SlideShare a Scribd company logo
Proteja suas Aplicações e esteja
Seguro
Vinicius Miranda, Sales Engineer
WestconGroup, vinicius.miranda@westcon.com
© F5 Networks, Inc 2
• A Importância da Proteção para suas Aplicações;
• Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação?
• Principais Ataques Direcionados para as Aplicações;
• Como a F5 Networks ajuda na Proteção das suas Aplicações?
• Duvidas;
Agenda
A Importância da Proteção para as
Aplicações
© F5 Networks, Inc 4
Business App Security Access
Proteção da Aplicação é igual a Proteção do Negócio?
Vazamento
de Dados
Roubo de
Credencial
Fraude
US$ 81
Milhões
8.695 casos no
Brasil entre
2014/2015 –
PwC 16
© F5 Networks, Inc 5
Como comprovar essa realidade?
Source: Akamai Report
Firewall Tradicional e Firewall de
Aplicação, qual é a Diferença???
© F5 Networks, Inc 7
Vamos entender…
“Next generation” Firewall
Characteristics
• Outbound USER inspection
• Who is doing what?
• “Trusted” users to Internet
Corporate
(users)
Web Application Firewall
Data center
(servers)
Characteristics
• Inbound APPLICATION protection
• Application delivery focus
• “Untrusted” users to data center
© F5 Networks, Inc 8
Ok…mas qual é a diferença entre eles?
Multiprotocol Security 
IP Reputation  
Web Attack Signatures 
Web Vulnerabilities Signatures  
Automatic Policy Learning 
URL, Parameter, Cookie and Form Protection 
Leverage Vulnerability Scan Results 
Principais Ataques Direcionados
para as Aplicações
© F5 Networks, Inc 10
Roubo de Credencial, Vazamento de Dados, Aplicações
Lentas…
SQL
Injection
Cross-Site
Scripting
XSS
Parameter
Tampering
© F5 Networks, Inc 11
Vulnerabilidades nas Aplicações WEB…
7%
2014
40%
2016
Como estar protegido diante deste Cenário?
Como a F5 Networks pode ajudar?
© F5 Networks, Inc 13
The New Perimeter Is An App Perimeter
Apps Are The Gateway to Data!
F5
SS
L
SS
L
SS
L
APP
PER-APP / PER-USER PERIMETER
SSL-visible ✖ ✔
Location-independent ✖ ✔
Session-based ✖ ✔
Continuous trust
verification
✖ ✔
Strategic control points ✖ ✔
App availability ✖ ✔
TRADITIONAL
TRADITIONAL NETWORK PERIMETER
App
© F5 Networks, Inc 14
Let’s talk about Web Application Firewall - WAF
• A Web application firewall protects Web
servers from malicious traffic and blocks
attempts to compromise the system.
• It prevents targeted attacks that include
cross-site scripting, SQL injection, forceful
browsing,cookie poisoning and invalid
input.
• The F5 BIG-IP® Application Security
Manager is a Web application firewall that
uses both positive and negative security
models to identify, isolate and block
sophisticated attacks without impacting
legitimate application transactions. ASM
© F5 Networks, Inc 15
The Value Of F5 Hybrid WAF Protection
Secure response
delivered
Request made
BIG-IP ASM security
policy checked
Server response
generated
Vulnerable
application
• Drop, block or forward request
• Application attack filtering & inspection
• SSL, TCP, HTTP DoS mitigation
Response inspection for errors
and leakage of sensitive
information
BIG-IP ASM security
policy enforced
• #1 Most Effective WAF (NSS Labs)
• 2780 signatures for best protection
• Enable transparent protection from ever-
changing threats
• Reduce risks from vulnerabilities with
dynamic VA/ DAST integrations
• Engage unique BOT detection
(rapid surfing, intervals, event sequence)
• #1 Most Deployed WAF (451 Research)
• 10 of OWASP attacks mitigated with on-box
reporting
• Deploy full-proxy or transparent full-proxy
(bridge mode)
© F5 Networks, Inc 16
Mitigate Attacks Across Flexible Environments
Internet
VIPRION Platform
Devices
Data Center
Load Balancing
+ DDoS Protection
+ Application Security
BIG-IP ASM
• Protect critical apps in the datacenter
• Install on any BIG-IP platform
• Deploy as an add-on to BIG-IPs in use or run it as a
standalone.
Protection in the datacenter
NO APP LEFT UNPROTECTED!
BIG-IP
Virtual Edition
Securing apps in the cloud
BIG-IP ASM VE
• Activate security services
close to apps that have
moved to the cloud
• Accelerate development
and test
Cloud-based app protection
Silverline Web App Firewall
• Fast activation of ASM protections
• Managed service for SaaS and tier 2
applications
• 24x7x365 SOC Support
© F5 Networks, Inc 17
ASM SILVERLINE
WAF
PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
Next Steps
• Visit us online at www.F5.com/security and for more information on F5 security
solutions.
• Contact your F5 solution expert to discuss effective security solutions that
meet specific needs of your organization and those you do business with.
Edifício Berrini Plaza
Rua Samuel Morse, 134 - 10º andar
Brooklin - São Paulo SP
Tel: +55 11 5054.4480
CEP: 04576-060
E-mail: info@cylk.com.br
Firewall seguro, proteção para aplicações

More Related Content

What's hot

WhiteHat Security Presentation
WhiteHat Security PresentationWhiteHat Security Presentation
WhiteHat Security Presentation
markgmeyer
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
Sophos Benelux
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
Kaspersky
KasperskyKaspersky
Kaspersky
Kappa Data
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
Vladimir Jirasek
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
F-Secure Corporation
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial Services
Samsung SDS America
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
Mark Oakton
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
Harry Gunns
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
NetwayClub
 
FortiGate-80C
FortiGate-80CFortiGate-80C
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
Bertrand Carlier
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
S&T Consulting Hungary
 
Verimatrix-Comvenient Acquisition 3-31-11
Verimatrix-Comvenient Acquisition 3-31-11Verimatrix-Comvenient Acquisition 3-31-11
Verimatrix-Comvenient Acquisition 3-31-11
Verimatrix
 

What's hot (19)

WhiteHat Security Presentation
WhiteHat Security PresentationWhiteHat Security Presentation
WhiteHat Security Presentation
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial Services
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Verimatrix-Comvenient Acquisition 3-31-11
Verimatrix-Comvenient Acquisition 3-31-11Verimatrix-Comvenient Acquisition 3-31-11
Verimatrix-Comvenient Acquisition 3-31-11
 

Viewers also liked

Marist Hancock example
Marist Hancock exampleMarist Hancock example
Marist Hancock exampleJanine Fisher
 
2 de octubre de 1968
2 de octubre de 19682 de octubre de 1968
2 de octubre de 1968
drackfke01
 
Impresoras 3D
Impresoras 3DImpresoras 3D
Impresoras 3D
drackfke01
 
SWEGS Kitchen Presentation
SWEGS Kitchen PresentationSWEGS Kitchen Presentation
SWEGS Kitchen Presentation
njmaki
 
State of the Firm 2008 FINAL
State of the Firm 2008 FINALState of the Firm 2008 FINAL
State of the Firm 2008 FINALJanine Fisher
 
Ciara beresford project_2
Ciara beresford project_2Ciara beresford project_2
Ciara beresford project_2
ciaraberesford
 
SAP ECC EHP7 BW 7.4 Remote Access
SAP ECC EHP7 BW 7.4 Remote AccessSAP ECC EHP7 BW 7.4 Remote Access
SAP ECC EHP7 BW 7.4 Remote Access
Sonali Kulkarni
 
Cardboard seating system
Cardboard seating systemCardboard seating system
Cardboard seating system
ciaraberesford
 
point3D_3D_360_Oct-2016
point3D_3D_360_Oct-2016point3D_3D_360_Oct-2016
point3D_3D_360_Oct-2016Amy Reinicker
 
Ciara beresford project_3
Ciara beresford project_3Ciara beresford project_3
Ciara beresford project_3
ciaraberesford
 
Get_Started_with_LinkedIn
Get_Started_with_LinkedInGet_Started_with_LinkedIn
Get_Started_with_LinkedInJanine Fisher
 

Viewers also liked (12)

Marist Hancock example
Marist Hancock exampleMarist Hancock example
Marist Hancock example
 
Practica 7
Practica 7Practica 7
Practica 7
 
2 de octubre de 1968
2 de octubre de 19682 de octubre de 1968
2 de octubre de 1968
 
Impresoras 3D
Impresoras 3DImpresoras 3D
Impresoras 3D
 
SWEGS Kitchen Presentation
SWEGS Kitchen PresentationSWEGS Kitchen Presentation
SWEGS Kitchen Presentation
 
State of the Firm 2008 FINAL
State of the Firm 2008 FINALState of the Firm 2008 FINAL
State of the Firm 2008 FINAL
 
Ciara beresford project_2
Ciara beresford project_2Ciara beresford project_2
Ciara beresford project_2
 
SAP ECC EHP7 BW 7.4 Remote Access
SAP ECC EHP7 BW 7.4 Remote AccessSAP ECC EHP7 BW 7.4 Remote Access
SAP ECC EHP7 BW 7.4 Remote Access
 
Cardboard seating system
Cardboard seating systemCardboard seating system
Cardboard seating system
 
point3D_3D_360_Oct-2016
point3D_3D_360_Oct-2016point3D_3D_360_Oct-2016
point3D_3D_360_Oct-2016
 
Ciara beresford project_3
Ciara beresford project_3Ciara beresford project_3
Ciara beresford project_3
 
Get_Started_with_LinkedIn
Get_Started_with_LinkedInGet_Started_with_LinkedIn
Get_Started_with_LinkedIn
 

Similar to Firewall seguro, proteção para aplicações

Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Amazon Web Services
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks
 
F5 XC Distributed cloud Security and Application Delievery
F5 XC Distributed cloud Security and Application DelieveryF5 XC Distributed cloud Security and Application Delievery
F5 XC Distributed cloud Security and Application Delievery
stkannan1
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application Firewall
Avi Networks
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
DATA SECURITY SOLUTIONS
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
Robb Boyd
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the Cloud
Steven_Jackson
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
NGINX, Inc.
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
Imperva
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Cisco Canada
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
MarketingArrowECS_CZ
 
2019-F5-Line-Card.pptx
2019-F5-Line-Card.pptx2019-F5-Line-Card.pptx
2019-F5-Line-Card.pptx
Ans Sembiring
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 

Similar to Firewall seguro, proteção para aplicações (20)

Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
F5 XC Distributed cloud Security and Application Delievery
F5 XC Distributed cloud Security and Application DelieveryF5 XC Distributed cloud Security and Application Delievery
F5 XC Distributed cloud Security and Application Delievery
 
Prevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application FirewallPrevent threats With Analytics Driven Web Application Firewall
Prevent threats With Analytics Driven Web Application Firewall
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Forti web
Forti webForti web
Forti web
 
Forti web
Forti webForti web
Forti web
 
Protecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabricProtecting web aplications with machine learning and security fabric
Protecting web aplications with machine learning and security fabric
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the Cloud
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
2019-F5-Line-Card.pptx
2019-F5-Line-Card.pptx2019-F5-Line-Card.pptx
2019-F5-Line-Card.pptx
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Firewall seguro, proteção para aplicações

  • 1. Proteja suas Aplicações e esteja Seguro Vinicius Miranda, Sales Engineer WestconGroup, vinicius.miranda@westcon.com
  • 2. © F5 Networks, Inc 2 • A Importância da Proteção para suas Aplicações; • Qual a Diferença entre o Firewall Tradicional e o Firewall de Aplicação? • Principais Ataques Direcionados para as Aplicações; • Como a F5 Networks ajuda na Proteção das suas Aplicações? • Duvidas; Agenda
  • 3. A Importância da Proteção para as Aplicações
  • 4. © F5 Networks, Inc 4 Business App Security Access Proteção da Aplicação é igual a Proteção do Negócio? Vazamento de Dados Roubo de Credencial Fraude US$ 81 Milhões 8.695 casos no Brasil entre 2014/2015 – PwC 16
  • 5. © F5 Networks, Inc 5 Como comprovar essa realidade? Source: Akamai Report
  • 6. Firewall Tradicional e Firewall de Aplicação, qual é a Diferença???
  • 7. © F5 Networks, Inc 7 Vamos entender… “Next generation” Firewall Characteristics • Outbound USER inspection • Who is doing what? • “Trusted” users to Internet Corporate (users) Web Application Firewall Data center (servers) Characteristics • Inbound APPLICATION protection • Application delivery focus • “Untrusted” users to data center
  • 8. © F5 Networks, Inc 8 Ok…mas qual é a diferença entre eles? Multiprotocol Security  IP Reputation   Web Attack Signatures  Web Vulnerabilities Signatures   Automatic Policy Learning  URL, Parameter, Cookie and Form Protection  Leverage Vulnerability Scan Results 
  • 10. © F5 Networks, Inc 10 Roubo de Credencial, Vazamento de Dados, Aplicações Lentas… SQL Injection Cross-Site Scripting XSS Parameter Tampering
  • 11. © F5 Networks, Inc 11 Vulnerabilidades nas Aplicações WEB… 7% 2014 40% 2016 Como estar protegido diante deste Cenário?
  • 12. Como a F5 Networks pode ajudar?
  • 13. © F5 Networks, Inc 13 The New Perimeter Is An App Perimeter Apps Are The Gateway to Data! F5 SS L SS L SS L APP PER-APP / PER-USER PERIMETER SSL-visible ✖ ✔ Location-independent ✖ ✔ Session-based ✖ ✔ Continuous trust verification ✖ ✔ Strategic control points ✖ ✔ App availability ✖ ✔ TRADITIONAL TRADITIONAL NETWORK PERIMETER App
  • 14. © F5 Networks, Inc 14 Let’s talk about Web Application Firewall - WAF • A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. • It prevents targeted attacks that include cross-site scripting, SQL injection, forceful browsing,cookie poisoning and invalid input. • The F5 BIG-IP® Application Security Manager is a Web application firewall that uses both positive and negative security models to identify, isolate and block sophisticated attacks without impacting legitimate application transactions. ASM
  • 15. © F5 Networks, Inc 15 The Value Of F5 Hybrid WAF Protection Secure response delivered Request made BIG-IP ASM security policy checked Server response generated Vulnerable application • Drop, block or forward request • Application attack filtering & inspection • SSL, TCP, HTTP DoS mitigation Response inspection for errors and leakage of sensitive information BIG-IP ASM security policy enforced • #1 Most Effective WAF (NSS Labs) • 2780 signatures for best protection • Enable transparent protection from ever- changing threats • Reduce risks from vulnerabilities with dynamic VA/ DAST integrations • Engage unique BOT detection (rapid surfing, intervals, event sequence) • #1 Most Deployed WAF (451 Research) • 10 of OWASP attacks mitigated with on-box reporting • Deploy full-proxy or transparent full-proxy (bridge mode)
  • 16. © F5 Networks, Inc 16 Mitigate Attacks Across Flexible Environments Internet VIPRION Platform Devices Data Center Load Balancing + DDoS Protection + Application Security BIG-IP ASM • Protect critical apps in the datacenter • Install on any BIG-IP platform • Deploy as an add-on to BIG-IPs in use or run it as a standalone. Protection in the datacenter NO APP LEFT UNPROTECTED! BIG-IP Virtual Edition Securing apps in the cloud BIG-IP ASM VE • Activate security services close to apps that have moved to the cloud • Accelerate development and test Cloud-based app protection Silverline Web App Firewall • Fast activation of ASM protections • Managed service for SaaS and tier 2 applications • 24x7x365 SOC Support
  • 17. © F5 Networks, Inc 17 ASM SILVERLINE WAF PROTEJA SUAS APLICAÇÕES E ESTEJA SEGURO!!!!!
  • 18. Next Steps • Visit us online at www.F5.com/security and for more information on F5 security solutions. • Contact your F5 solution expert to discuss effective security solutions that meet specific needs of your organization and those you do business with. Edifício Berrini Plaza Rua Samuel Morse, 134 - 10º andar Brooklin - São Paulo SP Tel: +55 11 5054.4480 CEP: 04576-060 E-mail: info@cylk.com.br