|
Websense and F5 Why it Matters |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : On February 25th, Websense and F5 announced a long-term, strategic agreement to develop the industry's most comprehensive, scalable, and real-time network security offerings. We also announced the availability of the first solution in our joint development roadmap. Why does this matter Organizations today face increasingly sophisticated and targeted cyber-attacks that hit multiple attack vectors. The two primary targets are an organization's web application servers and its employees accessing the web. Web application servers are targeted because they are public-facing and often have access to sensitive information in backend databases. As a result, they are subject to denial of service and application vulnerability and HTTP protocol exploitation attacks. In many cases, these web servers, once compromised, are used to drive redirects, host exploit kits and code, or deliver malware payloads because the site's good reputation passes traditional security defenses. Positioned in front of these web applications, F5's Application Delivery Controller is ideally positioned to thwart these types of web application server attacks. When Websense's advanced threat detection and data loss prevention DLP capabilities are added to this web application firewall platform, the joint solution becomes content-aware. This provides a much higher degree of security against evolving threats. Employees are also targeted due to their privileged access to information and their susceptibility to spear-phishing and other social engineering techniques. These attacks often lure users to web destinations that redirect to servers hosting exploit kits used to detect open vulnerabilities or open doors into the user's system resulting in silently downloaded and installed malware. Once installed, the malware often checks in with command and control centers before carrying out its instructions that may involve data theft. Websense's real-time security capabilities can detect and defend against each of these kill chain stages as utilized by advance threats. What do both web application and employee attacks have in common Both attempt to acquire access credentials, infect, steal sensitive data, and in many cases are components of a broader attack on an organization that may also include disrupting commercial services. The Websense F5 joint solutions solve this problem by protecting both web application servers and employees from cyber-attacks. The solutions enable organizations to secure their entire enterprise footprint by protecting sensitive data from both inbound attacks and outbound exfiltration. I.T. administrators have access to a consistent set of security services deployed across both gateways the web application firewall and the secure web gateway. This solution optimizes interoperability of the BIG-IP platform and Websense V-series and X-series appliances, bringing together the industry's most effective security defenses and the industry's most scalable networking. Meanwhile, our R D teams are developing an on-box integration which has Websense TRITON defenses running directly on the F5 BIG-IP platform. Have any questions about the F5 and Websense partnership Feel free to email me at F5 websense.com.
Les mots clés de la revue de presse pour cet article : websense
Les derniers articles du site "Security Bloggers Network" :
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance - BeautifulPeople.com experiences data breach 1m affected - Swedish Air Space Infringed, Aircraft Not Required - Why cybercriminals attack healthcare more than any other industry - Setting the Benchmark in the Network Security Forensics Industry - Spotify denies hack users subjected to weird music beg to differ - The Dangerous Game of DNS - Threat Recap Week of April 22nd - Is your security appliance actually FIPS validated - Deploying SAST Static Application Security Testing
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|