todayJanuary 27, 2020

Security Info Nansy Niotaki

Check Point DDoS Protector

CHECKPOINT DDoS Protector DDoS Protection and Attack Mitigation DDOS ATTACKS ARE ON THE RISE ! In today’s info-security threat landscape, denial-of-service and distributed denial-of service (DoS/DDoS) attacks are a major cause of network downtime. Whether executed by hacktivists to draw attention to a cause, fraudsters trying to illegally obtain data [...]

Coming soon


todayJanuary 22, 2020


Website Security

Choosing the Right Website Security Solution

In establishing a security perimeter for your website, it is best to take a “defense in depth” approach – using several layers of security, which complement each other, to counter different threat vectors. Multiple security products should be used to protect a website or a web application, realizing that there is no single “silver bullet” that can provide complete protection.

The process of establishing a website security perimeter starts with mapping the threats your website is most likely to face and the impact they could have on your business.

Web Application Security Threats

When thinking about web application security threats, it is common to consider targeted attacks, aimed directly at a specific website or company. However, the majority of website threats are non-targeted attacks, carried out by bots that attack websites indiscriminately – to recruit them to a botnet, or use them as a platform for malware distribution.

Therefore, your website security solutions should contain a mix of tools, to defend against sophisticated, targeted attacks (which may happen once in a while), and also comprehensively detect and block non-targeted attacks (which occur on a daily basis).

Both targeted and non-targeted attacks can be divided into three broad, functional categories:

1. Web application attacks

These are attacks that manipulate the functionality of your web application to gain unauthorized access, extract secured data, compromise users and perform other malicious activities. Many of these attacks are carried out by bots that scan the web, seeking to abuse security misconfiguration or exploit specific vulnerabilities within popular applications.

This category also includes common attack vectors such as SQL injection (SQLi), cross-site scripting (XSS), insecure object references, and cross-site request forgery (CSRF).

2. Denial of Service (DoS)

DoS attacks involve flooding a hosting server with traffic, with the aim of consuming all the bandwidth and computing resources, and thus denying access to legitimate users. Distributed Denial of Service (DDoS) uses large numbers of attack nodes, commonly organized as a botnet, to do the same on a bigger scale.

Some of the more advanced DDoS attacks leverage protocol vulnerabilities to amplify their output, or abuse specific application vulnerabilities to cause server crashes.

3. Data security

Data breaches could be carried out both by external threat actors, by compromised privileged accounts, or by outright malicious insiders within an organization.

While not technically a web application threat, many of these attacks will often target the web application to penetrate the security perimeter, attempting to exploit weak passwords or lack of authentication, weakly encrypted data, or excessive privileges given to organizational users. In some cases, web application attacks will be used to create a smokescreen for data extraction.

Selecting Website Security Solutions

When selecting website security tools, check which basic protection capabilities they provide. Some tools focus on one capability, while others offer a suite of capabilities.

Below, you can select the capabilities most relevant for your security environment. We explain each capability or requirement, help you understand what they solve, and how they can benefit your security posture.

Web Application Firewall (WAF)

WAFs are the cornerstone of proactive website security. They are a security solution deployed on the network edge, which inspects all incoming traffic and continuously blocks malicious requests. WAFs are versatile, automatically blocking known attack types via built-in rules, and letting you deploy your own security policies for specific security needs.

A major advantage of WAFs is that they can be deployed with no changes to the underlying applications, and can block threats immediately, without requiring you to perform actions like patching vulnerabilities or modifying problematic code.

Unlike a traditional firewall, a WAF can understand application traffic, differentiate legitimate and malicious traffic, and thus detect and block complex attack patterns.

Bot Management

As mentioned, most attacks on websites are carried out by bots, making it essential to have a tool in your security arsenal that can identify and deal with bot traffic.

Bot management solutions use data like behaviour profiles, reputation analysis, HTTP/S headers, IP and ASN signatures, cookie and JavaScript challenges, to determine whether bots hitting your site are legitimate or malicious. Bot protection solutions block bad bots, while allowing good bots to access your site.

Threat Intelligence

Threat intelligence tools provide convenient access to information about threat actors, including known bad IP addresses, bot behaviour patterns, and attack signatures. When a security incident occurs, threat intelligence can help security teams identify which type of attack is taking place, by whom, and how best to protect against it.

Backdoor Shell Protection

Data breaches take over 100 days on average to discover, and some breaches are never discovered. If you have been breached, attackers may have installed an operating system shell or a rootkit that can sidestep any other security solutions.

When evaluating backdoor protection tools, prefer a tool that identifies and intercepts communication requests with operating system backdoors, instead of focusing on identifying the backdoor directly.

File and vulnerability scanners can help find backdoors, but with new backdoor variants cropping up daily and advanced obfuscation methods, they have limited effectiveness. Tools deployed at the network edge can more easily identify new types of backdoors, and pick up backdoor communications, even if the backdoor itself is encrypted or obfuscated.


The Transport Layer Security (TLS) protocol, which succeeded the SSL protocol, provides private, encrypted communication for website traffic. Websites secured by TLS are served using the Secure Hypertext Protocol (HTTP/S).

TSL provides privacy, ensuring third parties cannot listen into communications between websites and their visitors. It also authenticates communications using public key cryptography, and ensures the integrity of messages, preventing man in the middle attacks.

It has long been understood that websites providing private or sensitive content, login or payment capabilities need to be secured by TLS. Today, there is a broad consensus that all websites should be served over HTTP/S. The Google search engine demotes search rankings for websites that do not use TLS, and popular browsers, including Chrome and Firefox, display warnings saying such websites are insecure.

When selecting your website hosting and content management platform, ensure it supports TLS. If you are currently serving your website without TLS, strongly consider switching to TLS and redirecting existing content to HTTP/S web addresses.

Ensure security solutions you use for your website support TLS, and help you implement it at a good level. Use evaluation tools such as the SSL Labs security test to see if your hosting or security tools implement TLS and HTTP/S using the latest security best practices.

DDoS Protection

Modern DDoS protection services can protect against large-scale DDoS attacks, by scaling up a network of cloud-based computers to match the magnitude of the attack. DDoS protection services can perform deep packet inspection of incoming traffic and “scrub” or remove bad requests at large scale, while allowing legitimate requests to go through.

The following are key features you should look for in a DDoS protection service:

Comprehensiveness -able to protect against network layer attacks, application layer attacks, can parse HTTP/S traffic, and protect secondary assets such as databases, file servers, and CRM systems.

Network capacity – check how many Gbps or Tbps of traffic are supported by the service; this will roughly equal the scale of DDoS attack it can stop. Also, see if the service has a proven historical track record of stopping large-scale attacks.

SLA – services should guarantee an uptime of between three nines (99.9%) and five nines (99.999%), the best case. In addition, Service Level Agreement (SLA) should cover the type, size and duration of attacks it can protect, and specify a guaranteed response time. A faster response will give you a higher level of resilience.

Advanced Persistent Threat (APT) Protection

An APT is an attack campaign in which a threat actor or a team of malicious actors establish a presence on a network to obtain highly sensitive data or assets. APT is a multi-vector attack that involves a combination of techniques carried out over a long period of time, continuing for a long time after attackers have managed to penetrate the corporate network.

APTs typically target large enterprises, governments or institutions, and are aimed at stealing intellectual property, obtaining sensitive data, or sabotaging organizational systems.

There is no one tool that can protect against APTs. When selecting a solution for APT protection, consider a combination of tools that can protect against multi-faceted attacks. A key aspect is gaining visibility into attacks that may involve multiple organizational systems or multiple users, possibly with lateral movement and gradual privilege escalation.

Technologies commonly used to protect again APTs include: two-factor authentication, to prevent illicit access to organizational systems; web application firewalls (WAF), to block suspicious requests to a web application; protection against backdoor shells and other vulnerabilities; and DDoS protection. DDoS may be used as part of an APT to distract security teams, while attackers use other methods to penetrate the network.

Access Management

A common entry point for attackers is via access control systems. Weak authentication mechanisms, weak or seldomly updated passwords, excessive privileges, and failure to block suspicious sources, can lead to a breach, business disruption, or defacement of a website. Access management is also critical to mitigating threats from malicious insiders.

There are several approaches and tools to achieve secure access management. Identity and Access Management (IAM) is an enterprise system which helps enforce password policies and manage user roles and privileges. Consider a full-blown IAM system if you manage thousands of users in a large organization.

Whether you use IAM or not, ensure your access control solution supports multi-factor authentication and reputation management, which can filter out traffic based on detection of sources like anonymous proxies, TOR network or suspicious geographies.

In addition, ensure your solution includes IP blacklisting, which identifies known bad traffic sources and uses them to block bad requests, and reputation management,

To protect against insider threats, select a tool with advanced behavioural analysis capabilities, deception devices such as decoys and honeypots, and real time monitoring and auditing of data usage.

Regulatory Compliance

Many security standards and regulations, such as the European Union’s General Data Protection Regulation (GDPR), the Payment Card Industry Data Security Standard (PCI DSS), and the Health Insurance Portability and Accountability Act (HIPAA), define the need for specific types of security tools, or specific security policies which can be enforced using security solutions.

When selecting a security tool, consider your industry’s compliance standards, ensure your tools support the standard, and see which provisions of each standard or regulation you can address using the tools. In most cases, you will have to combine multiple tools to fully meet compliance requirements.

Security Customization

Some website security tools are “one size fits all”, and do not allow you to customize security policies or rules to your organization’s specific requirements. The more advanced security products, however, will allow you to expand on the basic security logic they provide – either by adding exceptions to the default security rules, or by allowing you to create completely new security policies.

Such customization could be important, as it can help minimize the amount of business disruption caused by false positive security events. Moreover, it can also be vital for businesses that find a need to enforce their own security policies or to modify the security rules for regulatory compliance.

SIEM integration

If your team uses Security Information and Event Management (SIEM), ensure you select security tools must integrate with it. This will enable you to use data and alerts from your security solutions to raise SIEM alerts, and conduct security analysis and investigations.

Website Security Deployment Options

Website security tools can have one of three deployment options. Choose the deployment option that matches the application or applications you need to protect:

On-premises – deployed within an organization’s data center or at the security perimeter

Public cloud – deployed in a public cloud such as AWS or Azure

Hybrid – can be used both on-premises and in the public cloud with the same security features and policies

Imperva Website Security Solutions

Imperva provides a holistic suite of solutions which provide complete security for web applications, whether deployed on-premises, in the cloud or in hybrid environments.

Deployed at the network edge, our solutions block attacks across the threat spectrum, and provide full visibility into how websites are being accessed and used. In addition, we provide comprehensive protection for data at rest and in transit, including Data Loss Prevention (DLP), a database firewall, data masking and encryption, and data classification.

Imperva provides the following website security solutions:

Web Application Firewall (WAF) – analyzes and inspects incoming requests to web applications and stops them before they enter the security perimeter. Secures both cloud and on-premise web applications, is fully customizable and integrated with SIEM.

Bot Management – provides a database of millions of browser and bot signatures, and classifies new bots using HTTP/S headers, reputation, IP/ASN, and JavaScript/cookie challenges. Blocks bad bots while allowing legitimate ones to access your site.

Threat Intelligence – comprehensive threat information that helps block bad bots and automated attacks, accurately distinguish human and bot traffic, prevent account takeover attacks, and block new and emerging threats via continual signature updates.

Backdoor Shell Protection – intercepts and blocks communication with backdoors at the network edge, making backdoors useless to the attacker and letting you remove them at your convenience. Instantly updates to protect against the latest backdoors.

SSL/TLS – our WAF protects your website with SSL at the highest level, providing SSL management on a single pane of glass. You can immediately achieve an A+ grade in the SSL Labs security test, with no changes to your servers and no configuration complexity.

DDoS Protection – guarantees mitigating any DDoS attack in under 10 seconds, at any scale, using a global network with over 6 Terabits per second. Supports all network layer or application layer DDoS attacks, and protects secondary systems like DBs and CRMs.

Advanced Persistent Threat (APT) Protection – we provide multiple security mechanisms to prevent APT, including web application firewall (WAF), backdoor shell protection, DDoS protection, and two factor authentication.

Access Management – we help prevent unauthorized access and insider threats by monitoring data access and privileged user activities; identifying and blocking anomalous user behavior via User and Event Behavioral Analytics (UEBA), and inspecting data in motion, at rest, in the cloud or on endpoints using data loss prevention (DLP).

Regulatory Compliance – we provide application security and data security capabilities built to address key portions of the GDPR, PCI DSS, and SOX standards; FISMA and NIST standards required by federal agencies; and many other regulations including FERMA and GLBA.

Security Customization – our WAF and other security solutions help provide extensive customization, letting you minimize false positives, and enforce your organization?s unique security policies and compliance requirements.

SIEM integration – all our security solutions are integrated with popular SIEM platforms including HP ArcSight, Splunk, and McAfee Enterprise Security Manager.

Read the Gartner Report

Gartner recognized Imperva again for our completeness of vision and ability to execute:

Previous post

Similar posts


Phone: +30-210-6801013
Fax: +30-210-6801015

Follow Us