1 / 18

Protecting the Data that Drive Business

Protecting the Data that Drive Business. Chris Gale Partner Director EMEA Chris.gale@imperva.com. Almost Twenty Years Ago Today. Fleischmann & Pons ‘Cold fusion’. Tim Berners-Lee ‘Distributed hypertext system’. ONLINE STORE. POS TERMINALS (CASH REGISTER). IN-STORE SERVER. HQ SERVER.

kenley
Download Presentation

Protecting the Data that Drive Business

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting the Data that Drive Business Chris Gale Partner Director EMEA Chris.gale@imperva.com

  2. Almost Twenty Years Ago Today... Fleischmann & Pons ‘Cold fusion’ Tim Berners-Lee ‘Distributed hypertext system’

  3. ONLINE STORE POS TERMINALS (CASH REGISTER) IN-STORE SERVER HQ SERVER STAGING SERVER TRANSACTION DATABASES Today’s Business Application Data Flow TRANSACTION INFOTO ACQUIRING BANK AUTHORIZATION FROM ACQUIRING BANK PHYSICAL STORE CORPORATE HEADQUARTERS INTERNAL CORPORATE SYSTEMS DATABASES CONFIDENTIAL - Imperva

  4. Thin Client 3 Tier App Application Interface Thick Client 2 Tier App DBA Data SQL Applications Web/Web services Browser Business Application Data Security Challenge • Database systems are often very complex, combining the core database with a collection of applications…It is not sufficient to protect the database alone, all the associated applications need to be secured. • --SANS Top 20 Internet Security Risks of 2007 CONFIDENTIAL - Imperva

  5. Why Should You Care? 85% of organizations have experienced a data breach Theft, Abuse, Misuse & LeakageHappen Even in Leading Organizations Sources: Privacy Rights Clearinghouse & Ponemon Institute Survey, “The Business Impact of Data Breach” CONFIDENTIAL - Imperva

  6. Why Should You Care? Data governance is not optional PCI– Required to process credit card transaction SOX – Required to report financial results EU DD Privacy – Required to process personal data What do regulations require of you? CONFIDENTIAL - Imperva

  7. New Web 2.0 – Old Threats & New • 92% of Web applications have vulnerabilities • 93% of vulnerable sites are still vulnerable after code fixes!! • SQL Injection – still majority cause of data leakage • Ponemon estimates breaches cost on average $202 per compromised record • April 08: automated SQL injection affects 500k IIS webpages • July 08: Asprox ‘infects’ reputable sites including NHS • Exploiting server’s trust in the client (versus XSS) • Cross Site Request Forgery (CSRF) & JS-Hijacking (AJAX) • Growing cause of web fraud

  8. Worrying Threat Trends in 2008 • Majority of malware now ‘cloaked’ in Web protocols • Both exploits and Command & Control • HTTP poorly monitored – traffic volume, SSL & difficult to block • Indirect attacks exploiting ‘trusted’ websites for malware distribution • Implicitly trusted by the user – ‘Drive-by’ downloads • Sophos reported 1 webpage ‘infected’ every 5secs during 2008 • ‘Google Hacking’ & ‘Web worms’ – search-engine seeded attacks & data breach discovery • Concept first analyzed in March 2004 ADC paper: “Web Application Worms: Myth or Reality?”

  9. Can Existing Controls Help? • Traditional firewalls only detect network attacks • Only inspect IP address, port/service number • IPS/IDS signatures only detect known threats • No application understanding • No user/session tracking • High rate of false positives/negatives • No protection of SSL traffic Zero DayWorm Cookie Injection XSS Attack Hacker Data Center INTERNET Web Servers IPS or Deep Inspection firewall Firewall User CONFIDENTIAL - Imperva

  10. Founded in 2002 • CEO Shlomo Kramer – CEO of the Year, co-founder of Check Point • The leader in Data Security • Global company with over 40% international revenue • North American HQ in California; International HQ in Israel • Local presence in all major markets (EMEA, APAC, Japan) • Customers in 35+ countries • Over 700 customers and 4500+ organizations protected CONFIDENTIAL - Imperva

  11. Imperva Application Defence Centre • Business application Data Security experts • Research the latest threats and compliance best practices • Applications (SAP, Oracle EBS, PeopleSoft & others) • Databases (Oracle, DB2, SQL-Server & others) • Compliance mandates (SOX, PCI, HIPAA & others) • Deliver actionable, up-to-date content to Imperva customers - CONFIDENTIAL -

  12. SecureSphere Data Security Suite • Data Security Suite • Full Visibility and Control • Web Application Firewall • Security for Web Applications SecureSphere Management • Database Firewall • Auditing & Protection for • Databases Discovery Assessment Audit / Monitor Tracking Enforcement • Database Activity Monitoring • Visibility into Database Usage • Discovery and Assessment Server • Discovery and Assessment for • Databases SecureSphere Platform • Modular SecureSphere 7.0 • Packaged for Specific Use Cases - CONFIDENTIAL -

  13. SecureSphere Architecture Database Monitor Agent Management Server (MX) Database ADC Insights Database Firewall Web Application Firewall Web Database Activity Monitoring Discovery & Assessment Server Internet CONFIDENTIAL - Imperva

  14. alex@imperva.com Webapp.company.com No real user Knowledge alex@imperva.com alex@imperva.com End-to-end real userKnowledge alex@imperva.com Webapp.company.com SELECT … WHERE ID = ‘alex@imperva.com’ SELECT … WHERE ID = ‘alex@imperva.com’ End-to-end real userKnowledge Limited real user Knowledge SecureSphere Universal User TrackingWho Is Really Accessing Data? Shared & dedicated DB user connections • End-to-end visibility of the real application user • ‘Pooled’ application user accounts • No re-writing of application or database code • Web to DB User Tracking • SQL Connection User Tracking CONFIDENTIAL - Imperva

  15. Best Practice Data Security Recommendations • Locate & classify sensitive data • Regularly test for vulnerabilities • Buy time, mitigate critical risks with WAF & DB firewalls • If possible, remediate by fixing the code • Protect critical web applications • Deploy WAF to prevent data breach • Audit access by actual application users – not ‘pooled’ accounts • Monitor sensitive data stores • Use DAM for visibility • Privileged users (DBAs) • Consider protecting access to most sensitive data with DB firewalls

  16. PCI DSS Compliance & SecureSphere 6.6Application layer firewall or external code review SecureSphere WAF: Cost-effective, non-intrusive threat mitigation 10Track and monitor all access to cardholder data SecureSphere DAM: SQL auditing, tamper-proof, separation of duty 3.4Compensating controls for protecting stored cardholder data SecureSphere DB Firewall: Prevents unauthorised access to card holder data

  17. Imperva The Leader in Data Security • Only complete solution for visibility and control over business data • Dynamic Profiling & Universal User Tracking • Consistent industry recognition of technical superiority • Veteran leadership with deep industry expertise • Industry veterans in security • ADC - only research team dedicated to business application data security • More application data security deployments than any other vendor • Over 700 direct customers • 54 Fortune 1000 • 86 Global 2000 • Over 4500 protected organizations • Consistent growth fueled by • Surge in data breaches • Regulatory compliancerequirements • Tightening Data Security legislation CONFIDENTIAL - Imperva

  18. Thank You www.imperva.com

More Related