE YOUR WEBSITES AND BUSINESS-CRITICAL WEB APPLICATIONS IT security threats are increasingly numerous and varied. Web application attacks are of particular concern, with 97% of security breaches caused by web vulnerabilities.1 Organizations that must comply with PCI-DSS Requirement 6.6 should pay particular attention to these threats. Yet traditional IT security solutions, such as firewalls or intrusion detection/prevention services (IDS/IPS), do not do enough to guard against Internet attacks or offer comprehensive protection. Web Application Firewalls (WAF) are designed to deter intruders from exploiting vulnerabilities in web applications. They monitor and inspect incoming traffic and intercept attacks before your applications and data can be compromised. PCI DSS requires either application code review or a web application firewall (WAF) with proper positioning, configuration, administration, and monitoring. However many organizations lack the security personnel and expertise necessary to implement and tune a WAF or remediate security incidents. 1 Barclays Card Services—January 2011 FACILITY FACT SHEET PRODUCT DATA SHEET SUNGARD SECURITY ANALYSTS FULLY MANAGE YOUR WAF AND RESPOND TO INCIDENTS 24/7 SunGard’s Managed Web Application Firewall (WAF) safeguards websites and business critical applications from Web application attacks such as SQL injection, cross-site scripting, OS command injection as well as emerging threats and zero-day exploits. • SunGard’s Managed WAF service provides 24/7 monitoring and incident escalation by certified security analysts, along with ongoing tuning and management of the WAF. Because the solution is managed, SunGard eliminates the need for capital expenditures, ongoing maintenance and hardware or software updates. Instead, customers pay an easily budgeted monthly fee. The service can be deployed rapidly and scales to meet immediate and future needs. • Implementing Managed WAF provides support for compliance with PCI DSS 6.6, along with support for other compliance mandates. HOW IT WORKS: PROCESS FLOW KEY BENEFITS • Proven protection against web application attacks, including zero day attacks and emerging threats • Fully managed service • Supports PCI DSS 6.6 compliance • Implement on-premise or in hosted environments MANAGED WEB APPLICATION FIREWALL LEGITIMATE USERS ATTACKER ATTACKER NETWORK FIREWALL WEB APPLICATION FIREWALL WEB SERVERS
  • 2. About SunGard Availability Services SunGard Availability Services provides disaster recovery services, managed IT services, information availability consulting services and business continuity management software. To learn more, visit www.sungardas.com or call 1-888-270-3657. Trademark information: SunGard and the SunGard logo are trademarks or registered trademarks of SunGard Data Systems Inc. or its subsidiaries in the U.S. and other countries. All other trade names are trademarks or registered trademarks of their respective holders. © 2013 SunGard. SEL-225 413 Connect with Us BENEFITS PROVEN PROTECTION • Protects against SQL injection, cross- site scripting, OS command injection and other serious web attacks • Automated learning engine develops customized site security policies • Web server cloaking and customizable HTTP error handling shields web servers from direct Internet access and defeats fingerprinting attacks • Whitelist-based filtering protects against threats from unpublished vulnerabilities in web server software and applications • Safeguards XML, JSON and SOAP web services • Protects against outbound data theft and log data masking LOWER COST, PREDICTABLE SERVICE MODEL • Fully managed — Certified security analysts provide proactive 24/7 monitoring and incident escalation as well as ongoing tuning and management of the WAF • No capital expenses — you pay predictable monthly fees with no hidden costs • Scale as needed • No need to manage upgrades or patching — you always have the current product • Can be implemented rapidly on- premise or in hosted environments with a non-invasive, no downtime deployment mode, providing industry leading security without physical network changes STRENGTHENED COMPLIANCE • Meets PCI DSS requirement 6.6 to install a web application firewall in front of public facing web applications and have security experts on hand to manage the WAF on an ongoing basis • Supports other compliance mandates including HIPAA IMPROVED PERFORMANCE, VISITOR EXPERIENCE • Dynamic HTTP compression and static content caching improve performance • SSL termination and TCP connection off-loading speed transfer rates by 50 to 100 percent • Automatic fail-over and policy synchronization ensure high availability SUNGARD MANAGED SECURITY SERVICES SunGard Managed Web Application Firewall is an important component of SunGard’s suite of Managed Security services that supports a Defense in Depth Information Security Strategy. Defense in Depth delivers a layered approach to security that relies on a series of defenses, rather than on a single type of protection. SUNGARD MANAGED WEB APPLICATION FIREWALL