SlideShare a Scribd company logo
BIG-IP V10.1Advanced Web SecurityNovember 2009
F5 Announcement Highlights     New release of BIG-IP delivers advanced Web security solutions to help customers efficiently address threats to Web applicationsWeb scraping attack protection
Better protection against automated scanners and bots
Simplified PCI compliance
Reporting with human readable policies to validate compliance with PCI DSS 1.2
Secure and Dynamic DNS
Meets DNSSEC 2009 government compliance
IP Geo-Location database
Integrated into F5’s TMOS architecture
Announcement date:  Nov. 16, 2009Airline Inventory Vulnerable to Web Scraping Ryanair – Stolen data, litigation costs, decreasing revenueWins injunction against Vtours GmBHForbids screen-scraping as commercial use*Ryanair sent cease and desist letters to 300 siteseasyJet warns Expedia: 'Hands off our flights‘

More Related Content

PPTX
Stopping DDoS Attacks In South Africa
PDF
Psb mobile security
PDF
F-Secure E-mail and Server Security
PDF
Powerful email protection
PDF
Internet gatekeeper
PDF
Client Security - Best security for business workstations
PDF
Best corporate end-point protection 2013
PDF
Presentatie F-Secure 26062015
Stopping DDoS Attacks In South Africa
Psb mobile security
F-Secure E-mail and Server Security
Powerful email protection
Internet gatekeeper
Client Security - Best security for business workstations
Best corporate end-point protection 2013
Presentatie F-Secure 26062015

What's hot (19)

PDF
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
PDF
How to Build a Practical and Cost-Effective Security Strategy
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PDF
F-Secure Policy Manager - onsite security management with superior control
PPS
Go Its 25 15
PPTX
It’s 9AM... Do you know what’s happening on your network?
PPTX
Cyber security fundamentals (Cantonese)
PDF
Cyber-Leave-Behind-Brochure-Done (1)
PDF
Stopping DDoS Attacks in North America
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PPTX
Strengthening security posture for modern-age SaaS providers
PDF
DDoS Falcon_Tech_Specs-Haltdos
PDF
9 Steps For Fighting Against a DDos Attack in real-time
PDF
Secure your Voice over IP (VoIP)
PPTX
Application layer attack trends through the lens of Cloudflare data
PPTX
Cyber security fundamentals
PPTX
Recent DDoS attack trends, and how you should respond
PPTX
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
How to Build a Practical and Cost-Effective Security Strategy
Top Cybersecurity Threats and How SIEM Protects Against Them
F-Secure Policy Manager - onsite security management with superior control
Go Its 25 15
It’s 9AM... Do you know what’s happening on your network?
Cyber security fundamentals (Cantonese)
Cyber-Leave-Behind-Brochure-Done (1)
Stopping DDoS Attacks in North America
Cybersecurity 2020 threat landscape and its implications (AMER)
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Strengthening security posture for modern-age SaaS providers
DDoS Falcon_Tech_Specs-Haltdos
9 Steps For Fighting Against a DDos Attack in real-time
Secure your Voice over IP (VoIP)
Application layer attack trends through the lens of Cloudflare data
Cyber security fundamentals
Recent DDoS attack trends, and how you should respond
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Ad

Viewers also liked (16)

PPTX
Virtual Edition
PPTX
F5's IP Intelligence Service
PDF
Ocs F5 Bigip Bestpractices
PPTX
F5 Networks BIG-IP LTM Virtual Edition
PDF
Taking the Fear out of WAF
PPTX
F5 BIG-IP Web-based Customer Training
PPTX
LTM essentials
PPTX
F5 Networks: Introduction to Silverline WAF (web application firewall)
PPTX
F5 - BigIP ASM introduction
PPTX
All 50 Ways to Use BIG-IP
PPT
BIG IP F5 GTM Presentation
PDF
F5 TLS & SSL Practices
PDF
F5 Networks APAC: Defending your perimeter today!
PDF
APAC Webinar: Learn how to maximise the benefits of NFV
PDF
Presentation f5 – beyond load balancer
PDF
F5 ASM v12 DDoS best practices
Virtual Edition
F5's IP Intelligence Service
Ocs F5 Bigip Bestpractices
F5 Networks BIG-IP LTM Virtual Edition
Taking the Fear out of WAF
F5 BIG-IP Web-based Customer Training
LTM essentials
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 - BigIP ASM introduction
All 50 Ways to Use BIG-IP
BIG IP F5 GTM Presentation
F5 TLS & SSL Practices
F5 Networks APAC: Defending your perimeter today!
APAC Webinar: Learn how to maximise the benefits of NFV
Presentation f5 – beyond load balancer
F5 ASM v12 DDoS best practices
Ad

Similar to F5 big v10_websecurity pressshort-phpapp01 (20)

PPTX
Solution_PP_P_Sangfor Data Protection & Disaster Recovery Solution_20...
PPTX
Customer Highleveloverview
PDF
A Different Approach to Securing Your Cloud Journey
PPTX
Risico op digitale bedreigingen maximaal verminderen - Bijdrage ASP4all voor ...
PPT
Akamai: Acelerando las aplicaciones en la nube - Miguel Serrano, Akamai
PDF
Paul hobbs @ Verzon Digital Media Services
PDF
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PPTX
Cutting-Edge Network Behavior Audit Technology from BMST
PPTX
Cyberoam Firewall Presentation
PPTX
Radware Solutions for MSSPs
PDF
F5 DDoS Protection
PDF
VMware Developer-Ready Transformation
PPTX
Attack Prevention Solution for RADWARE
PPTX
Dynamic Server Provisioning With Ops Manager and Hyper-V
PDF
Cloud for the Military - Projects, Promise
PPTX
F5 Networks Intelligent DNS Scale
PPTX
F5 Intelligent DNS Scale
PPT
Information Security
PPTX
Segurdad de red para la generacion de la nube symantec
PDF
Thinking about SDN and whether it is the right approach for your organization?
Solution_PP_P_Sangfor Data Protection & Disaster Recovery Solution_20...
Customer Highleveloverview
A Different Approach to Securing Your Cloud Journey
Risico op digitale bedreigingen maximaal verminderen - Bijdrage ASP4all voor ...
Akamai: Acelerando las aplicaciones en la nube - Miguel Serrano, Akamai
Paul hobbs @ Verzon Digital Media Services
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
Cutting-Edge Network Behavior Audit Technology from BMST
Cyberoam Firewall Presentation
Radware Solutions for MSSPs
F5 DDoS Protection
VMware Developer-Ready Transformation
Attack Prevention Solution for RADWARE
Dynamic Server Provisioning With Ops Manager and Hyper-V
Cloud for the Military - Projects, Promise
F5 Networks Intelligent DNS Scale
F5 Intelligent DNS Scale
Information Security
Segurdad de red para la generacion de la nube symantec
Thinking about SDN and whether it is the right approach for your organization?

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Lesson notes of climatology university.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Complications of Minimal Access Surgery at WLH
PDF
Computing-Curriculum for Schools in Ghana
PDF
Insiders guide to clinical Medicine.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
01-Introduction-to-Information-Management.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
TR - Agricultural Crops Production NC III.pdf
Institutional Correction lecture only . . .
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Lesson notes of climatology university.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
human mycosis Human fungal infections are called human mycosis..pptx
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
Complications of Minimal Access Surgery at WLH
Computing-Curriculum for Schools in Ghana
Insiders guide to clinical Medicine.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharmacology of Heart Failure /Pharmacotherapy of CHF
01-Introduction-to-Information-Management.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
TR - Agricultural Crops Production NC III.pdf

F5 big v10_websecurity pressshort-phpapp01

  • 1. BIG-IP V10.1Advanced Web SecurityNovember 2009
  • 2. F5 Announcement Highlights New release of BIG-IP delivers advanced Web security solutions to help customers efficiently address threats to Web applicationsWeb scraping attack protection
  • 3. Better protection against automated scanners and bots
  • 5. Reporting with human readable policies to validate compliance with PCI DSS 1.2
  • 7. Meets DNSSEC 2009 government compliance
  • 9. Integrated into F5’s TMOS architecture
  • 10. Announcement date: Nov. 16, 2009Airline Inventory Vulnerable to Web Scraping Ryanair – Stolen data, litigation costs, decreasing revenueWins injunction against Vtours GmBHForbids screen-scraping as commercial use*Ryanair sent cease and desist letters to 300 siteseasyJet warns Expedia: 'Hands off our flights‘
  • 11. Protection from Web Scraping Remote usersDublin DatacenterFrankfurt DatacenterLegitimate users see inventory while scrapers are remediatedIT StaffIT StaffAutomated scraperComprehensive reporting on scraping attacksWebDominoNetworkDetect requests and determine web site is being scraped WebDominoNetworkBIG-IP 8900BIG-IP 6900LTM/ASMLTM/ASMSolutionProtects valuable intellectual propertyPrices are controlled and users see airline approved inventoryIntegrated scrape reporting for PCI complianceAvoid litigation drastically reducing legal costs
  • 14. DNS Infrastructure is VulnerableSpoofing and cache poisoning allow hijacking of domainsExample.comwww.example.com?www.example.com?GSLB123.123.123.123012.012.012.012App ServersLDNSCache poisoningProblemNeed to secure DNS infrastructureCache poisoning and spoofing can hijack DNS records
  • 15. Need a method for trusted responses
  • 16. Need to meet US Government mandate for DNSSEC complianceHacker
  • 17. Securing the DNS InfrastructureDynamic and secure DNS with Global Traffic ManagerExample.comwww.example.com?www.example.com?BIG-IP GTM123.123.123.123+ public key123.123.123.123+ public keyApp ServersLDNSClient gets signed, trusted responseSolutionSecure and dynamic DNSEnsure users get trusted DNS queries with signed responses
  • 18. Reduce management costs – Simple to implement and maintain
  • 19. Meet mandates with DNSSEC compliant solutionHacker
  • 20. F5 – A Better Solution For Web SecurityBestWAF with protection from Web Scraping (ASM)Best WAF to assist administrators in understanding security threats (ASM: Attack Expert) Simplified PCI Reporting (ASM)Only GSLB with DNSSEC (GTM)

Editor's Notes

  • #4: http://www.wilmerhale.com/publications/whPubsDetail.aspx?publication=1948 you can find public information on American Airlines, eBay and others who were involved with legal procedures against scrapers.Ryanair – Stolen data, litigation costs, decreasing revenueWins injunction against VtoursGmBHForbids screen-scraping as commercial use*Ryanair sent cease and desist letters to 300 siteshttp://www.theregister.co.uk/2008/06/25/easyjet_warns_expedia/*http://www.theregister.co.uk/2008/07/11/ryanair_screen_scraping_victory/**http://www.theregister.co.uk/2008/06/27/easyjet_travel_sites_warned/http://news.idg.no/cw/art.cfm?id=08DFD829-1A64-67EA-E4996B477BBCB6D3What I discovered is that our Web sites are being "scraped" by other companies -- our competitors! Some of the information on our sites is valuable intellectual property. It is provided online, in a restricted manner (passwords and such), to our customers. Such restrictions aren't very difficult to overcome for the Web crawlers that our competitors are using, because webmasters usually don't know much about security. They make a token attempt to put passwords and restrictions on sensitive files, but they often don't do a very good job.
  • #6: Online dictionary for help. Network guy challenged with application security and now has violation and attack type description. Attack expert system provides knowledge, testing and reporting of attacks and policies: Attack profiles - Every attack is now explained, every violation includes detailed description of the exact check that ASM performsStaging – policies are staged so tightening changes are made before enforcementSuperior reporting - detailed review of vulnerabilities allowing for fast mitigation and easy management
  • #7: Competition has beaten us up in the past but we haveconsolidated with PCI reports. With new PCI reporting, BIG-IP ASM details security measures required by PCI DSS 1.2, if you are in compliance and if not, steps required to become compliant.
  • #8: A typical DNS request goes through a recursive set of public DNS servers to resolve the domain name. In this case I’m looking to connect to www.example.com. But one of these DNS servers has been compromised through cache poisoning. Cache poisoning occurs when a resolver or recursive DNS server queries another server in an effort to answer a query, and an attacker spoofs the query response to the resolver or recursive server. This can occur when the attacker impersonates the queried server by using an appropriate DNS message. In the case of the recursive server receiving such an answer, it not only supplies the resolver with the falsified information, it caches the information such that future queries, at least during the valid time interval of the answer, are answered with the same falsified information.