SlideShare a Scribd company logo
Securing Cloud Applications
with a
Distributed Web Application Firewall

www.riverbed.com	
  
©2013	
  Riverbed	
  Technology	
  
Primary Target of Attack Shifting from
Networks and Infrastructure to Applications

NETWORKS

©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  

INFRASTRUCTURE

APPLICATIONS
Cloud Applications Are Exposed to
New Threats

Designing for dramatically
larger number of users shifts
focus towards performance
and away from security

Cloud	
  

Cloud applications use
off-the-shelf building blocks,
in house services, and 3rd
party frameworks – each with
individual vulnerabilities

Vulnerabilities exposed when
applications designed for
in-house data centers
migrate to the cloud
©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
There is a Real Cost of Not Securing
Applications

Global headlines.
Real business impact.

3

$10,000,000

500,000

$94,000,000

40,000,000+

Months offline

fined for
security breach

replacement credit
cards issued

in remediation
costs

credit card details
lost

©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
Beyond $$: Other Business Drivers for
Application Security
!   Regulatory Pressures
!   PCI DSS, HIPAA, etc.

Compliance

Revenue &
Reputation
!   Opportunity cost of
remediation
!   Brand and reputation
damage
!   Loss of income

!   Data Privacy Act

Best
Practices
!   Security Governance
!   Cross-business collaboration
!   Delegation of responsibility
!   Understand changing risk
profiles of your application
!   Due Diligence

©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
Changing Risk Profiles Make it Harder to
Secure Cloud Applications
Vulnerable third-party
software components

Malicious requests
(e.g. SQL-injection)

Cross-site request
forgery (CSRF)

Authentication and
session attacks

Cross-site scripting
(XSS)

For detailed information on the latest trends in application vulnerabilities,
see OWASP Top Ten Projects at https://www.owasp.org/
©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  

URL
manipulation
Traditional Web Application Firewalls are
Not Effective in Cloud Environments

TRADITIONAL SOLUTION
IS INEFFICIENT
Dedicated hardware WAF
One WAF per deployment

Increased capital costs
Decreased provisioning agility in a dynamic, virtualized environment
Increased management costs without levels of delegation for administration

©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
REQUIRED:
A Distributed Web Application Firewall
Purpose-built for Cloud Security
The Web Application Firewall Must be
Massively Scalable & Portable
!   Across CPU, computer, server
rack and data center boundaries

Public

Private

!   Across multiple applications at
a time (e.g. cloud bursting)
!   Across private, hybrid or public
clouds, and small or large
traditional data centers
!   Available as virtual appliance
and a plug-in
!   Start small, but allow scale
up without changes to
security solution

Data Center

Local Machine
©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
Flexible, Portable Across Platforms

Fits into existing
infrastructures
and processes

Available as
virtual appliance
and a plug-in

©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  

Can live in a wide
variety of components
effectively

Mixes traditional
and virtual
technologies
Distributed and Delegated Management

Public

1

2

Easy, central
management with a
simple web-based
management UI

Granular configuration
settings for each
application and each
customer

Private

3

Proactive Monitoring –
tuned for each
application

4

Multi administrator
privileges to handle
diverse security
policy schemes

Fits into any – existing or planned – application delivery infrastructure.
©2013	
  Riverbed	
  Technology	
  	
  |	
  	
  www.riverbed.com	
  
Securing Cloud Applications with a
Distributed Web Application Firewall
	
  
	
  Download	
  the	
  Complete	
  Whitepaper	
  from	
  	
  
www.riverbed.com/s2ngray-­‐appsec	
  
Follow	
  Us	
  :	
  

www.riverbed.com©2013	
  
©2013	
  Riverbed	
  Technology	
  

More Related Content

PDF
Is workforce mobility presenting new technology challenges?
PDF
Why cyber security is a priority for your retail business
PDF
ePlus Intelligent Branch
PPTX
WatchGuard Firewall & Network Security
PPTX
HP2065_TieCon_Presentation_V7
PDF
The Software Defined Enterprise
PDF
Ericom Connect datasheet
PDF
CipherGraph Networks: Introduction
Is workforce mobility presenting new technology challenges?
Why cyber security is a priority for your retail business
ePlus Intelligent Branch
WatchGuard Firewall & Network Security
HP2065_TieCon_Presentation_V7
The Software Defined Enterprise
Ericom Connect datasheet
CipherGraph Networks: Introduction

What's hot (20)

PDF
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
PPTX
The Advent of Serverless Technologies
PDF
The vmware story
PDF
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
PDF
Level Up to a Seamless End-User Experience
PDF
Powering IT Transformation For Any Business
PPT
Cloud computing web 2.0 By Joanna Hendricks BMT 580
PPTX
CDW Presents the Future of IT - Software-Defined Enterprise
 
PPTX
ePlus Virtualized Network
PDF
Solving access for Hybrid IT
PDF
SD-WAN iFLX-Brochure
PPTX
Security As A Service In Cloud(SECaaS)
PPTX
DELL Technologies - The Complete Portfolio in 25 Minutes
PPTX
The Need for Cloud-Driven Work Infrastructure
PPTX
Presentation ppm ppt
PDF
MT82 IoT Security Starts at Edge
PPTX
HP: De toekomst van personal computing toestellen.
PDF
Secaa s cat_10_network_security_implementation_guidance
PPT
Fort Technologies Cloud Iaa S
PDF
Cloud Computing for Government Industry
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
The Advent of Serverless Technologies
The vmware story
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Level Up to a Seamless End-User Experience
Powering IT Transformation For Any Business
Cloud computing web 2.0 By Joanna Hendricks BMT 580
CDW Presents the Future of IT - Software-Defined Enterprise
 
ePlus Virtualized Network
Solving access for Hybrid IT
SD-WAN iFLX-Brochure
Security As A Service In Cloud(SECaaS)
DELL Technologies - The Complete Portfolio in 25 Minutes
The Need for Cloud-Driven Work Infrastructure
Presentation ppm ppt
MT82 IoT Security Starts at Edge
HP: De toekomst van personal computing toestellen.
Secaa s cat_10_network_security_implementation_guidance
Fort Technologies Cloud Iaa S
Cloud Computing for Government Industry
Ad

Viewers also liked (6)

PDF
Cascade 10.5: Visibility & Control
PPTX
Cascade 10.0 ---- Application Aware Network Performance Management (NPM)
PPTX
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
PPTX
SteelCentral Network Planning and Configuration Management (NPCM)
PDF
Riverbed Remote Office/Branch Office IT Survey
PDF
Riverbed and HPE Services for Office 365
Cascade 10.5: Visibility & Control
Cascade 10.0 ---- Application Aware Network Performance Management (NPM)
Riverbed SteelCentral AppResponse 9.0 NetProfiler and NetShark 10.6
SteelCentral Network Planning and Configuration Management (NPCM)
Riverbed Remote Office/Branch Office IT Survey
Riverbed and HPE Services for Office 365
Ad

Similar to Riverbed Securing Cloud Applications with a Distributed Web Application Firewall (20)

PPTX
Cloud Web Application Firewall - GlobalDots
PDF
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
PDF
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
PDF
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
PDF
Are you fighting_new_threats_with_old_weapons
PPTX
Andrew Useckas Csa presentation hacking custom webapps 4 3
PDF
Webinar on Common Mistakes and Learnings in Securing Cloud Based Applications
PDF
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
PDF
Cloud servers-new-risk-considerations
PPT
Cloud Computing Security Needs & Problems Alon Refaeli
PDF
Presd1 10
DOCX
What is the future of cloud security linked in
PDF
Why Do You Need a Web Application Firewall?
PPTX
Webscale webinar about Web Application Firewall
PPTX
Decentralized cloud firewall framework with resources provisioning cost optim...
PPT
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
PDF
Top Cloud Threats
PDF
Csathreats.v1.0
PDF
Securing Microservices in Containerized Environments
PDF
Cloud Application Security Best Practices To follow.pdf
Cloud Web Application Firewall - GlobalDots
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Are you fighting_new_threats_with_old_weapons
Andrew Useckas Csa presentation hacking custom webapps 4 3
Webinar on Common Mistakes and Learnings in Securing Cloud Based Applications
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Cloud servers-new-risk-considerations
Cloud Computing Security Needs & Problems Alon Refaeli
Presd1 10
What is the future of cloud security linked in
Why Do You Need a Web Application Firewall?
Webscale webinar about Web Application Firewall
Decentralized cloud firewall framework with resources provisioning cost optim...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
Top Cloud Threats
Csathreats.v1.0
Securing Microservices in Containerized Environments
Cloud Application Security Best Practices To follow.pdf

More from Riverbed Technology (20)

PPTX
Four Factors for Evaluating SD-WAN Solutions
PPTX
Are your apps chasing users away? How to deliver superior Digital Experiences
PPTX
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
PPTX
Are you REALLY ready for the cloud?
PDF
Modernizing Edge IT with Riverbed SteelFusion
PPTX
Why and How to Monitor Application Performance in Azure
PPTX
Suffering from “Franken” Monitoring?
PPTX
The Need for Unified Performance Management
PPTX
Riverbed Software Defined IT Survey
PDF
Detect and Fix Performance Problems Faster
PDF
Exposing and Fixing Common App Performance Problems
PDF
Learn how Intuit created an application-aware network performance platform
PDF
SteelCentral NetSensor 3.0
PDF
Take Control of Application Performance
PDF
Expand the Business Value of Riverbed Solutions with New Optimize Services
PPTX
SteelCentral Portal Take the War Out of the War Room
PPTX
Expect More Value. Get More Value.
PDF
Riverbed FORCE
PPTX
Ensuring the compliance, resiliency, and availability of business-critical ne...
PDF
Riverbed Business Value Snapshot
Four Factors for Evaluating SD-WAN Solutions
Are your apps chasing users away? How to deliver superior Digital Experiences
Digital Experience Management—The Key to Delivering Exceptional Digital Exper...
Are you REALLY ready for the cloud?
Modernizing Edge IT with Riverbed SteelFusion
Why and How to Monitor Application Performance in Azure
Suffering from “Franken” Monitoring?
The Need for Unified Performance Management
Riverbed Software Defined IT Survey
Detect and Fix Performance Problems Faster
Exposing and Fixing Common App Performance Problems
Learn how Intuit created an application-aware network performance platform
SteelCentral NetSensor 3.0
Take Control of Application Performance
Expand the Business Value of Riverbed Solutions with New Optimize Services
SteelCentral Portal Take the War Out of the War Room
Expect More Value. Get More Value.
Riverbed FORCE
Ensuring the compliance, resiliency, and availability of business-critical ne...
Riverbed Business Value Snapshot

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
WOOl fibre morphology and structure.pdf for textiles
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
Tartificialntelligence_presentation.pptx
A Presentation on Artificial Intelligence
Hindi spoken digit analysis for native and non-native speakers
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
1. Introduction to Computer Programming.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Riverbed Securing Cloud Applications with a Distributed Web Application Firewall

  • 1. Securing Cloud Applications with a Distributed Web Application Firewall www.riverbed.com   ©2013  Riverbed  Technology  
  • 2. Primary Target of Attack Shifting from Networks and Infrastructure to Applications NETWORKS ©2013  Riverbed  Technology    |    www.riverbed.com   INFRASTRUCTURE APPLICATIONS
  • 3. Cloud Applications Are Exposed to New Threats Designing for dramatically larger number of users shifts focus towards performance and away from security Cloud   Cloud applications use off-the-shelf building blocks, in house services, and 3rd party frameworks – each with individual vulnerabilities Vulnerabilities exposed when applications designed for in-house data centers migrate to the cloud ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 4. There is a Real Cost of Not Securing Applications Global headlines. Real business impact. 3 $10,000,000 500,000 $94,000,000 40,000,000+ Months offline fined for security breach replacement credit cards issued in remediation costs credit card details lost ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 5. Beyond $$: Other Business Drivers for Application Security !   Regulatory Pressures !   PCI DSS, HIPAA, etc. Compliance Revenue & Reputation !   Opportunity cost of remediation !   Brand and reputation damage !   Loss of income !   Data Privacy Act Best Practices !   Security Governance !   Cross-business collaboration !   Delegation of responsibility !   Understand changing risk profiles of your application !   Due Diligence ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 6. Changing Risk Profiles Make it Harder to Secure Cloud Applications Vulnerable third-party software components Malicious requests (e.g. SQL-injection) Cross-site request forgery (CSRF) Authentication and session attacks Cross-site scripting (XSS) For detailed information on the latest trends in application vulnerabilities, see OWASP Top Ten Projects at https://www.owasp.org/ ©2013  Riverbed  Technology    |    www.riverbed.com   URL manipulation
  • 7. Traditional Web Application Firewalls are Not Effective in Cloud Environments TRADITIONAL SOLUTION IS INEFFICIENT Dedicated hardware WAF One WAF per deployment Increased capital costs Decreased provisioning agility in a dynamic, virtualized environment Increased management costs without levels of delegation for administration ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 8. REQUIRED: A Distributed Web Application Firewall Purpose-built for Cloud Security
  • 9. The Web Application Firewall Must be Massively Scalable & Portable !   Across CPU, computer, server rack and data center boundaries Public Private !   Across multiple applications at a time (e.g. cloud bursting) !   Across private, hybrid or public clouds, and small or large traditional data centers !   Available as virtual appliance and a plug-in !   Start small, but allow scale up without changes to security solution Data Center Local Machine ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 10. Flexible, Portable Across Platforms Fits into existing infrastructures and processes Available as virtual appliance and a plug-in ©2013  Riverbed  Technology    |    www.riverbed.com   Can live in a wide variety of components effectively Mixes traditional and virtual technologies
  • 11. Distributed and Delegated Management Public 1 2 Easy, central management with a simple web-based management UI Granular configuration settings for each application and each customer Private 3 Proactive Monitoring – tuned for each application 4 Multi administrator privileges to handle diverse security policy schemes Fits into any – existing or planned – application delivery infrastructure. ©2013  Riverbed  Technology    |    www.riverbed.com  
  • 12. Securing Cloud Applications with a Distributed Web Application Firewall    Download  the  Complete  Whitepaper  from     www.riverbed.com/s2ngray-­‐appsec   Follow  Us  :   www.riverbed.com©2013   ©2013  Riverbed  Technology