17.07.2012 Views

IBM Podcast Web Vulnerability Scanning:market Insight Template v4 ...

IBM Podcast Web Vulnerability Scanning:market Insight Template v4 ...

IBM Podcast Web Vulnerability Scanning:market Insight Template v4 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“We Accelerate Growth”<br />

<strong>Web</strong> <strong>Vulnerability</strong> <strong>Scanning</strong><br />

<strong>Podcast</strong>


For businesses of all sizes, their websites represent an irreplaceable public-facing presence. Consequently, blips<br />

in website operations be it functional disruptions, irregular response times, or doubts about the safety of<br />

private information casts a deep and lasting shadow on a business’ brand image and vitality.<br />

Ironically, the same open access that makes websites invaluable is also its greatest risk. The reality of publicfacing<br />

websites is that those with malicious or criminal intent enter through the same front door as legitimate,<br />

non-malicious website users. Guarding against hackers and cyber criminals while still providing a rich and safe<br />

experience for legitimate users is essential. Meeting these goals, however, is unattainable if the website owner<br />

does not understand the full extent that its website is vulnerable to exploitation and takes proactive steps to<br />

remediate.<br />

<strong>Web</strong> vulnerability scanning is a security improvement technology that puts website owners on the offensive in<br />

identifying and closing their website security vulnerabilities. Left unaddressed, vulnerabilities represent a<br />

welcome mat for hackers and cyber criminals to engage in unauthorized and destructive website activities.<br />

Conversely, recognizing and then closing website vulnerabilities after a security incident is clearly an<br />

undesirable defensive and reactive situation.<br />

To place web vulnerability scanning into perspective, it mirrors the vulnerability detection objective of manual<br />

penetration testing but without the heavy price tag and operational challenges. By emulating and automating<br />

pen tester’s processes in software, web vulnerability scanning equips website owners with a tool to routinely<br />

gauge the security strength of its website.<br />

Another means to conceptualize web vulnerability scanning is to think of a website as a series of gateways that<br />

define the boundaries of allowable visitor activities. Soft boundaries represent the essence of website<br />

vulnerabilities as they provide website visitors room to roam. <strong>Web</strong> vulnerability scanning identifies these soft<br />

boundaries.<br />

Identifying vulnerabilities is only half the battle. Modifying website software code and logic to close<br />

vulnerabilities, stiffen the boundaries, is critical. Designed for people without pen testing experience, web<br />

vulnerability scanning produces explanations and actionable steps on how to close vulnerabilities.<br />

With so many security products on the <strong>market</strong> today, confusion on the purpose of each is possible. So, I will<br />

take just a moment to describe how web vulnerability scanning is different and complementary to other<br />

security products.<br />

Network Firewalls – A network firewall is a defensive security mechanism that opens and closes network<br />

communication ports based on traffic protocol and other identifiers. Network firewalls do not have visibility<br />

into the website traffic to assess whether it contains malicious intent.<br />

<strong>Web</strong> Application Firewalls or Network Firewalls with application visibility – These categories of<br />

firewalls are also defensive security mechanisms. Their purpose is to block web application traffic that is known<br />

to be bad and/or targeting a known set of generic website vulnerabilities. While beneficial in improving security,<br />

these application level firewalls should be used with caution as setting policies to block web application traffic<br />

too liberally can inadvertently interfere with legitimate website functionality. Furthermore, without a complete<br />

understanding of the website, time consuming trial and error is required to tighten but not over tighten firewall<br />

policies and these adjustments may never reach the customized level of improved security as web vulnerability<br />

scanning.<br />

© 2008 Frost & Sullivan Page 2<br />

<strong>Web</strong> <strong>Vulnerability</strong> <strong>Scanning</strong><br />

<strong>Podcast</strong>


<strong>Web</strong> <strong>Vulnerability</strong> <strong>Scanning</strong><br />

<strong>Podcast</strong><br />

Network vulnerability scanning is not synonymous with web vulnerability scanning. Network vulnerability<br />

scanning focuses on network devices to assess which are vulnerable and why. Network vulnerability scanning is<br />

not designed to scan for and identify website vulnerabilities.<br />

<strong>Web</strong> <strong>Vulnerability</strong> <strong>Scanning</strong> tests a website for weakly defined or penetrable boundaries. Through<br />

identification of vulnerabilities, website owners can take deterministic steps produced from the scan to modify<br />

its software code and reduce the number and the severity of vulnerabilities. In this regard, web vulnerability<br />

scanning differs from the aforementioned firewall products in that it is preventive rather than a defensive<br />

security technology. <strong>Web</strong> vulnerability scanning’s objective is to identify and eliminate vulnerabilities before they<br />

become exploitable.<br />

To derive the maximum benefit from web vulnerability scanning, the best practice is to integrate scanning into<br />

all stages of website development and testing. Each stage provides a unique perspective on the layered and<br />

interconnected nature of the website. Moreover, identifying vulnerabilities at their early stages minimizes what<br />

can otherwise be a complex and time consuming process of code changes. In addition, websites once<br />

implemented should also be scanned even if there hasn’t been a code change. Hackers and cyber criminals learn<br />

and evolve their tricks quickly. Even without code changes, the vulnerability of a website will grow over time.<br />

In closing, the best approach to improve information security is to be preventive. <strong>Web</strong> vulnerability scanning<br />

used routinely and comprehensively assists website owners in avoiding being on the unhappy tail end of “pay<br />

me now or pay me much more later.”<br />

About Stratecast<br />

Stratecast assists clients in achieving their strategic and growth objectives by providing critical,<br />

objective and accurate strategic insight on the global communications industry. As a division of Frost &<br />

Sullivan, Stratecast’s strategic consulting and analysis services complement Frost & Sullivan's Market<br />

Engineering and Growth Partnership services. Stratecast's product line includes subscription-based<br />

recurring analysis programs focused on Business Communication Services (BCS), Consumer<br />

Communication Services (CCS), Communications Infrastructure and Convergence (CIC), OSS and BSS<br />

Global Competitive Strategies (OSSCS), and our weekly opinion editorial, Stratecast Perspectives and<br />

<strong>Insight</strong> for Executives (SPIE). Stratecast also produces research modules focused on a single research<br />

theme or technology area such as IMS and Service Delivery Platforms (IMS&SDP), Managed and<br />

Professional Services (M&PS), Mobility and Wireless (M&W), Multi-Channel Video Programming<br />

Distribution (MVPD), Network Infrastructure and OSS (NIO), Secure Networking (SN) and Unified<br />

Communications (UC). Custom consulting engagements are available. Contact your Stratecast Account<br />

Executive for advice on the best collection of services for your growth needs.<br />

About Frost & Sullivan<br />

Frost & Sullivan, the Growth Partnership Company, partners with clients to accelerate their growth. The<br />

company's TEAM Research, Growth Consulting, and Growth Team Membership empower clients to<br />

create a growth-focused culture that generates, evaluates, and implements effective growth strategies.<br />

Frost & Sullivan employs over 45 years of experience in partnering with Global 1000 companies,<br />

emerging businesses, and the investment community from more than 30 offices on six continents. For<br />

more information about Frost & Sullivan’s Growth Partnership Services, visit http://www.frost.com.<br />

CONTACT US 877.GoFrost (877.463.7678) myfrost@frost.com www.frost.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!