SlideShare a Scribd company logo
©2023 OPSWAT, Inc. Proprietary and Confidential
OPSWAT and F5/NGINX:
Layered Security to
Protect Web Applications
OPSWAT / F5/NGINX Webinar
Wednesday, January 25, 2023
Adam Rocker & Damian Curry
Prepared for:
Prepared by:
©2023 OPSWAT, Inc. Proprietary and Confidential
We Protect the World’s
Critical Infrastructure
OUR MISSION
20 Years of Cybersecurity
Innovation and Growth
Critical Infrastructure Protection
Professional Services OEM Enterprise
Best Solution – Web Application Security
"OPSWAT embodies three
major features we judges
look for to become
winners: understanding
tomorrow’s threats, today,
providing a cost-effective
solution and innovating in
unexpected ways that can
help mitigate cyber risk
and get one step ahead of
the next breach."
OPSWAT and F5 Partnership
https://www.opswat.com/videos/how-to-integrate-
metadefender-icap-with-f5
OEM Partner since 2005 (OESIS)
ICAP Integration Partner since 2017
John Wagnon
Pete Silva
App Security:
Risks and Challenges
Application Security: Growth, Needs, and Challenges
Notables CIP Incidents – 2021/2022
Data courtesy: Industrial Cyber, Takepoint Research
Oldsmar water
treatment plant hack
Water & Waste
Colonial
Pipeline targeted
by DarkSide ransomwar
e hackers
Pipelines
Cyberattack Disrupts
Operations At Molson
Coors
Food & Agriculture
KIA core systems were
shut down by a
suspected
DoppelPaymer
ransomware attack
Automotive
Elekta was hit by a
ransomware attack
Healthcare
Application Security – Shared Concerns
© Copyright OPSWAT 2021. All rights reserved.
34%
28%
40%
46%
54%
66%
54%
38%
45%
50%
59%
62%
66%
73%
0% 20% 40% 60% 80%
Post outbreak
mitigation expenses
Lawsuits
Regulatory fines
Ransomware payouts
Denial of
service/infrastructure
Reputation damage
Loss in business or
revenue
By Location of Corporate Headquarters
United States
Other Countries
Application Security – Shared Responsibility
Same as with a CSP, cybersecurity responsibilities exist between
various security solutions and vendors
Application Security: The Blind Spots
1/3 of organizations with a web application for file uploads do not scan all file uploads to
detect malicious files.
1/5 of these organizations scan with just one anti-virus engine.
2/3 of organizations with a file upload web portal do not sanitize file uploads with Content
Disarm and Reconstruct (CDR) to prevent unknown malware and Zero-day attacks.
32%
18%
65%
Blind Spots galore!
Please rate your organization’s level of implementation for each of the following file
upload security best practices.
30%
32%
46%
52%
53%
54%
61%
61%
64%
71%
32%
33%
37%
31%
31%
33%
27%
25%
27%
22%
27%
31%
12%
12%
13%
12%
11%
9%
7%
6%
10%
4%
5%
5%
3%
1%
2%
4%
2%
1%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Remove embedded threats with Content Disarm and
Reconstruction Technology (CDR)
Randomize uploaded file names
Verify actual file type versus relying on the extension
Use simple error messages – e.g., excluding information like
directory paths that can be used to gain system entry
Set a maximum file name length and size
Check files for vulnerabilities
Limit the specific types of files that can be uploaded
Store uploaded files outside the web root folder
Scan all files for malware
Authenticate users
Fully implemented
Partially implemented
Not implemented
I don't know
© Copyright OPSWAT 2021. All rights reserved.
Blind Spot: Data Sanitization (prevent zero-day)
Does your company use CDR (Content Disarm and Reconstruction) for data sanitization to
disarm embedded threats (e.g., macros in word documents or scripts in pdfs)?
35%
37%
16%
12% Yes
No
I’ve never heard of CDR
I've heard of CDR, but don't know if my
company uses it
Application Security Compliance Mandates
© Copyright OPSWAT 2021. All rights reserved.
ISO 27001
Applies nearly universally
• Annex: A.12.2 Scan for malware before
using any files received via networks or
any storage device
PCI DSS
Payment Card Industry Data
Security Standard
Applies to any company handling
payment data
• PCI DSS Requirement 5: Protect all
systems against malware and update
anti-virus software or programs regularly
HIPAA
The Health Insurance Portability and
Accountability Act of 1996
Applies to Healthcare and insurance
providers and their business
associates, or any partner entity
accessing patient health information
(PHI)
§ 164.308(a)(5)(ii)(B) Protection from
Malicious Software
NERC CIP
North American Electric Reliability
Critical Infrastructure Protection
Applies to all US energy providers
• CIP-007-6 – Malicious Code Prevention
NIST 800-53
Applies to all U.S. Federal
information systems
• SI-3 Malicious Code Protection
Others:
GDPR
General Data Protection
Regulation
FISMA
Federal Information Security
Management Act of 2002
Security Infrastructure & Platform Integrations
Which deployment stack would you like to have plug-and-play security integrations for?
n = would benefit from plug and play solutions
Google, Oracle, Java,
Zscaler, Netscope
Other
2%
6%
8%
35%
37%
48%
74%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other. Please specify:
A10
Envoy
Nginx
F5
Citrix
VMware
61% choose one of
F5 or Nginx
(16% choose both)
© Copyright OPSWAT 2021. All rights reserved.
App Security:
Technologies
MetaDefender Core™
Technology Platform
Challenges
File-based evasive malware and zero-day attacks
Sensitive data leakage and staying compliant
Too many security tools and technologies
Complex systems, few qualified professionals
Solution
Inspect all incoming files for malware
Data sanitization to prevent zero-day attacks
Detect and manage sensitive information in files
Multiple security technologies in a single platform
Application Security
MetaDefender Core™
Technology Platform
Benefits
Malware protection and data breach prevention
Protect sensitive data in files
Comprehensive, easy-to-integrate platform
Features
Multiscanning with 30+ AV engines
Deep CDR (Content Disarm and Reconstruction)
Proactive DLP (Data Loss Prevention)
Wide file type support including nested archives
Application Security
MetaDefender ICAP™
Benefits
Out-of-the-box integration into
existing infrastructure, fast setup and POC
Comprehensive security and data
protection technologies, additive security
Low overhead maintenance
Features
All MetaDefender Core platform technologies
Integrates with any ICAP-enabled
device (secure gateway, proxies, WAF, SSL
inspectors)
Native integration with NGINX Plus and NGINX
Open Source
Application Security
Why NGINX?
What is NGINX?
§ Fastest web server available
§ Started open source, now part of F5
§ HA, health monitoring, DNS system
discovery
§ RESTful API, cloud native
§ Load balancer, reverse proxy
§ API gateway, media streaming
Use Cases:
§ Follows traditional ICAP use cases
§ Custom web apps with file upload capability
§ Migrating to the cloud
§ Cloud-native, containers, k8s
Multiscanning
• Combine 30+ commercial anti-
malware engines into one
platform for faster detection
• Combine analysis
mechanisms/techniques
(Signatures, Heuristics, AI/ML,
Emulation, etc.) to increase
detection ratio
• Detection optimization and
normalization
• Complements AV on endpoint
Multiple layers of defense
How It Works
OPSWAT Metascan
Simultaneous analysis with multiple anti-malware engines
• 30+ commercial anti-malware engines in one solution
• Combined analysis based on signatures, heuristics, AI/ML,
algorithms, emulation, and NGAV accelerates detection of
new and evolving malware
• Improved malware detection rate ~100%
• Faster outbreak detection- proactive defense-in-depth
dramatically reduces Mean Time to Detect (MTTD)
• Lower false positives
Adding more anti-malware engines increases detection rates to nearly 100% and reduces Mean Time to Detect (MTTD) by 25%
4 Engines 8 Engines 12 Engines 16 Engines 20 Engines Max Engines
Detection 88.70% 90.70% 92.70% 95.20% 95.70% 99.40%
MTTD (hours) 132.32 115.2 107.76 102.48 100.54
88.70%
90.70%
92.70%
95.20% 95.70%
99.40%
132.32
115.2
107.76
102.48 100.54
0
20
40
60
80
100
120
140
60.00%
65.00%
70.00%
75.00%
80.00%
85.00%
90.00%
95.00%
100.00%
Detection of top 10000 threats
Source: https://metadefender.opswat.com, September 2021
© Copyright OPSWAT 2021. All rights reserved.
• Proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD)
• Combined application of proprietary technologies (heuristics, AI/ML, algorithms per vendor accelerates discovery of new and evolving
malware
Improved Malware Detection through Multiscanning
Deep CDR
How It Works
Verify file type and identify all
active embedded content in
file
IDENTIFY & SCAN
Remove all the potentially malicious
content and reconstruct the file with
only legitimate components
SANITIZE (DEEP CDR)
Generate a threat-free file
with full functionality and
quarantine the original file
USE
Deep CDR
• Supports 120+ file types (including
many regional-specific Office Suites,
such as Hancom and Ichitaro)
• 200+ conversion options
• Verify 4,500+ file types
• 50+ detailed configuration for
different file types
• Maintains file usability
• Achieves fast sanitization without
impacting performance
How It Works
Recursive Sanitization
• Embedded documents in a document
• Archives inside an archive
• Attachments in an email
• Real Archives
• TAR / ZIP / RAR / CAB
• Common files
• Office Suite (docx, xlsx, pptx, etc.)
• PDF
• Images (jpg, png, bmp, etc.)
How CDR Works
Examples
Deep CDR
Malware Features Solution Result
BLINDINGCAN
North Korea
• Reported by FBI/CISA in Aug 2020,
• use Attached Template to link to a malicious file
Deep CDR removes
all linked files
No malware
downloaded
Locky
ransomware
attack
• Delivered by email with an attached MS Word file containing
malicious macro
• Enabled macro drops the malware
• The malware detects whether it is running within a virtual
machine or a physical machine and relocate of instruction code.
Deep CDR removes
Macros
No malware
downloaded
Cobalt Strike
Backdoor
• Exploited MS vulnerabilities CVE-2021-40444
• Docx file contains an ActiveX object to download an HTML file
• HTML file downloads several files and Cobalt Strike malware
payload
Deep CDR removes
OLE objects
No shellcode
dropped
Proactive DLP
How It Works
Detect and Redact Watermark Remove Metadata
Proactive DLP
Highlights
• Supported sensitive information:
• Social Security Numbers
• Credit Card Numbers
• IPv4 addresses
• Classless Inter-Domain Routing (CIDR)
• Custom Regular Expressions (RegEx)
• Optical Character Recognition (OCR)
• Recursive detection
• More than 70 supported file types
• Individualized certainty level for each type of
sensitive information
• Advanced detection policy
How It Works
MetaDefender Core™
Deployment Options
Deployments
MetaDefender Core integrates with your
existing security architecture via REST API
MetaDefender Core Container deploys in
your containerization environments such as
Docker and Kubernetes
MetaDefender Cloud integrates with
IaaS environments like AWS, or with your existing
SaaS products like Salesforce for cloud-based
analysis.
MetaDefender ICAP Server integrates with
web apps (via Ingress, WAF, LB or API Gateway) or
Storage (NAS)
Application Security
Zero Trust
It’s a journey, not a destination
Technology
Better together! The F5/NGINX/OPSWAT
combination moves the needle when
implementing zero trust
©2023 OPSWAT, Inc. Proprietary and Confidential
Thank You!
Ad

More Related Content

What's hot (20)

Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
Maganathin Veeraragaloo
 
OpenTelemetry 101 FTW
OpenTelemetry 101 FTWOpenTelemetry 101 FTW
OpenTelemetry 101 FTW
NGINX, Inc.
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
apidays
 
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019 높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
Amazon Web Services Korea
 
1시간으로 끝내는 클라우드 개념_김민형 클라우드 솔루션 아키텍트
1시간으로 끝내는 클라우드 개념_김민형 클라우드 솔루션 아키텍트1시간으로 끝내는 클라우드 개념_김민형 클라우드 솔루션 아키텍트
1시간으로 끝내는 클라우드 개념_김민형 클라우드 솔루션 아키텍트
NAVER CLOUD PLATFORMㅣ네이버 클라우드 플랫폼
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Flink Forward
 
Understand your system like never before with OpenTelemetry, Grafana, and Pro...
Understand your system like never before with OpenTelemetry, Grafana, and Pro...Understand your system like never before with OpenTelemetry, Grafana, and Pro...
Understand your system like never before with OpenTelemetry, Grafana, and Pro...
LibbySchulze
 
클라우드 컴퓨팅 기본 사항 (Fundamentals)
클라우드 컴퓨팅 기본 사항 (Fundamentals)클라우드 컴퓨팅 기본 사항 (Fundamentals)
클라우드 컴퓨팅 기본 사항 (Fundamentals)
Ian Choi
 
Open shift 4 infra deep dive
Open shift 4    infra deep diveOpen shift 4    infra deep dive
Open shift 4 infra deep dive
Winton Winton
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?
Fermat Jade
 
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...
LibbySchulze
 
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
BESPIN GLOBAL
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays
 
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon Web Services Korea
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overview
gjuljo
 
Aws 101 A walk-through the aws cloud (2013)
Aws 101  A walk-through the aws cloud (2013)Aws 101  A walk-through the aws cloud (2013)
Aws 101 A walk-through the aws cloud (2013)
Martin Yan
 
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Web Services Korea
 
Edge architecture ieee international conference on cloud engineering
Edge architecture   ieee international conference on cloud engineeringEdge architecture   ieee international conference on cloud engineering
Edge architecture ieee international conference on cloud engineering
Mikey Cohen - Hiring Amazing Engineers
 
OpenTelemetry 101 FTW
OpenTelemetry 101 FTWOpenTelemetry 101 FTW
OpenTelemetry 101 FTW
NGINX, Inc.
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
apidays
 
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019 높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
높은 가용성과 성능 향상을 위한 ElastiCache 활용 팁 - 임근택, SendBird :: AWS Summit Seoul 2019
Amazon Web Services Korea
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Streaming Event Time Partitioning with Apache Flink and Apache Iceberg - Juli...
Flink Forward
 
Understand your system like never before with OpenTelemetry, Grafana, and Pro...
Understand your system like never before with OpenTelemetry, Grafana, and Pro...Understand your system like never before with OpenTelemetry, Grafana, and Pro...
Understand your system like never before with OpenTelemetry, Grafana, and Pro...
LibbySchulze
 
클라우드 컴퓨팅 기본 사항 (Fundamentals)
클라우드 컴퓨팅 기본 사항 (Fundamentals)클라우드 컴퓨팅 기본 사항 (Fundamentals)
클라우드 컴퓨팅 기본 사항 (Fundamentals)
Ian Choi
 
Open shift 4 infra deep dive
Open shift 4    infra deep diveOpen shift 4    infra deep dive
Open shift 4 infra deep dive
Winton Winton
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?
Fermat Jade
 
Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...Intro to open source observability with grafana, prometheus, loki, and tempo(...
Intro to open source observability with grafana, prometheus, loki, and tempo(...
LibbySchulze
 
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
AWS 상의 컨테이너 서비스 소개 ECS, EKS - 이종립 / Principle Enterprise Evangelist @베스핀글로벌
BESPIN GLOBAL
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays
 
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon VPC와 ELB/Direct Connect/VPN 알아보기 - 김세준, AWS 솔루션즈 아키텍트
Amazon Web Services Korea
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overview
gjuljo
 
Aws 101 A walk-through the aws cloud (2013)
Aws 101  A walk-through the aws cloud (2013)Aws 101  A walk-through the aws cloud (2013)
Aws 101 A walk-through the aws cloud (2013)
Martin Yan
 
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Amazon Web Services Korea
 

Similar to Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX (20)

How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
OPSWAT
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Dinis Cruz
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
Thomas Springer
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
Jason Sohn
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
Luca Simonelli
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
Ivanti
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
CSO_Presentations
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
Tu Pham
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Denim Group
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical InfrastructureUsing Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
OPSWAT
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Dinis Cruz
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
Jason Sohn
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
Ivanti
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
Tu Pham
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Denim Group
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Ad

More from NGINX, Inc. (20)

【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
NGINX, Inc.
 
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
NGINX, Inc.
 
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
NGINX, Inc.
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
NGINX, Inc.
 
Managing Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & KubecostManaging Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & Kubecost
NGINX, Inc.
 
Manage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with ObservabilityManage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with Observability
NGINX, Inc.
 
Accelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with AutomationAccelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with Automation
NGINX, Inc.
 
Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101
NGINX, Inc.
 
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices ArchitecturesUnit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
NGINX, Inc.
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX, Inc.
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
NGINX, Inc.
 
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINX, Inc.
 
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
NGINX, Inc.
 
Protecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINXProtecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINX
NGINX, Inc.
 
NGINX Kubernetes API
NGINX Kubernetes APINGINX Kubernetes API
NGINX Kubernetes API
NGINX, Inc.
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
NGINX, Inc.
 
Installing and Configuring NGINX Open Source
Installing and Configuring NGINX Open SourceInstalling and Configuring NGINX Open Source
Installing and Configuring NGINX Open Source
NGINX, Inc.
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
NGINX, Inc.
 
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptxHow to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
NGINX, Inc.
 
Kubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティKubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティ
NGINX, Inc.
 
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
【NGINXセミナー】 Ingressを使ってマイクロサービスの運用を楽にする方法
NGINX, Inc.
 
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
【NGINXセミナー】 NGINXのWAFとは?その使い方と設定方法 解説セミナー
NGINX, Inc.
 
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
【NGINXセミナー】API ゲートウェイとしてのNGINX Plus活用方法
NGINX, Inc.
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
NGINX, Inc.
 
Managing Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & KubecostManaging Kubernetes Cost and Performance with NGINX & Kubecost
Managing Kubernetes Cost and Performance with NGINX & Kubecost
NGINX, Inc.
 
Manage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with ObservabilityManage Microservices Chaos and Complexity with Observability
Manage Microservices Chaos and Complexity with Observability
NGINX, Inc.
 
Accelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with AutomationAccelerate Microservices Deployments with Automation
Accelerate Microservices Deployments with Automation
NGINX, Inc.
 
Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101Unit 2: Microservices Secrets Management 101
Unit 2: Microservices Secrets Management 101
NGINX, Inc.
 
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices ArchitecturesUnit 1: Apply the Twelve-Factor App to Microservices Architectures
Unit 1: Apply the Twelve-Factor App to Microservices Architectures
NGINX, Inc.
 
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX基本セミナー(セキュリティ編)~NGINXでセキュアなプラットフォームを実現する方法!
NGINX, Inc.
 
Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
NGINX, Inc.
 
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINXセミナー(基本編)~いまさら聞けないNGINXコンフィグなど基本がわかる!
NGINX, Inc.
 
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
Install and Configure NGINX Unit, the Universal Application, Web, and Proxy S...
NGINX, Inc.
 
Protecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINXProtecting Apps from Hacks in Kubernetes with NGINX
Protecting Apps from Hacks in Kubernetes with NGINX
NGINX, Inc.
 
NGINX Kubernetes API
NGINX Kubernetes APINGINX Kubernetes API
NGINX Kubernetes API
NGINX, Inc.
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
NGINX, Inc.
 
Installing and Configuring NGINX Open Source
Installing and Configuring NGINX Open SourceInstalling and Configuring NGINX Open Source
Installing and Configuring NGINX Open Source
NGINX, Inc.
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
NGINX, Inc.
 
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptxHow to Avoid the Top 5 NGINX Configuration Mistakes.pptx
How to Avoid the Top 5 NGINX Configuration Mistakes.pptx
NGINX, Inc.
 
Kubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティKubernetes環境で実現するWebアプリケーションセキュリティ
Kubernetes環境で実現するWebアプリケーションセキュリティ
NGINX, Inc.
 
Ad

Recently uploaded (20)

PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 

Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX

  • 1. ©2023 OPSWAT, Inc. Proprietary and Confidential OPSWAT and F5/NGINX: Layered Security to Protect Web Applications OPSWAT / F5/NGINX Webinar Wednesday, January 25, 2023 Adam Rocker & Damian Curry Prepared for: Prepared by:
  • 2. ©2023 OPSWAT, Inc. Proprietary and Confidential We Protect the World’s Critical Infrastructure OUR MISSION
  • 3. 20 Years of Cybersecurity Innovation and Growth Critical Infrastructure Protection Professional Services OEM Enterprise
  • 4. Best Solution – Web Application Security "OPSWAT embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach."
  • 5. OPSWAT and F5 Partnership https://www.opswat.com/videos/how-to-integrate- metadefender-icap-with-f5 OEM Partner since 2005 (OESIS) ICAP Integration Partner since 2017 John Wagnon Pete Silva
  • 7. Application Security: Growth, Needs, and Challenges
  • 8. Notables CIP Incidents – 2021/2022 Data courtesy: Industrial Cyber, Takepoint Research Oldsmar water treatment plant hack Water & Waste Colonial Pipeline targeted by DarkSide ransomwar e hackers Pipelines Cyberattack Disrupts Operations At Molson Coors Food & Agriculture KIA core systems were shut down by a suspected DoppelPaymer ransomware attack Automotive Elekta was hit by a ransomware attack Healthcare
  • 9. Application Security – Shared Concerns © Copyright OPSWAT 2021. All rights reserved. 34% 28% 40% 46% 54% 66% 54% 38% 45% 50% 59% 62% 66% 73% 0% 20% 40% 60% 80% Post outbreak mitigation expenses Lawsuits Regulatory fines Ransomware payouts Denial of service/infrastructure Reputation damage Loss in business or revenue By Location of Corporate Headquarters United States Other Countries
  • 10. Application Security – Shared Responsibility Same as with a CSP, cybersecurity responsibilities exist between various security solutions and vendors
  • 11. Application Security: The Blind Spots 1/3 of organizations with a web application for file uploads do not scan all file uploads to detect malicious files. 1/5 of these organizations scan with just one anti-virus engine. 2/3 of organizations with a file upload web portal do not sanitize file uploads with Content Disarm and Reconstruct (CDR) to prevent unknown malware and Zero-day attacks. 32% 18% 65%
  • 12. Blind Spots galore! Please rate your organization’s level of implementation for each of the following file upload security best practices. 30% 32% 46% 52% 53% 54% 61% 61% 64% 71% 32% 33% 37% 31% 31% 33% 27% 25% 27% 22% 27% 31% 12% 12% 13% 12% 11% 9% 7% 6% 10% 4% 5% 5% 3% 1% 2% 4% 2% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Remove embedded threats with Content Disarm and Reconstruction Technology (CDR) Randomize uploaded file names Verify actual file type versus relying on the extension Use simple error messages – e.g., excluding information like directory paths that can be used to gain system entry Set a maximum file name length and size Check files for vulnerabilities Limit the specific types of files that can be uploaded Store uploaded files outside the web root folder Scan all files for malware Authenticate users Fully implemented Partially implemented Not implemented I don't know © Copyright OPSWAT 2021. All rights reserved.
  • 13. Blind Spot: Data Sanitization (prevent zero-day) Does your company use CDR (Content Disarm and Reconstruction) for data sanitization to disarm embedded threats (e.g., macros in word documents or scripts in pdfs)? 35% 37% 16% 12% Yes No I’ve never heard of CDR I've heard of CDR, but don't know if my company uses it
  • 14. Application Security Compliance Mandates © Copyright OPSWAT 2021. All rights reserved. ISO 27001 Applies nearly universally • Annex: A.12.2 Scan for malware before using any files received via networks or any storage device PCI DSS Payment Card Industry Data Security Standard Applies to any company handling payment data • PCI DSS Requirement 5: Protect all systems against malware and update anti-virus software or programs regularly HIPAA The Health Insurance Portability and Accountability Act of 1996 Applies to Healthcare and insurance providers and their business associates, or any partner entity accessing patient health information (PHI) § 164.308(a)(5)(ii)(B) Protection from Malicious Software NERC CIP North American Electric Reliability Critical Infrastructure Protection Applies to all US energy providers • CIP-007-6 – Malicious Code Prevention NIST 800-53 Applies to all U.S. Federal information systems • SI-3 Malicious Code Protection Others: GDPR General Data Protection Regulation FISMA Federal Information Security Management Act of 2002
  • 15. Security Infrastructure & Platform Integrations Which deployment stack would you like to have plug-and-play security integrations for? n = would benefit from plug and play solutions Google, Oracle, Java, Zscaler, Netscope Other 2% 6% 8% 35% 37% 48% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other. Please specify: A10 Envoy Nginx F5 Citrix VMware 61% choose one of F5 or Nginx (16% choose both) © Copyright OPSWAT 2021. All rights reserved.
  • 17. MetaDefender Core™ Technology Platform Challenges File-based evasive malware and zero-day attacks Sensitive data leakage and staying compliant Too many security tools and technologies Complex systems, few qualified professionals Solution Inspect all incoming files for malware Data sanitization to prevent zero-day attacks Detect and manage sensitive information in files Multiple security technologies in a single platform Application Security
  • 18. MetaDefender Core™ Technology Platform Benefits Malware protection and data breach prevention Protect sensitive data in files Comprehensive, easy-to-integrate platform Features Multiscanning with 30+ AV engines Deep CDR (Content Disarm and Reconstruction) Proactive DLP (Data Loss Prevention) Wide file type support including nested archives Application Security
  • 19. MetaDefender ICAP™ Benefits Out-of-the-box integration into existing infrastructure, fast setup and POC Comprehensive security and data protection technologies, additive security Low overhead maintenance Features All MetaDefender Core platform technologies Integrates with any ICAP-enabled device (secure gateway, proxies, WAF, SSL inspectors) Native integration with NGINX Plus and NGINX Open Source Application Security
  • 20. Why NGINX? What is NGINX? § Fastest web server available § Started open source, now part of F5 § HA, health monitoring, DNS system discovery § RESTful API, cloud native § Load balancer, reverse proxy § API gateway, media streaming Use Cases: § Follows traditional ICAP use cases § Custom web apps with file upload capability § Migrating to the cloud § Cloud-native, containers, k8s
  • 21. Multiscanning • Combine 30+ commercial anti- malware engines into one platform for faster detection • Combine analysis mechanisms/techniques (Signatures, Heuristics, AI/ML, Emulation, etc.) to increase detection ratio • Detection optimization and normalization • Complements AV on endpoint Multiple layers of defense How It Works
  • 22. OPSWAT Metascan Simultaneous analysis with multiple anti-malware engines • 30+ commercial anti-malware engines in one solution • Combined analysis based on signatures, heuristics, AI/ML, algorithms, emulation, and NGAV accelerates detection of new and evolving malware • Improved malware detection rate ~100% • Faster outbreak detection- proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD) • Lower false positives
  • 23. Adding more anti-malware engines increases detection rates to nearly 100% and reduces Mean Time to Detect (MTTD) by 25% 4 Engines 8 Engines 12 Engines 16 Engines 20 Engines Max Engines Detection 88.70% 90.70% 92.70% 95.20% 95.70% 99.40% MTTD (hours) 132.32 115.2 107.76 102.48 100.54 88.70% 90.70% 92.70% 95.20% 95.70% 99.40% 132.32 115.2 107.76 102.48 100.54 0 20 40 60 80 100 120 140 60.00% 65.00% 70.00% 75.00% 80.00% 85.00% 90.00% 95.00% 100.00% Detection of top 10000 threats Source: https://metadefender.opswat.com, September 2021 © Copyright OPSWAT 2021. All rights reserved. • Proactive defense-in-depth dramatically reduces Mean Time to Detect (MTTD) • Combined application of proprietary technologies (heuristics, AI/ML, algorithms per vendor accelerates discovery of new and evolving malware Improved Malware Detection through Multiscanning
  • 24. Deep CDR How It Works Verify file type and identify all active embedded content in file IDENTIFY & SCAN Remove all the potentially malicious content and reconstruct the file with only legitimate components SANITIZE (DEEP CDR) Generate a threat-free file with full functionality and quarantine the original file USE
  • 25. Deep CDR • Supports 120+ file types (including many regional-specific Office Suites, such as Hancom and Ichitaro) • 200+ conversion options • Verify 4,500+ file types • 50+ detailed configuration for different file types • Maintains file usability • Achieves fast sanitization without impacting performance How It Works
  • 26. Recursive Sanitization • Embedded documents in a document • Archives inside an archive • Attachments in an email • Real Archives • TAR / ZIP / RAR / CAB • Common files • Office Suite (docx, xlsx, pptx, etc.) • PDF • Images (jpg, png, bmp, etc.) How CDR Works
  • 27. Examples Deep CDR Malware Features Solution Result BLINDINGCAN North Korea • Reported by FBI/CISA in Aug 2020, • use Attached Template to link to a malicious file Deep CDR removes all linked files No malware downloaded Locky ransomware attack • Delivered by email with an attached MS Word file containing malicious macro • Enabled macro drops the malware • The malware detects whether it is running within a virtual machine or a physical machine and relocate of instruction code. Deep CDR removes Macros No malware downloaded Cobalt Strike Backdoor • Exploited MS vulnerabilities CVE-2021-40444 • Docx file contains an ActiveX object to download an HTML file • HTML file downloads several files and Cobalt Strike malware payload Deep CDR removes OLE objects No shellcode dropped
  • 28. Proactive DLP How It Works Detect and Redact Watermark Remove Metadata
  • 29. Proactive DLP Highlights • Supported sensitive information: • Social Security Numbers • Credit Card Numbers • IPv4 addresses • Classless Inter-Domain Routing (CIDR) • Custom Regular Expressions (RegEx) • Optical Character Recognition (OCR) • Recursive detection • More than 70 supported file types • Individualized certainty level for each type of sensitive information • Advanced detection policy How It Works
  • 30. MetaDefender Core™ Deployment Options Deployments MetaDefender Core integrates with your existing security architecture via REST API MetaDefender Core Container deploys in your containerization environments such as Docker and Kubernetes MetaDefender Cloud integrates with IaaS environments like AWS, or with your existing SaaS products like Salesforce for cloud-based analysis. MetaDefender ICAP Server integrates with web apps (via Ingress, WAF, LB or API Gateway) or Storage (NAS) Application Security
  • 31. Zero Trust It’s a journey, not a destination Technology Better together! The F5/NGINX/OPSWAT combination moves the needle when implementing zero trust
  • 32. ©2023 OPSWAT, Inc. Proprietary and Confidential Thank You!