Web Application Security

DDoS Protection
Attack Protection
Eliminate Website Vulnerabilities
Eliminate Application Vulnerabilities
Continuous Protection

Summary

Sentrix Cloud-DMZ™ eliminates website and application vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, Remote File Inclusion and the OWASP Top-10. It prevents attackers from gaining unauthorized access to web systems, compromising sensitive data and defacing websites while minimizing the organization’s dependency on secure development and 3rd party patches.

Product description

Web Application Security

Sentrix Cloud-DMZ™ eliminates website and application vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, Remote File Inclusion and the OWASP Top-10. It prevents attackers from gaining unauthorized access to web systems, compromising sensitive data and defacing websites while minimizing the organization’s dependency on secure development and 3rd party patches.

Cloud-DMZ is an advanced alternative to a conventional WAF, which addresses the critical WAF deficiencies by using active learning, active content serving, and cloud replication. As a result it dramatically reduces false positives and false negatives, shortens deployment time to hours and eliminates operational complexity.

Remove 99% of Your Website’s Attack Surface Automatically Eliminate Vulnerabilities

Conventional WAFs attempt to block malicious traffic across the entire website’s attack surface and require configuring thousands of rules. As a result of this complex approach WAFs frequently fail to identify attacks, while blocking legitimate users. Unlike WAFs, Cloud-DMZ does not attempt to block malicious traffic. Instead, it serves it all: up to 99% of web transactions are served from a static, cloud-based replica grid. This automatically eliminates vulnerabilities in 99% of the application without requiring any rules, hardening, patching or secure development. The remaining 1% is protected by a set of rigorous mitigation measures that only allow valid business transactions to pass through to the customer’s web systems.

Never Block Legitimate Users

False positives (blocking legitimate users) are the number one concern when deploying a conventional web application firewall . Cloud-DMZ dramatically reduces false positives, because it does not rely on blocking traffic as its means of protection. Furthermore, Cloud-DMZ continuously synchronizes with the protected application, so any code changes, often overlooked by conventional security solutions and resulting in false positives, are immediately taken into account by Cloud-DMZ.

Continuous, Automated Protection for Agile Development and Release

Cloud-DMZ integrates into the application development and release cycle by automating application security and accelerating security updates. An Active Learning Engine continuously scans and learns the protected application and rapidly synchronizes security with the most recent application release, so agile development and DevOps processes without slowing them down.

Prevent Zero-Day Attacks

Cloud-DMZ protects enterprise websites and applications against undocumented, “zero-day” attacks. An attempt to execute a zero-day attack will be served, in most cases, statically by the cloud-DMZ replica grid without reaching back end systems, thereby preventing the attacker from executing the attack. Or, if the attack is not targeted at the replica, it will be inspected and blocked by the contextual security policy, which rigorously enforces valid transactions.

Prevent Vulnerabilities across the Complete Stack

Protecting against vulnerabilities in 3rd party platforms such as WordPress is out of the organization’s control and relies on timely patches by the platform vendor. Cloud-DMZ prevents vulnerabilities across the complete software stack including application code and underlying 3rd party platforms and eliminates the need to rely on patches.

Optimal for Cloud-Based Applications

Cloud Service Providers require the customers to protect their applications. Cloud-DMZ is pre-deployed in all major public clouds and leverages existing cloud services to provide optimal protection for enterprise cloud applications.

Protect Complex, Globally Distributed Web Systems Keep Maintenance and TCO Under Control

Enterprises use Cloud-DMZ to protect large, complex websites that are distributed across multiple domains and geographical locations, while managing the security operation from a single, centralized location. It eliminates ongoing manual configuration and keeps security team sizes and costs under control. Its management interface can be operated by both application developers and security teams. Cloud-DMZ further reduces TCO by simplifying security architecture and serving the majority of traffic from a cloud-based replica grid.

Achieve PCI DSS Compliance

Organizations processing major credit cards must comply with PCI requirements. CLOUD-DMZ helps organizations meet PCI DSS application security requirements:

  • PCI DSS 6.5 – Have processes in place to protect applications from common vulnerabilities such as injection flaws, buffer overflows and others
  • PCI DSS 6.6 – Address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks

Instant Cloud Deployment

Cloud-DMZ replicates the customer’s websites and applications to the cloud. By using Cloud-DMZ organizations enjoy the benefits of cloud-deployment instantly and without going through a complex deployment process.

DDoS, Website Optimization and Availability

Cloud-DMZ accelerates the customer website and offloads traffic from customer systems to the cloud. It provides inherent DDoS protection thereby eliminating smokescreen DDoS attacks that re frequently used to mask a more sophisticated data breach. The Cloud-DMZ replica grid doubles as an availability solution and will remain available when customer back end systems are down.

Product links

Help the seller understand how this product meets your needs
Contact name
Info
E-mail
info@sentrix.com
Phone
1 781 786 8835
Location
Waltham, MA, USA
Company
Sentrix
Published