본문으로 바로 가기
배경

Imperva

SecureSphere

Imperva Web Firewall
Imperva Web Firewall defends OWASP TOP10 as well as advanced threatened applications with the latest technology.
  • SQL InjectionSQL Injection
  • XSSXSS
  • SSLSSL
  • Block uploadBlock upload
  • Brute forceBrute force
  • 세션탈취 / 쿠키변조 / 파라미터 변조Session hijacking / Cookie modulation
    / Parameter modulation
  • Applicaiton IntelligenceApplicaiton
    Intelligence
  • 민감정보 유출Sensitive information leakage
  • Bot 차단Bot Cut-off
  • CSRF Automation / 애플리케이션 공격 방어CSRF
    Automation /

    Application
    Attack Defense
  • 상관관계 분석Correlation analysis
  • Virtual PatchingVirtual Patching
  • 사용자 정의 정책Custom Policies
  • Positive SecurityPositive Security
Basics of Web Firewall
Reliability and Security
노이즈 없는 웹방화벽 운영
Noise-free Web Firewall Operations
  • Web firewalls with many unnecessary events can allow false detection that blocks normal traffic and WAF-blocked attacks.
  • Imperva's research center ensures the accuracy of detection of client web firewalls in response to changes in the web security threat environment
Operating in 100% blocking mode for domestic customers
웹 애플리케이션 리스크 감소
Reduce Web Application Risk
  • Automated policy creation and regular signature updates twice a month enable you to quickly and securely secure web application security at the speed of your DevOPs team.
Provides the world's best signature DB and update services
Provide an optimized configuration environment
for your network and production environment
Based on the deployment experience and know-how of On-Prem, Public/Private Cloud, we provide deployment services optimized for customer requirements/network environments.
고객사 네트워크 환경 및 운용 환경에 최적화된 구성 환경 제공
Supported Platform
  • data_center
    On-Prem
  • aws azure goole_cloud
    Public Cloud
  • vmware openstack microsoft
    Private Cloud
  • Trusted manufacturers with cloud operators and security parknership
  • Technical support from experienced cloud-specialized web firewall engineers
  • Have multiple deployment references
Automated response to security threats
  • Exactly
    Who
    accessed what data?
  • Is this behavior
    Normal Access?
  • How do I know and
    How Quickly
    can I respond?
    And if not?

The core of DB security threats is an automated business process.

  • 탐색, 분류, 평가 화면
    Key Features
    Platform-agnostic navigation
    • On-Prem
    • Private/Public Cloud
    Unauthorized DB server detection
    • Automatic detection of unidentified DB servers by security team
    Unauthorized DB server detection
    • Flexible Tam using built-in signatures and regular expressions
    • Over 1,500 DISAs (STIGs), CIS benchmark vulnerabilities testing, known DB server vulnerabilities detection, and security patch detection support
    Navigation, Classification, Evaluation Search for sensitive information, check for vulnerabilities
  • Data Activity Monitoring/Blocking 화면
    Key Features
    Provides visibility into who accessed what
    data, including authorized users
    • A predefined audit policy related to the Privacy Act
    • Customized security policies with custom policies
    Provides a standardized DB security audit framework for various platforms(On-Prem/Private, Public Cloud)
    • Simplify DB Security Audit
    • Easy DB audit expansion in hybrid environments
    Identify whether sensitive information is present and should be regulated
    Data Activity Monitoring/Blocking Detect/alarm/block continuous database access behavior
  • Database Security 구성 화면
    Gateway
    • Devices that monitor and control traffic to the DB server
    • Save real-time audit logs
    MX Management Server
    • GW Integrated management (Security Policy, Audit Integrated management)
    • DB Activity Monitoring and gathering index information
    • Provide DB Scanner
    Agent
    • Agent applications that you install on the DB server
    • Monitor and block all operations over the network
      or after connecting directly to the DB
    Database Security Configuration Detect/alarm/block continuous database access behavior
Supported Database
Security personnel's concerns
  • 27%

    Customers face millions of
    security events per day

  • 83%

    Loaded with multiple
    security solutions

  • 83%

    a series of false detections

  • 4 Hours

    Minimum business hours for
    daily Alert analysis

Attack Analysis Architecture
Reporting key web security issues through on-prem, public/private cloud impact management server (MX)
security events collection/analysis machine learning/AI/crowsing-based insights
Gain insight with Attack Analysis
Automatically categorizes key incidents in millions of events based on machine learning/AI/crowd sourcing,
and security personnel can immediately take action on key incidents without any analysis
“ Increasing Visibility into threats
Make Decisions based on threat information
Protect your core information in your enterprise ”
Easy transition to SECaaS
  • Simple and fast transition to an Impoverbar Cloud DDoS-enabled solution with DNS server changes
  • Seoul Region POP construction provides WEB DDos/WAF (SECaaS) services without delay
  • Block automated Web DDoS attacks without operator intervention
  • 47 dedicated global data centers
  • Accept up to 6TB of traffic
  • Fast propagation/security updates to self-developed systems
  • Global network 95% latency of 50ms or less
  • Handles traffic close to 47 global POPs
  • SDN Transitions Fast Routing with Tier 1 ISP Integration
  • Accurate detection capabilities: single stack (L3 to L7 protection), deep inspection and protection,
    eputation intelligence for impingement threats, unlimited defense regardless of attack volume
  • Fast speed and blocking : Domestic POP, SLA to respond within 3 seconds, SD-NOC/SOC (99.999% SLA),
    Advanced Edge Routing, Global Mesh Configuration
High Visibility
  • DDoS attacks used as camouflage tactics allow for detailed visibility of actual end goals and attacks during defense
Accurate detection Fast speed and blocking High visibility
  • Single Stack (L3~L7 Protection)
  • Deep inspection and protection
  • Imperva Threat Reputation Intelligence
  • Unlimited defense regardless of attack volume
  • Domestic POP
  • SLA to respond within 3 seconds
  • SD-NOC/SOC (99.999% SLA)
  • Advanced Edge Routing
  • Global Mesh Configuration
  • Real-time console and instant notification
  • Provides network traffic
    and application analytics
  • Attack Analytics
  • SIEM Interworking
Global Leader Group
Founded in 2002, Infar is a security company that supplies web security/DB security solutions to more than 5,900 customers
worldwide. Gartner has selected him as the only global leader in the web firewall market for seven consecutive years between 2014 and 2020.
  • botbot
  • rasprasp
  • ddosddos
  • wafwaf