Application Security

Due to false alarms in existing endpoint security solutions, security managers may unnecessarily lose time when trying to manually analyse a non-existent threat or may miss a more important threat.

VMware AppDefense is a data centre endpoint security product aimed at eliminating these issues. AppDefense determines how data centre endpoints should behave and when the first change is made. It understands normal changes and changes caused by real threats, and responds to threats automatically, accurately and with precision.

AppDefense can trigger vSphere and VMware NSX if a threat is detected or on demand. Thus;

  • Blocks process communication.
  • Takes snapshots at the endpoint for instant forensic analysis.
  • Suspends access to the endpoint.
  • Turns off access to the endpoint.

Why Choose AppDefense?

  1. Understands application behaviours
    Distinguishes which application behaviour is good, which behaviour is threatening, and which changes are appropriate.
  2. Automatically responds to threats
    Automatically holds or shut downs your endpoints against detected threats.
  3. Protects the shield
    Use AppDefense as a second shield that protects vSphere Hypervisor.

Advantages of AppDefense

  1. Better threat detection with SOC (Security Operation Centre)
  2. Easy data centre endpoint security
  3. Automated reactions against attacks

Web Application Firewall (WAF)
A web applications firewall is a special kind of application firewall that is specifically applied to web applications. It is placed in front of web applications and analyses bidirectional web-based (HTTP) traffic to detect and block anything malicious. OWASP provides the following general technical definition: “From a technical perspective, a web application-level security solution without relying on the application itself.” In accordance with the PCI DSS Information Annex for the requirement, WAF is defined as a “security policy implementer placed between a web application and an end-user client. This functionality can be implemented via software or hardware or with an application device or an ordinary server running on a common operating system. It can be a stand-alone device, or it can be integrated with other Network components.”In other words, WAF can be a virtual or physical application that prevents exploits of openness in a web applications by external threats. These openings may be because the application itself is outdated or inadequately coded in design. WAF solves these problems by structuring specific sets of policies and rules.

  • Hidden Field Manipulation
  • Cookie Poisoning
  • Parameter Manipulation
  • Buffer Overflow
  • Cross-Site Scripting (XSS)
  • Backdoor and debug options
  • Secret Command Execution
  • Forced Scan Attacks
  • Third-party misconfiguration
  • Known openings and other attacks similar to this type of attack


Brochures

View the brochures for detailed
information about our solutions

Download

 

References

Name

Phone

Company

Title

Message

Data Protection Policy / Privacy Policy