10.07.2015 Views

SecureSphere® Web Application Firewall - Exclusive Networks

SecureSphere® Web Application Firewall - Exclusive Networks

SecureSphere® Web Application Firewall - Exclusive Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

S e c u reSphere ®<strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>Protect Your Critical <strong>Web</strong> <strong>Application</strong>s<strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>Safeguard <strong>Web</strong> applications from attacksand data breaches with the market leading<strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>. SecureSpherehelps businesses:» Monitor and protect <strong>Web</strong> applications» Directly address PCI 6.6 compliance» Automate security operations withDynamic Profiling» Transparently protect <strong>Web</strong> applications withvirtual patching» Deliver high performance, sub-millisecondlatency, and enterprise-class managementand reportingOnly the marketleading SecureSphere<strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>offers automated,non-intrusive and scalable<strong>Web</strong> application security.


Market-Leading <strong>Web</strong> <strong>Application</strong> SecurityThe SecureSphere® <strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong> protects<strong>Web</strong> applications against sophisticated attacks, stopsonline identity theft, and prevents data leaks fromapplications. Multiple configuration options, includinglayer 2 bridge, proxy and non-inline monitor, enabledrop-in deployment with no changes to existingapplications or network.Internal UsersSECURESPHEREWEB APPLICATIONFIREWALLData Center and DMZ<strong>Web</strong> & <strong>Web</strong> Services<strong>Application</strong> ServersAs the market-leading <strong>Web</strong> application firewall, moreorganizations rely on Imperva to monitor and protecttheir critical <strong>Web</strong> applications than any other vendor.Imperva SecureSphere provides your business witha practical and highly secure solution to ensure thatyour <strong>Web</strong> applications and data are safe.INTERNETSECURESPHEREMANAGEMENT SERVERAccurately Monitor and Protect<strong>Web</strong> <strong>Application</strong>sThe SecureSphere <strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>leverages multiple inspection layers andsecurity defenses to provide the highestlevel of protection.HTTP Protocol ValidationHTTP protocol validation prevents protocolexploits including buffer overflow,malicious encoding, HTTP smuggling,and illegal server operations. Flexiblepolicies enable strict adherence to RFCstandards while allowing minor variationsfor specific applications.Data Leak PreventionSecureSphere inspects outbound traffic toidentify potential leakage of sensitive datasuch as cardholder data and social securitynumbers. In addition to reporting on wheresensitive data is used in the application,SecureSphere can optionally prevent thisinformation from leaving the organization.Network and Platform ProtectionSecureSphere delivers comprehensiveprotection against known attacks targeting<strong>Web</strong> server, middleware and platformvulnerabilities, sourcing more than 6,500signatures from the Imperva <strong>Application</strong>Defense Center (ADC). ADC signaturesaddress not only the attacks found insources including Bugtraq, CVE®, andSnort®, but also threats found throughoriginal ADC research. SecureSphere alsodefends against new, zero-day <strong>Web</strong> wormattacks by detecting and identifying theirunique combination of attributes.SecureSphere’s integrated stateful firewallprovides protection from both externaland internal unauthorized users, protocols,and network attacks, while meeting bestpractice security mandates by preventingnon-essential protocols from reachingsensitive <strong>Web</strong> applications.Unparalleled AccuracyImperva’s unique Correlated AttackValidation technology correlatesviolations across security layers andover time to accurately identify the mostcomplex attacks. Individual violationsmay not definitively indicate attack, butby correlating unique combinations ofviolations, attacks are validated beyonda doubt.<strong>Web</strong> 2.0 and <strong>Web</strong> Services ProtectionSecureSphere protects dynamic <strong>Web</strong> 2.0and <strong>Web</strong> Services by learning how theseapplications behave. It learns XML files,elements, attributes, schema, variables, andSOAP actions. SecureSphere will identifyand block any attempt to tamper withnormal <strong>Web</strong> services behavior. It will alsoprotect against threats common to <strong>Web</strong> 2.0applications, including SQL injection, XSS,CSRF, and many others.Automate Security OperationsAutomated <strong>Application</strong> LearningSecureSphere’s unique Dynamic Profilingtechnology automatically learns thestructure, elements, and expected usagepatterns of protected <strong>Web</strong> applications.Dynamic Profiling automatically detectsand incorporates valid application changesinto the application profile over time. Bycomparing <strong>Web</strong> requests to the profile,SecureSphere can detect unacceptablebehavior and prevent malicious activitywith pinpoint precision.<strong>Application</strong> User TrackingUsing Dynamic Profiling, SecureSphereautomatically captures <strong>Web</strong> applicationuser names and associates all subsequentsession activity with that specific username. As a result, SecureSphere canuniquely monitor, enforce and audit policyon a per user basis.Up-to-Date Security from the ADCThe Imperva ADC, an internationallyrecognized security research organization,continuously investigates newvulnerabilities reported worldwide,analyzes exploit traffic from manydifferent <strong>Web</strong> sites, and conducts primaryvulnerability research to identify the latestthreats. The results of this research areupdated defenses at various layers withinSecureSphere, including signatureupdates, protocol validation policies,and correlation rules.SecureSphere protects against many application attacks, including:• <strong>Web</strong>, HTTPS(SSL) and XMLVulnerabilities• SQL Injection• Session Hijacking• Cross Site Scripting (XSS)• Form Field Tampering• <strong>Web</strong> Worms• Buffer Overflow• Cookie Poisoning• Denial of Service• Malicious Robots• Parameter Tampering• Brute Force Login• Malicious and Illegal Encoding• Directory Traversal• <strong>Web</strong> Server and OS Attacks• Site Reconnaissance• OS Command Injection• Cross-Site Request Forgery(CSRF)• Google Hacking• Remote File Inclusion Attacks• Phishing• Sensitive Data Leakage (SSNs,Cardholder data, PII, HPI)• Data Destruction• Anonymous ProxyVulnerabilities


PCI 6.6 Compliance RequirementsSecureSphere <strong>Web</strong> <strong>Application</strong> <strong>Firewall</strong>helps thousands of Enterprise organizations,including e-commerce, retail, banking,education, technology, and gamingcompanies, meet PCI 6.6.SecureSphere includes over 300 pre-definedreports to automate compliance mandates,including PCI. SecureSphere offers businessrelevant reporting so technical, business unitowners, and PCI auditors can view the rightreport for their specific need.Enable Non-IntrusiveDeploymentNo Network or <strong>Application</strong> ChangesSecureSphere provides the mostdeployment options of any WAF in theindustry, including a unique transparentdeployment option that enablesdeployment without requiring any networkor application changes.SecureSphere delivers multi-Gigabitthroughput and tens of thousands oftransactions per second while maintainingsub-millisecond latency.» Transparent Layer 2 Bridge – dropindeployment and industry-bestperformance» Layer 3 Router – network segmentation,routing and network address translation» Reverse Proxy – content modification,such as cookie signing and URL rewriting» Transparent Proxy – fast deploymentof content modification withoutnetwork changes» Non-Inline Monitor – zero-riskmonitoring and forensicsFlexible High Availability OptionsSecureSphere supports a broad range ofhigh availability options:» Imperva High Availability (IMPVHA) -sub-second failover» Virtual Router Redundancy Protocol(VRRP) – router or proxy deployments» Active-Active and Active-PassiveRedundancy – external availabilitymechanisms» Fail-open interfaces – single-gatewayavailability» Non-inline deployment – zero riskmonitoring and assessmentProvide Enterprise-GradeCentralized ManagementSupport for Large, DistributedDeploymentsSecureSphere can be deployed as astandalone appliance or scale to protectlarge and/or distributed data centers.The SecureSphere MX ManagementServer offers a centralized configuration,monitoring, and reporting infrastructureto manage multiple appliances andapplications from a single console.Best-in-Class Monitoringand ReportingA real-time dashboard provides a high levelview of system status and security events.Alerts are easily searched, sorted, anddirectly linked to corresponding securityrules. SecureSphere offers rich graphicalreporting capabilities, enabling customersto easily understand security status andmeet regulatory compliance requirements.There are both pre-defined and fullycustomizable<strong>Web</strong> based reports. Thesecan be viewed on demand or emailed on adaily, weekly or monthly basis.Hierarchical ManagementManagement of large enterprise and ASPenvironments is streamlined throughhierarchical organizational groupings,granular administrative permissions, and aunique task-oriented workflow.Integrate with 3rd PartyEnterprise <strong>Application</strong>sSecureSphere integrates with large scaleenterprise applications to integrate <strong>Web</strong><strong>Application</strong> <strong>Firewall</strong> with overall securityactivities. This includes leading SIEM andLog Management solutions, directorysolutions for role based authentication, and<strong>Web</strong> <strong>Application</strong> Scanning solutions forvulnerability assessment.Dynamic Profiling for Accurate Protection and Automated Policy ConfigurationAccurate <strong>Web</strong> application security requires understanding hundreds of thousands ofconstantly changing variables including URLs, parameters, form fields and cookies.Imperva’s innovative, patent-pending Dynamic Profiling technology automaticallyprofiles all <strong>Web</strong> application elements and builds a baseline of acceptable userbehavior. By building an accurate profile or “white list” of application usage, DynamicProfiling streamlines monitoring and security policy configuration without requiringextensive manual configuration or tuning. Plus, SecureSphere automatically detectsand incorporates valid application changes into the application profile over time.Dynamic Profiling can also generate a complete profile report of your applicationswith real usage statistics that can be used to audit whether actual application usagematches intended usage.


SecureSphere Features and Appliance Specifications<strong>Web</strong> SecurityDynamic Profile (White List security)<strong>Web</strong> server & application signaturesHTTP RFC complianceNormalization of encoded dataSee list of attacks prevented on page 2HTTPS/SSL InspectionPassive decryption or terminationOptional HSM for SSL key storage<strong>Web</strong> Services SecurityXML/SOAP profile enforcement<strong>Web</strong> services signaturesXML protocol conformanceContent ModificationURL rewriting & obfuscationCookie signingCookie encryptionCustom error messagesError code handlingPlatform SecurityOperating system intrusion signaturesKnown and zero-day worm securityNetwork SecurityStateful firewallDoS preventionAdvanced <strong>Application</strong> ProtectionCorrelation rules incorporate all securityelements (white list, black list) to detectcomplex, multi-stage attacksData Leak PreventionCredit card numberPII (Personally Identifiable Information)Pattern matchingPolicy/Signature UpdatesSecurity updates provided weekly orimmediately for critical threatsAuthenticationAll authentication methods supportedtransparently and inspected in bridge andnon-inline monitor modes. Can activelyauthenticate users in proxy mode.Support for RSA Access Manager fortwo-factor authenticationSupport for LDAP (Active Directory)User AwarenessAutomated Tracking of <strong>Web</strong> <strong>Application</strong>UsersDeployment ModesTransparent Bridge (Layer 2)Router/NAT (Layer 3)Reverse Proxy and Transparent Proxy (Layer 7)Non-inline Sniffer (Monitoring only)Management<strong>Web</strong> User Interface (HTTP/HTTPS)Command Line Interface (SSH/Console)AdministrationMX Server for centralized managementIntegrated management option (all modelsexcept G16 FTL)Hierarchical management groupingsLogging/Monitoring/ReportingReal-time dashboardIntegrated graphical reporting (HTML, PDF,CSV formats)SNMPSyslogEmailCommon Event Format (CEF)High AvailabilityIMPVHA (Active/Active, Active/Passive)Fail-open interfaces (bridge mode only)VRRPSTP and RSTPIntegration with 3rd Party Enterprise<strong>Application</strong>sSIEM/SIM tools: ArcSight, RSA enVision, PrismMicrosystems, Q1 Labs, TriGeo, NetIQLog Management: CA ELM, SenSage,Infoscience Corp.<strong>Web</strong> application vulnerability scanners: IBM,Cenzic, NTObjectives, othersSpecification SecureSphere G2 SecureSphere G4 SecureSphere G8 SecureSphere G16 FTLThroughput 100 Mbps 500 Mbps 1,000 Mbps 2,000 MbpsMax HTTP Trans/Sec 8,000 22,000 36,000 44,000Latency Sub-millisecond Sub-millisecond Sub-millisecond Sub-millisecondInterfaces 4 x 10/100 Mbps 6 x 10/100/1000 Mbps(max 4 Fiber interfaces)6 x 10/100/1000 Mbps(max 4 Fiber interfaces;optional 10 Gbps interfaces)6 x 10/100/1000 Mbps(max 4 Fiber interfaces;optional 10 Gbps interfaces)Interface Types Copper Copper/Fiber SX/Fiber LX Copper/Fiber SX/Fiber LX Copper/Fiber SX/Fiber LXMax Network Segments(1)Bridge; (3)Proxy,(1)Non-inline(2)Bridge; (5)Router,Non-inlineForm Factor 1U; 19-inch rack 1U; FTL Model:2U19-inch rackHard Drive 80GB SATA 250GB SATA; FTL Model:(2) Hot-Swap 250GB SATAPower Supply 250W 350W; FTL Model:(2) Hot-Swap 750W total(2)Bridge; (5)Router,Non-inline1U; FTL Model:2U19-inch rack250GB SATA; FTL Model:(2) Hot-Swap 250GB SATA350W; FTL Model:(2) Hot-Swap 750W total(2)Bridge; (5)Router,Non-inline2U 19-inch rack(2) Hot-Swap 250GB SATA(2) Hot-Swap 750W totalAC Power 90-264V, 47-63 Hz 100-240V, 50-60 Hz 100-240V, 50-60 Hz 100-240V, 50-60 HzImpervaNorth America HeadquartersInternational Headquarters3400 Bridge Parkway 125 Menachem Begin StreetSuite 101 Tel-Aviv 67010Redwood Shores, CA 94065IsraelTel: +1-650-345-9000 Tel: +972-3-6840100Fax: +1-650-345-9004 Fax: +972-3-6840200Toll Free (U.S. only): +1-866-926-4678www.imperva.com© Copyright 2009, ImpervaAll rights reserved. Imperva and SecureSphere are registered trademarks of Imperva.All other brand or product names are trademarks or registered trademarks of their respective holders. #DS-WAF_0409rev1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!