Network Application Security

Application layer security refers to methods of protecting Web applications at the application layer (layer 7 of the seven-layer OSI model) from malicious attacks that may expose private information. Security is applied to the application layer specifically to protect against unauthorized access and attacks.

 

Web Application Firewall

Web Application firewall provides a flexible and a comprehensive, policy-based web application security solution that eliminate the need for multiple appliances and address emerging threats at the application level. This complete solution lowers maintenance and management costs, and reduces the risk of damage to your intellectual property, data, and web applications.

 

Application Delivery Controller

 

An application delivery controller is a device that is typically placed in a data center between the firewall and one or more application servers (an area known as the DMZ). Application delivery controllers primarily performed application acceleration compression, cache, connection multiplexing, traffic shaping, application layer security, SSL offload, DDoS protection, advantced routing, server health monitoring , and content switching combined with server load balancing.

 

Secure Web Gateway

Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. These gateways must, at a minimum,include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included

 

Email Security

Despite new and emerging methods of communication, email remains the top communications tool for businesses. It is no wonder cyber criminals still use email as a primary channel through which to wage their attacks. In addition to dealing with these risks, organizations also must be wary of confidential information going out the door – either accidentally or intentionally. These events can result in monetary loss, compliance violations and/or brand damage.

 

close