SlideShare a Scribd company logo
1 of 14
Introducing DASP
          version 4.1
                         New Products                              This event will start
                                                                      at 9am CEST,
                           Sept 26, 2012                         thanks for your patience




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012    1
                                                                                            1
Hello !




                     Renaud Bidou                                      Stéphane de Saint Albin
                         CTO                                                   CMO



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012         2
                                                                                                 2
Logistics

           • Goal of this webinar:
             to give you an overview of the
             latest and greatest product
             news… in 60 minutes!

           • How it works
              – You’re muted…
              – … but please ask any questions
                using the chat tool
              – We’ll take a few minutes at the
                end to answer them




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   3
                                                                                           3
About DenyAll

       Securing & accelerating your applications
       Priority #1: filtering incoming Web traffic
          – No other way to effectively protect your IT
            infrastructure against application-layer attacks
       Priority #2: reducing the attack surface
          – Proactively managing vulnerabilities, making it
            harder for hackers, is smart/good practice



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   4
                                                                                           4
DenyAll Product Line

                                                                                • Auditor
                                                                                • Vulnerability Manager
                                                                                • Edge Tester



                                                      Detect
  • Management                                                                             •   sProxy
    Console                                                                                •   rXML
  • Application                                                                            •   rWeb
    Security                                                                               •   rWeb + Client
    Dashboard                                                                                  Shield

                                    Manage                              Protect
Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012                       5
                                                                                                               5
Agenda

       1.      Version 4.1 design goals
       2.      Operational efficiency
       3.      New security engines
       4.      Secure Transparent Mode
       5.      More to come
       6.      Conclusion and next steps



Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   6
                                                                                           6
Version 4.1
          Design Goals




Securing & Accelerating Your Applications   3/19/2013 3/19/2013 All © 2012
                                               3/19/2013   Deny          Deny All © 2012   Deny All © 2012   7
                                                                                                             7
A Proven Platform

                                                                  Reverse Proxy


                                                                Standard          Advanced
                       High                 Application                                          XML        User
                                                                Web App           Web App
                    Availability            Acceleration                                        Security   Security
    Protect                                                     Security           Security



       • Time tested, reverse proxy-based architecture for
         maximum security
          – protocol break, infrastructure masking, deep inspection
       • Modular group of features, assembled in packaged
         products to meet specific needs
          – sProxy, rXML, rWeb
          – License key-enabled upgrade paths

Securing & Accelerating Your Applications        3/19/2013
                                                    3/19/2013   Deny All © 2012
                                                                              Deny All © 2012                         8
                                                                                                                      8
+10 Years of Innovation

                                                                    Reverse Proxy


                                                                  Standard          Advanced
                       High                 Application                                                 XML           User
                                                                  Web App           Web App
                    Availability            Acceleration                                               Security      Security
    Protect                                                       Security           Security



   Distributivity            Caching              Deep Inspection            White List           Model Validation   Client Certificates

                                                                                                                          User
  Active-Passive           Compression            Transformation              Stateful            XML Validation      Authentication

                                                                           User Behavior                              SSO integration
   Active-Active         TCP Multiplexing           Black List                                    Transformation
                                                                             Tracking
                                                                                                                     Cookie Tracking
                          SSL Offloading           Scoring List             Client Shield            Black List

                           Server Load-
                                                                                                      Stateful
                            Balancing
                                                                                                      SOAP
                                                                                                   Attachments

                                                                                                       ACL


Securing & Accelerating Your Applications        3/19/2013
                                                    3/19/2013     Deny All © 2012
                                                                                Deny All © 2012                                         9
                                                                                                                                        9
R&D Goals & Priorities

       1. Improve Operational Efficiency
          – Usability & Manageability
          – IT Infrastructure Integration
          – Application Security Intelligence
          – Virtual Patching
       2. Deliver New Security Engines
          to increase protection against modern attacks
       3. Ease Deployment


Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   10
                                                                                           10
New Features
       & Enhancements in 4.1

          Goals                        Group of Features
          Improve     Admin Experience Optimization,
          Operational incl. Log & Error Management
          Efficiency  Application Security Intelligence (Dashboard)
                      IT Infrastructure integration (SSO integration)

          New                          JSON Engine
          Security                     Dynamic Command Injection Filtering
          Engines
          Ease       Secure Transparent Mode
          Deployment Predefined application templates


Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   11
                                                                                           11
Improving
          Operational
          Efficiency




Securing & Accelerating Your Applications   3/19/2013 3/19/2013 All © 2012
                                               3/19/2013   Deny          Deny All © 2012   Deny All © 2012   12
                                                                                                             12
To read full slides presentation &
access to the video recording on:


    Introducing DASP version 4.1


Please click on the link available in
the description below.
Thank you!
                             info
                        @denyall.com
                      +33 1 46 20 96 00




Securing & Accelerating Your Applications   3/19/2013
                                               3/19/2013   Deny All © 2012
                                                                         Deny All © 2012   14
                                                                                           14

More Related Content

Recently uploaded

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Introduction to DASP version 4.1

  • 1. Introducing DASP version 4.1 New Products This event will start at 9am CEST, Sept 26, 2012 thanks for your patience Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 1 1
  • 2. Hello ! Renaud Bidou Stéphane de Saint Albin CTO CMO Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 2 2
  • 3. Logistics • Goal of this webinar: to give you an overview of the latest and greatest product news… in 60 minutes! • How it works – You’re muted… – … but please ask any questions using the chat tool – We’ll take a few minutes at the end to answer them Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 3 3
  • 4. About DenyAll Securing & accelerating your applications Priority #1: filtering incoming Web traffic – No other way to effectively protect your IT infrastructure against application-layer attacks Priority #2: reducing the attack surface – Proactively managing vulnerabilities, making it harder for hackers, is smart/good practice Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 4 4
  • 5. DenyAll Product Line • Auditor • Vulnerability Manager • Edge Tester Detect • Management • sProxy Console • rXML • Application • rWeb Security • rWeb + Client Dashboard Shield Manage Protect Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 5 5
  • 6. Agenda 1. Version 4.1 design goals 2. Operational efficiency 3. New security engines 4. Secure Transparent Mode 5. More to come 6. Conclusion and next steps Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 6 6
  • 7. Version 4.1 Design Goals Securing & Accelerating Your Applications 3/19/2013 3/19/2013 All © 2012 3/19/2013 Deny Deny All © 2012 Deny All © 2012 7 7
  • 8. A Proven Platform Reverse Proxy Standard Advanced High Application XML User Web App Web App Availability Acceleration Security Security Protect Security Security • Time tested, reverse proxy-based architecture for maximum security – protocol break, infrastructure masking, deep inspection • Modular group of features, assembled in packaged products to meet specific needs – sProxy, rXML, rWeb – License key-enabled upgrade paths Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 8 8
  • 9. +10 Years of Innovation Reverse Proxy Standard Advanced High Application XML User Web App Web App Availability Acceleration Security Security Protect Security Security Distributivity Caching Deep Inspection White List Model Validation Client Certificates User Active-Passive Compression Transformation Stateful XML Validation Authentication User Behavior SSO integration Active-Active TCP Multiplexing Black List Transformation Tracking Cookie Tracking SSL Offloading Scoring List Client Shield Black List Server Load- Stateful Balancing SOAP Attachments ACL Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 9 9
  • 10. R&D Goals & Priorities 1. Improve Operational Efficiency – Usability & Manageability – IT Infrastructure Integration – Application Security Intelligence – Virtual Patching 2. Deliver New Security Engines to increase protection against modern attacks 3. Ease Deployment Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 10 10
  • 11. New Features & Enhancements in 4.1 Goals Group of Features Improve Admin Experience Optimization, Operational incl. Log & Error Management Efficiency Application Security Intelligence (Dashboard) IT Infrastructure integration (SSO integration) New JSON Engine Security Dynamic Command Injection Filtering Engines Ease Secure Transparent Mode Deployment Predefined application templates Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 11 11
  • 12. Improving Operational Efficiency Securing & Accelerating Your Applications 3/19/2013 3/19/2013 All © 2012 3/19/2013 Deny Deny All © 2012 Deny All © 2012 12 12
  • 13. To read full slides presentation & access to the video recording on: Introducing DASP version 4.1 Please click on the link available in the description below.
  • 14. Thank you! info @denyall.com +33 1 46 20 96 00 Securing & Accelerating Your Applications 3/19/2013 3/19/2013 Deny All © 2012 Deny All © 2012 14 14