We required a 24/7 automated vulnerability monitoring tool for securing our web applications. We are looking for options like Sitelock and Immuniweb.
There are many products out there that work as a WAF. WAF is not really aware of the application it is securing. There are solutions that block DDoS attacks (it needs a bit of muscle power as well). The other issue is the attack of automated bots in the system. AS of now none of the security vendors gives a full stack of protection against these attacks http://prophaze.com/ is the only solution that is more of a WAF + RASP + BOT + DDOS solution which is built on Kubernetes architecture. It is the first distributed cloud security solution on microservices that can secure your APIs, Web Apps from highly sophisticated attacks Its behavioral learning algorithm understands the HTTP flow of the API or web application it is securing and will create a score based on the various accepted behavior in the application. Prophaze during its initial 14 days of the trial will automatically profile the applications using its ML-based algorithms Prophaze is the Present and Future of Cloud Security with its new Kubernetes WAF
In my experience the best option is to make dast and sast before each change of web app, also you can access to this type of service with HP Fortify On Demand. By the way if you want to have a very good balance with protection and a good VA service you can use the F5 Silverline WAF Managed they have their own SOC to deliver VA and they adjust the WAF policies for you and deliver a report for any change and they have dashboards to verify Any security or performance concern.
While Cloudflare and AWS offer similar solutions, they do not have the scale, or customizable rule sets necessary for a large enterprise. The pricing is misleading, as it's cheap for the basics, but for a large enterprise's needs, the pricing at Akamai is extremely competitive and the value is unmatched.
Akamai Security Services-Gartner Magic Quadrant for Web Application Firewalls 2017 -- Akamai is now a LEADER
Please click on this link to learn more : http://pd.lnkd.in/uwo9sv3
Akamai has a comprehensive security portfolio, serving the largest global enterprises, and government agencies. Lastly, Akamai's Bot Manager with credential abuse mitigation is a leader in identifying and mitigating these types of malicious attacks better than anyone in the market!
I haven't heard about SiteLock or Immuniweb, but I have used Qualys Web Application Scanning (WAS) and IBM SiteProtector. They are great vulnerability tools. I just want to add to what Omar said, having IDS/IPS tools like FireEye or QRadar is also benefits to protect assets. Let us know what your decision is.
Hi, to secure completely your web application you need to:
1) Use tools that check against vulnerabilities at run time
2) Use code review tools, that looks for common vulnerabilities documented by OWASP and CWE.
Options 1 and 2 are mandatory and complementary at the same time.
Option 2 is interesting because it will give you an exhaustive report of vulnerabilities location.
Option 1 is interesting because it allows you to check if there is any vulnerabilities left at run time.
For option 2 you can look for Kiuwan (www.kiuwan.com). I'm using it for auditing security issues in web applications, and it has great vulnerabilities coverage.
A WAF can be an excellent solution, most of them are design to absorb large attacks such as DDOS attacks and also protects against common application attacks (SQLi, XSS, etc). Akamai is a good example of a CDN which includes WAF a cheaper option can be Cloudfare or AWS .
Based on my experience I know Akamai WAF can generate a detail report with the type of attacks that is trying to be exploited as well bot information and GEO Tags.
There are various tools out there in the market such as web application firewalls (WAFs), DDoS prevention, and vulnerability scanning tools at various levels (host vs. web). You need to select a combination of the right toolset to do the job. However, web security is not just about the tools, you need to conduct proper assessment of your environment through penetration testing, code review, architecture review and so forth.
Hi, there are various stages in protecting from web vulnerabilities.
Start using tools like Web application scanner (like Netsparker) to eliminate false positives.
Hardened your web applications.
Deployed an on-prem WAF (with scrubbing) together with cloud WAF (big leaders like Akamai, Cloudflare or Incapsula can mitigate DDoS).
Total protection comes with on-going monitoring depending on your policies.
Consider Netscaler application firewall and mas.
[Disclosure: I work for Beyond Security]. Some companies rebrand technologies by other vendors, therefore you need to take that into account. Solutions like DDoS focus on service availability, whereas WAF- as its name implies, is a narrowly focused firewall with eyes on HTTP traffic. Web App Scanning offered by vulnerability management companies including mine both vertically and horizontally go deeper by examining the assets and Apps behind a given site and identify security holes in them (a few vendors also verify the level and accuracy of vulnerability by deploying pentesting methods such as the use of exploits). The frequency of scans will determine the available window for remediation if a vulnerability is found- thus there is no such thing as continuous monitoring in real-time. Only snake oil salespeople can offer that. In brief, your best bet is to combine WAF and WAS (for example, a combination of readymade integrations such as Beyond Security and Imperva).
Identity Management solutions can mitigate web application security breach. Vulnerability monitoring is possible though Enterprise Manager(EM) Suite. Most of the EM by different vendor has capacity to bundle the product to protect vulnerability and security.
Akamai’s Cloud based Security solutions.
We required a 24/7 automated vulnerability monitoring tool for securing
our web applications. We are looking for options like Sitelock and Immuniweb.
Should one go for a URL Filtering as an add-on to NGFW or just deploy a Web proxy, instead?I am one who advocates that firewalls cannot serve with a URL Filtering better than Web security solutions (i.e., a proxy).
What's your opinion?