Prophaze WAF - Native Cloud Security Platform k8s - PowerPoint PPT Presentation

About This Presentation
Title:

Prophaze WAF - Native Cloud Security Platform k8s

Description:

Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile apis from security breach using its Adaptive Profiling and Behavioral based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customer’s Kubernetes clusters from various attack vectors . There is also a Cloud version ( AWS , Google Cloud, Microsoft Azure ) as well which works on a Pure SaaS Model. Internally Prophaze WAF will scan all the incoming requests and classifies the real and legitimate users using our AI Powered Platform This product can be implemented in industries where customer data is critical like Healthcare & Pharma, Manufacturing sector, E-com firms, Banking /Finance & NBFC. – PowerPoint PPT presentation

Number of Views:35

less

Transcript and Presenter's Notes

Title: Prophaze WAF - Native Cloud Security Platform k8s


1
Prophaze WAF Zero-Touch WAF Automation
Making SecuritySafer. Simpler. Affordable.
Prevents attacks others miss. Not more CVE
alerts. Cuts security costs. Not more
spending. Automated prevention. Not manual
rules. Protection in minutes. Not months.
2
System Internals Full Architecture
3
IBM/HCL AppScan Test by STQC
lt
4
Dashboard Control
  • Actionable intelligence with real-time threat
    data, drill down and risk scoring, eliminating
    the need for complex workflows between products.
  • Monitor all security events identified on
    cloud-based and on-premises deployments.
  • Block mode control
  • Blacklisting control
  • IP Geolocation control
  • Rate limiting control
  • Threat analytics
  • Integration with SIEM, SOAR
  • Alerts via Slack
  • Import/export control
  • API publishing
  • Compliance reporting

24.7 DDoS Attacks
5
What DevOps expect?
6
Features
7
AI WAF
8
Bots and Anomalies
  • Anomalies
  • Control behavior anomalies in traffic flows
  • Response code anomaly
  • Bandwidth anomaly
  • IP Geo anomaly
  • Rate anomaly diversion using DNS routing
  • Bots
  • Automatically identifies, detects, and blocks
    known and unknown web application threats in
    real-time
  • MITM attacks
  • Zero day attacks
  • Malware attacks
  • Brute force attacks
  • Data Leaks
  • Bad bots

9
DDoS
  • DDoS Protection
  • Protects your applications from distributed
    denial of service DDoS attacks by malicious bot
    networks.
  • ML behavior analysis
  • Detection protocol, IP, and anomalies in
    traffic flows
  • Diversion - traffic is redirected using DNS
    routing
  • Filtering - blocking DDoS traffic while
    legitimate requests flow through
  • Analysis - previous security logs are analyzed to
    improve resilience

10
API Security
  • Automatic positive security model to enforce
    boundary checking for API requests
  • Test APIs for misconfigurations, logic
    manipulation, and input validation
  • Distinguish between legitimate and malicious
    payloads and bots
  • Use regular expressions to enforce required
    parameters in the message body
  • Rate limiting incoming and outgoing traffic 
  • Integration with API tools
  • Decode Open API (Swagger) files, header and body
    payload
  • Decode all the data formats including nested and
    encoded custom API protocols as JSON inside
    Base64 encoding
  • Protect east-west API traffic

11
Virtual Patching
  • Automatically deploys virtual patching to web
    applications, APIs and microservices to block
    malicious traffic from exploiting vulnerabilities
  • Patching is scalable and implemented on all hosts
  • Reduces risk until a vendor-supplied patch is
    released and tested
  • Does not conflict with libraries and support code
    files
  • Protects mission-critical systems that cannot be
    taken offline
  • Eliminates time and money spent on emergency
    patching
  • Enables agile CI/CD teams to remediate
    vulnerabilities and release code without stopping
    production

24.7 DDoS Attacks
12
Compliance
  • Automated compliance and governance policies
    enforcement
  • For eCommerce, FinTech, Health Tech, and other
    organizations that process PII and PHI data
  • Protect your web applications, APIs, and
    configuration settings in real-time

24.7 DDoS Attacks
13
Deployment Options
  • Kubernetes WAF Deployment
  • One hour deployment
  • Native Kubernetes deployment
  • Private cloud deployment behind load balancer
  • Public clouds deployment as reverse proxy at DNS
    in same time zone
  • Across multiple cloud providers and enterprise
    data centers

14
Customers
  • nOps AWS cloud management platform used by Uber
  • GuideSpark Serving
  • Bank of America, ADP, Visa,American Express,
    Adobe, Salesforce,and many Fortune 500 companies
  • Amrita Technological Incubator

15
Next steps
  • Project scope and technology review
  • Pilot deployment

Contact vais_at_prophaze.com 9645449968
Thank you!
Write a Comment
User Comments (0)
About PowerShow.com