Web Application Firewalls: The TCO Question

Size: px
Start display at page:

Download "Web Application Firewalls: The TCO Question"

Transcription

1 Web Application Firewalls: The TCO Question Ovum looks into total cost of ownership for WAFs Rik Turner

2 Summary Catalyst Ovum has carried out a series of interviews with companies in North America, Europe, and Asia- Pacific (see Methodology) with a view to understanding how the market for web application firewalls (WAFs) is evolving, how wide adoption of the technology is, whether there is a prevalence of onpremise or cloud-based offerings, and what determines companies preferences for either. The survey then went on to pose a series of questions with a view to determining the total cost of ownership (TCO) for on-premise as well as cloud-based WAFs, although this proved difficult. Ovum view Of respondents, 18% have no WAF Application firewalls, of which WAFs are a subset designed specifically to work with the Web, have a long history, dating back to work carried out as long ago as 1991, with the first commercially available application firewall, the Gauntlet, coming to market in Much has changed since that time, of course: the Internet has become a ubiquitous part of doing business around the world, and security exploits against websites are now a daily occurrence. As a result, WAFs have become a key category in their own right. The first data point that jumps out from the survey results is that a significant minority of companies do not have any form of WAF protection. Of respondents, 18% said they had no WAF of any kind in their organization. Because all these companies have websites and Internet connections, this raises the question what form of protection they do have from exploits such as cross-site scripting and SQL injection Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 2

3 What kind of WAF do you have? Source: Ovum They are probably relying on content filtering carried out in other security devices, such as a UTM appliance or a web filtering device. Alternatively, they may simply have no adequate protection from application-layer attacks. Either way, it is clear that application owners need to do more to secure themselves if another year of breaches is to be avoided. Of the companies that are employing WAF technology, the majority, 74% of our respondents, are using on-premise devices, with a further 8% using a cloud-based service. There is considerable variety among on-premise WAFs installed Another interesting aspect of the survey results is that, while there are clear market leaders in the onpremise WAF market, there is considerable variety among the devices in use. The survey asked specifically whether WAFs installed came from F5, Citrix, or Imperva, but all three of these vendors scored only a small percentage of the total, with the vast majority (89% of on-premise respondents) running devices from other manufacturers. Furthermore, in one case, one respondent said it had F5 installed, but then when asked which model, answered Check Point, suggesting some confusion (it has been corrected to be a non-f5 device), while another said they had Imperva, but then added that they also had F5 and Check Point devices in their infrastructure. Meanwhile, alongside these names, were quite a lot of Cisco and Sonicwall devices, as well as ones from Cyberoam, Fortinet, and Check Point Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 3

4 Who is your on-premise WAF provider? Source: Ovum 2014 Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 4

5 WAFs and NGFWs are often conflated in customers minds Not all these names are actually associated with WAF technology, and some of them are vendors of so-called next-generation firewalls (NGFWs). A further conclusion from a number of the responses to the questions about vendors and models is that there is a reasonable degree of confusion regarding what constitutes a WAF and how it differs from an NGFW. An NGFW is an evolution of the conventional network firewall, which performs stateful packet inspection. The enhancements that justify the next-generation epithet tend to fall into the category of application awareness (the ability to inspect traffic at Layer 7 of the OSI model). WAFs, like all application firewalls, have the same capability. However, whereas NGFWs application-aware functionality focuses on securing and/or restricting internal clients when accessing the Internet, they do not secure internal web applications from external threats such as cross-site scripting (XSS), cross-site request forgery (XSRF or CSRF), URL access, or SQL injection. This is the preserve of the WAF, and WAFs and NGFWs are therefore distinct and discrete types of functionality. The survey reveals a tendency to conflate and even confuse the two, which is further evidence of the need for a different attitude to web application security. A greater understanding of web application threats, and therefore of the need to implement WAF technology, is urgently required in In its most recent ranking of the top 10 web threats, ranked both by frequency and severity (for 2013), the Open Web Application Security Project (OWASP) rated injection flaws at number 1, XSS at number 3, and XSRF at number Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 5

6 Capabilities of NGFW and WAF XSS = Cross-site scripting XSRF = Cross-sire request forgery Source: Ovum Incumbency is an issue when companies consider switching to cloud-based WAF While 8% of respondents said they were taking a cloud-based WAF service rather than running an onpremise device, a further 9% that do have on-premise said they had considered a cloud-based service offering. Asked why they had opted instead for on-premise, one answered that their organization had done so to have a better control over things, without specifying the particular controls to which this referred. Another group (4% of total respondents) said they already had an onpremise device when they looked at a cloud service. They therefore decided to stick with it, either because they still needed to amortize their investment, or because they felt more comfortable with what they already knew. These answers represent a challenge to providers of cloud-based WAF, which need to demonstrate not only that their services can give customers an equivalent level of control to what on-premise devices can deliver, but also that there can be commercial advantages to switching to them, even if a customer is currently running an on-premise device and has yet to fully depreciate its cost Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 6

7 TCO is simpler to calculate, and frequently lower, for cloud The survey also set out for insight into the total cost of ownership (TCO) of a WAF, be it on-premise or in the cloud. We asked those with on-premise devices what they are paying (generally calculated on a monthly basis for a pre-agreed volume of throughput), as well as what they are paying for maintenance. There was a variety of answers to the question regarding how many WAF boxes those with on-premise solutions were running, ranging from one all the way to 17, but because all respondents are paying on a per-month basis for a given level of throughput, Ovum did not factor these answers into any calculations. For those running on-premise devices, the survey asked whether a load-balancing capability was included in the purchase price, since clearly, if it wasn t, it would bring the overall price down but would mean that the customer would probably need to make other arrangements for load balancing, with the concomitant extra cost that that would imply. Just over half of those with on-premise WAFs said they did buy load balancing as part of the package. The survey also asked whether they employ a full-time member of staff dedicated to managing the WAF, updating its rules, and so on. If they did, we further asked them how much they are paying that person, because this must also be factored into the TCO calculation. Another question for the on-premise WAF customers was what their policy was regarding depreciation of the asset, and over what time period they carried out the depreciation in their financial reporting. The answers here varied considerably, from three months at one end of the spectrum to seven years at the other, but most respondents depreciate over somewhere between two and five years. For cloud-based WAF users, we asked what they were paying monthly for the service, as well as the questions about a staffer dedicated to WAF management. Monthly salaries varied greatly from one country to another, but the average across all those who answered (36% of respondents) was $3,382 a month. Calculating an average TCO proved challenging. On the on-premise side, very few of the respondents knew both the monthly throughput and the monetary consideration their company was paying for it, making it hard to compare them, or to come up with an average figure. For those that did know both figures, Ovum calculated an average cost of $3,754 for a throughput of 2.25Gbps. Not surprisingly, the monthly remuneration at the companies that had a full-time employee looking after their WAF also varied hugely. At one extreme, an Indian company said it was paying its staffer just over $160 a month on a WAF handling an undisclosed volume of traffic. At the other, a German respondent is paying someone 5,000 a month on a WAF handling some 4Mbps of traffic. Turning to the respondents with cloud-based WAFs, they all said they have a staff member dedicated to managing the service. While half of them declined to reveal the salary involved, Ovum calculated an average for those that did reply of $6,019 a month. What all the cloud-based respondents have in common is that they do not pay their WAF provider for maintenance, which among the on-premise WAF users varied from $100 a month to $2,500 a month, with both these respondents based in the US Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 7

8 The cost of on-premise and cloud-based WAF Source: Ovum and industry sources Appendix Methodology Ovum conducted 50 interviews with IT decision-makers across North America, Europe, and Asia- Pacific. The survey was run in December 2014 via a telephone interview methodology. Of the 300 respondents approached, 50 qualified to be interviewed. Qualification criteria was based on a representative spread of geography and industry. Geographically, the interviews were split 20 North America, 20 Europe, and 10 Asia-Pacific. While no industry quotas were imposed, no single sector accounts for more than 20% of the total number of respondents. Author Rik Turner, Senior Analyst, Infrastructure Solutions [email protected] 2014 Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 8

9 Ovum Consulting We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at [email protected]. Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard - readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 9

10 CONTACT US INTERNATIONAL OFFICES Beijing Dubai Hong Kong Hyderabad Johannesburg London Melbourne New York San Francisco Sao Paulo Tokyo 2014 Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 10

On the Radar: CipherCloud

On the Radar: CipherCloud Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

Financial services perspectives on the role and real impact of cloud

Financial services perspectives on the role and real impact of cloud Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions

More information

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst

More information

SWOT Assessment: BMC Remedy v9

SWOT Assessment: BMC Remedy v9 SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an

More information

SWOT Assessment: Alfresco, Alfresco One, v5.0

SWOT Assessment: Alfresco, Alfresco One, v5.0 SWOT Assessment: Alfresco, Alfresco One, v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: May 5 th, 2015 Product code: IT0014-003012 Sue Clarke Summary Catalyst When

More information

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett

More information

Case Study: Vitamix. Improving strategic business integration using IT service management practices and technology

Case Study: Vitamix. Improving strategic business integration using IT service management practices and technology Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver

More information

On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.

On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934. Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.

More information

Enterprise Content Management: The Suite Perspective

Enterprise Content Management: The Suite Perspective Enterprise Content Management: The Suite Perspective Publication Date: 04 Dec 2015 Product code: IT0014-003079 Sue Clarke Summary Catalyst The Ovum Decision Matrix: Selecting an Enterprise Content Management

More information

The Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers

The Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers The Future of Payments 2015: Financial Institutions The Payments Value Chain is Driven by Customers 1 Catalyst Payments Are at a Crossroads The payments market is changing. From cash to checks, to charge

More information

On the Radar: ForgeRock

On the Radar: ForgeRock Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology

More information

2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity

2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity 2015 Global Payments Insight: Bill Pay Services With big change comes big opportunity Catalyst Payments are at a crossroads The payments market is changing. From cash to checks, to charge and credit cards,

More information

HP s revitalized workforce optimization suite is worth a fresh look

HP s revitalized workforce optimization suite is worth a fresh look HP s revitalized workforce optimization suite is worth a fresh look Publication Date: 27 Jul 2015 Product code: IT0020-000139 Keith Dawson Ovum view Summary When contact center buyers look to acquire workforce

More information

On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access

On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access Summary Catalyst As organizations widen their net and analyze more data sources, it becomes all too easy for business

More information

Winning with Emerging CRM Channels. An Ovum White Paper

Winning with Emerging CRM Channels. An Ovum White Paper Winning with Emerging CRM Channels An Ovum White Paper Introduction If there has been one constant over the past five years, it is the shift in how consumers interact not just with each other, but how

More information

Data Center Automation: Market Landscape and Maturity Model

Data Center Automation: Market Landscape and Maturity Model Data Center Automation: Market Landscape and Maturity Model Assessing the organizational readiness and market in data center automation Publication Date: 16 Dec 2015 Product code: IT0022-000569 Roy Illsley

More information

2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience

2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience 2016 Global Payments Insight Survey: Merchants and Retailers Changing the merchant experience 1 Catalyst Payment players need to rethink roles and relationships The payments industry has always been an

More information

How To Rank Customer Analytics Vendors

How To Rank Customer Analytics Vendors Ovum Decision Matrix: Selecting a Customer Analytics Solution for Telcos, 2015 16 Publication Date: 10 Sep 2015 Product code: IT0012-000135 Adaora Okeleke Summary Catalyst Telcos quest for a competitive

More information

How To Understand The Implications Of Outsourced Testing

How To Understand The Implications Of Outsourced Testing Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 2015 Author: Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced testing of software applications, in which

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

The Critical Impact of Cloud for Insurance on Business Transformation

The Critical Impact of Cloud for Insurance on Business Transformation The Critical Impact of Cloud for Insurance on Business Transformation Charles Juniper, Senior Insurance Analyst Executive summary Cloud technology and its role within the insurance industry has generated

More information

Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16

Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Publication Date: 29 Jul 2015 Product code: IT0022-000410 Roy Illsley Summary Catalyst The role and purpose

More information

2010-2014. Sample Global Network Security Market. 1 technavio insights

2010-2014. Sample Global Network Security Market. 1 technavio insights 1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts

More information

SWOT Assessment: FireMon Security Manager Suite v7.0

SWOT Assessment: FireMon Security Manager Suite v7.0 SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY

More information

Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15

Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Publication Date: 06 Jan 2015 Product code: IT0019-003398 Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced

More information

OSS/BSS market overview and vendor landscape, 2Q13-1Q14

OSS/BSS market overview and vendor landscape, 2Q13-1Q14 www.ovum.com OSS/BSS market overview and vendor landscape, 2Q13-1Q14 Market overview 2 Publicly announced OSS/BSS contracts, 2Q13 1Q14 Source: Ovum 3 The global OSS/BSS market, 2Q13 1Q14 Overall, the number

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

On the Radar: Truphone

On the Radar: Truphone Publication Date: 05 Sep 2013 Product code: TE007-000702 Pauline Trotter SUMMARY In a nutshell Truphone started out as a mobile VoIP player, but is mostly known as a specialist that has concentrated on

More information

Healthcare Security and HIPAA Compliance with A10

Healthcare Security and HIPAA Compliance with A10 WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308

More information

How To Get Value From Data In An Enterprise Business

How To Get Value From Data In An Enterprise Business Thriving in the Age of Big Data Analytics and Self-Service The new shape of BI Tom Pringle, Surya Mukherjee & Tony Baer Table of contents Executive Summary... 3 The new age of analytics and Oracle... 3

More information

How To Understand The Internet Of Things

How To Understand The Internet Of Things www.ovum.com The Internet of Things: Understanding the evolving value chain Jamie Moss, Senior Analyst, Consumer Technology & IoT Gary Barnett, Chief Analyst, Software, Ovum Ovum s Internet of Things (IoT)

More information

On the Case: HCL News Corp (News UK)

On the Case: HCL News Corp (News UK) On the Case: HCL News Corp (News UK) HCL s feasibility assessment framework reduces cloud migration complexities Publication Date: 28 Nov 2014 Product code: IT0021-000045 Kedar Mohite Summary Catalyst

More information

CA Service Management Solutions 14.1

CA Service Management Solutions 14.1 CA Service Management Solutions 14.1 CA Technologies Publication Date: 06 Apr 2016 Product code: IT0022-000623 Adam Holtby Summary Catalyst IT functions are subject not only to the enterprise-wide mandate

More information

Global Web Application Firewall Market 2015-2019

Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Global Web Application Firewall Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports from

More information

www.ovum.com LTE450 Julian Bright, Senior Analyst [email protected] LTE450 Global Seminar 2014 Copyright Ovum 2014. All rights reserved.

www.ovum.com LTE450 Julian Bright, Senior Analyst Julian.bright@ovum.com LTE450 Global Seminar 2014 Copyright Ovum 2014. All rights reserved. www.ovum.com LTE450 Julian Bright, Senior Analyst [email protected] LTE450 Global Seminar 2014 We are integrating 2 complementary ITM businesses Telecoms & IT Research Telecoms & Media Research 60+

More information

PCI DSS and the A10 Solution

PCI DSS and the A10 Solution WHITE PAPER PCI DSS and the A10 Solution How Cloud Service Providers Can Achieve PCI Compliance with A10 Thunder ADC and vthunder Table of Contents The Challenge of PCI Compliance... 3 Overview of PCI

More information

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

White Paper A10 Thunder and AX Series Load Balancing Security Gateways White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its

More information

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER

More information

Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au

Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

SWOT Assessment: CoreMedia, CoreMedia 7

SWOT Assessment: CoreMedia, CoreMedia 7 SWOT Assessment: CoreMedia, CoreMedia 7 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002848 Publication Date: 09 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Web

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

On the Radar: NextPlane

On the Radar: NextPlane On the Radar: NextPlane Unified communications federation delivered via the cloud Reference Code: IT016-001534 Publication Date: 24 Sep 2013 Author: Saurabh Sharma SUMMARY Catalyst NextPlane UC Exchange

More information

DNS Server Security Survey

DNS Server Security Survey EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online

More information

PCI DSS and the A10 Solution

PCI DSS and the A10 Solution White Paper A10 Thunder Series PCI DSS and the A10 Solution For cloud service providers, A10 s Thunder Series & AX Series appliances and SoftAX are the first step towards PCI compliance, allowing you to

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

CA Performance Management Solution for Communications Service Providers

CA Performance Management Solution for Communications Service Providers CA Performance Management Solution for Communications Service Providers CA Technologies Publication Date: 23 Mar 2015 Product code: IT0012-000102 Peter Dykes Summary Catalyst Flexible and cost-effective

More information

Telstra s Symphony Initiative: Redefining the Enterprise Customer Experience with SDN/NFV

Telstra s Symphony Initiative: Redefining the Enterprise Customer Experience with SDN/NFV Telstra s Symphony Initiative: Redefining the Enterprise Customer Experience with SDN/NFV Publication Date: 15 Oct 2015 Product code: TE0005-000752 David Molony Summary In brief Ovum has seen the first

More information

SWOT Assessment: Eccentex AppBase v5.0

SWOT Assessment: Eccentex AppBase v5.0 SWOT Assessment: Eccentex AppBase v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002764 Publication Date: 29 Jul 2013 Author: Sue Clarke SUMMARY Catalyst Eccentex

More information

Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15

Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15 Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15 Publication Date: 17 Sep 2014 Product code: IT0021-000023 Richard Absalom Summary Catalyst Organizations of all shapes

More information

Case Study: Unifying ITSM Practices and Technology

Case Study: Unifying ITSM Practices and Technology Case Study: Unifying ITSM Practices and Technology SBM Offshore Reference Code: EI025-000007 Publication Date: 17 Jun 2014 Author: Adam Holtby SUMMARY Catalyst As a result of corporate expansions, mergers,

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

SWOT Assessment: dotcms dotcms v2.5

SWOT Assessment: dotcms dotcms v2.5 SWOT Assessment: dotcms dotcms v2.5 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002855 Publication Date: 13 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Traditional

More information

4 Delivers over 20,000 SSL connections per second (cps), which

4 Delivers over 20,000 SSL connections per second (cps), which April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation

More information

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Importance of Web Application Firewall Technology for Protecting Web-based Resources Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,

More information

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution White Paper and Cenzic Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution Website Testing / Vulnerability Scanning (Cenzic) & Web Application Firewall (Citrix) www.citrix.com

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

WEB APPLICATION VULNERABILITY STATISTICS (2013)

WEB APPLICATION VULNERABILITY STATISTICS (2013) WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most

More information

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market May 2015 1 Contents Section Slide Number Executive Summary 3 Market Overview 9 Total Web

More information

Transforming Asset Information Management

Transforming Asset Information Management Transforming Asset Information Management How integrated information management throughout the asset lifecycle cuts costs and improves reliability and safety Summary Catalyst For decades, the fragmentation

More information

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet

More information

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1 Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5

More information

ADC Survey GLOBAL FINDINGS

ADC Survey GLOBAL FINDINGS ADC Survey GLOBAL FINDINGS CONTENTS Executive Summary...4 Methodology....8 Finding 1: Attacks Getting More Difficult to Defend... 10 Finding 2: Attacks Driving High Costs to Organizations.... 14 Finding

More information

Auditing the Security of an SAP HANA Implementation

Auditing the Security of an SAP HANA Implementation Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen

More information

How To Protect Your Employees From Being Hacked By A Corporate Firewall

How To Protect Your Employees From Being Hacked By A Corporate Firewall The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study

More information

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business 6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web

More information

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information

10 Things Every Web Application Firewall Should Provide Share this ebook

10 Things Every Web Application Firewall Should Provide Share this ebook The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security

More information

Ovum Decision Matrix: Selecting a Multichannel Cloud Contact Center Solution, 2015 16

Ovum Decision Matrix: Selecting a Multichannel Cloud Contact Center Solution, 2015 16 Ovum Decision Matrix: Selecting a Multichannel Cloud Contact Center Solution, 2015 16 Publication Date: 04 Aug 2015 Product code: IT0020-000140 Aphrodite Brinsmead This is a licensed extract from published

More information

The State of Application Delivery in 2015

The State of Application Delivery in 2015 The State of Application Delivery in 2015 a report by F5 f5.com/soad 1 Introduction F5 surveyed customers from more than 300 organizations (of all sizes) across a broad spectrum of vertical markets such

More information

The New PCI Requirement: Application Firewall vs. Code Review

The New PCI Requirement: Application Firewall vs. Code Review The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security

More information