7. Clientes protegidos en la nube.“Imperva nos ayuda a proteger la seguridad y privacidad de los datos de nuestros clientes, y a ganar visibilidad de quien esta accesando a nuestros sistemas.” 2
8. ImpervaSecureSphere Attack Protection Usage Audit Hackers Insiders Data Security Suite Virtual Patching Rights Management Reputation Controls Access Control Imperva: Nuestro valor en 60 segundos
9. De donde viene las amenazas? Internos tienen dos cosas que los externos no tienen:confianza y acceso directo No todos son hombres Metallica! Están dentro y fuera de tu empresa Para quién trabajan? Ellos mismos, crimen organizado, gobiernos extranjeros, socios, competencia, terroristas Amenaza externa: desconocido Usuarios internos No todos son maliciosos Muchos tienen nombres y son conocidos Usuarios de “confianza” Puedes hackear. o Puedes reclutar.
26. How Should You Protect Structured Data? - CONFIDENTIAL - 11 En 2009, 94% de todas los riesgos de seguridad fueron orientados a comprometer bases de datos o aplicaciones1 Usuarios Aplicaciones Aplicaciones de datos estructurados Aun asi mas del 90% de $16B que fueron gastados en seguridad en el 2009 fueron gastados en “otros”2 Data Center 1http://www.privacyrights.org/ar/ChronDataBreaches.htm#2 2http://softwaretop100.org/article_strong_growth_for_security_software_top_12.php
27.
28. Identifica cuando el accesos es “excesivo” y puede ser restringido. Monitorea el acceso y alerta y/o bloquea los accesos que violen tus políticas de seguridad. Servidores de Archivos contienen documentos de negocios, que en ocasiones guarda información confidencial y critica.
29. …no esta preparada para los ataques de hoy Tecnología de ayer… Intrusiones en la red Datos Firewall Perimetral Análisis de Vulnerabilidades Gasto Amenazas 75% 10% Data 90% 25% Network Seguridad de datos vs. Seguridad en la red:Aun siguen peleando la guerra de ayer? 13
30. Los Hackers focalizan sus esfuerzos en las aplicaciones web 82% de las aplicaciones web tienen vulnerabilidades 75% de los ataques van dirigidos a las aplicaciones. 14 1 White Hat - statistic for initial examination; 2 Gartner Research; 3 IBM X-Force 2008 Trends Report
31. La forma de trabajar de Imperva: Esos son los datos. Simple. - CONFIDENTIAL - 15 Thin Client 3 Tier App Thick Client 2 Tier App Application Interface DBA SQL Apps Browser MS Office Knowledge workers Data File Access Portals
32. Imperva SecureSphere Solutions Prevención de Perdida de Datos Protección contra Hackers Ataques o riesgos Internos Asegurar Desarrollos web Regulaciones y Cumplimientos de la Industria. Auditar el Uso de los datos. Monitoreo privilegiado por usuario. Aplicación de Políticas corporativas. Administración de Riesgos Clasificación de Datos Análisis de Vulnerabilidades Administración de Derechos de usuarios. 16
33. Imperva SecureSphere Linea de Productos Database Security Audita acceso a Base de Datos y protégé en tiempo real a ataques a las bases de datos. File Security Audita , protege el derecho de uso de los datos no estructurados. Web Application Security Proteccion contra ataques web a gran escala de diversos tipos.
34. Imperva SecureSphere Products Plataforma Común Administración Análisis Reportes Alertas Múltiples opciones de Implementación Appliances Físicos Appliances Virtuales Agentes
35. - CONFIDENTIAL - 19 ThreatRadar Rastreo y Bloqueo de fuentes de ataques globales. Servicio de Suscripción
36. Imperva SecureSphereEscenario de Implementación Databases Imperva Agent Network Monitoring Native Audit File Servers and NAS Devices Users Web Servers Database Firewall Web Application Firewall File Firewall Internet Management Server (MX)
37. Imperva SecureSphereEscenario de Implementación Bridge Inline Transparente Soporta bloqueo y seguridad real Alto performance, minima latencia Interfaces fail-open Instalación non-inline Para monitoreo; zero latencia Modo sniffing Proxy transparente y reverso (aplicaciones) Alto performance para modificar contenido URL rewriting, cookie signing, SSL termination Agentes ligeros Actividad local privilegiada Visibilidad completa Data Center SecureSphere Switch SecureSphere INTERNET 21 - CONFIDENTIAL -
39. Imperva es visto y como el Líder de Mercado Imperva is the leader in the stand alone WAF market.” (Feb 2010) Imperva exceeds IDC’s viability assessment for strategic direction, growth and market potential. (Feb 2010) “The product set makes a strong case for itself as a leading contender in this market space.” (April 2010) Some DAM vendors take“an enterprisewide view of all data — structured and unstructured — that exists in the core of the typical enterprise and addresses the protection of that data throughout its life, including identification, risk assessment, access controls and controls enforcement across all data storage platforms. This approach is best characterized by Imperva's offering, which considers DAM as a component of a data protection and risk management function.” —Jeff Wheatman, June 2010
41. SecureSphere Record of Excellence - CONFIDENTIAL - 25 Techworld 2008 Network Application Product of the Year “SecureSphere has been named winner for Network Application Product of the Year” SQL Server Magazine – Editor’s Best Award “SecureSphere gives you complete visibility and control over your database applications” Editor’s Choice: Database Extrusion Prevention “Right from the start, Imperva impressed us with its plethora of features…” Imperva Wins eWEEK Excellence Award “Imperva SecureSphere’s in-line protection for both Web applications and communications with back-end databases is simply unmatched.” Editor’s Choice – Web Application Firewalls “From beginning to end, Imperva SecureSphere is our kind of WAF” Imperva Wins WAF Shoot-Out “Imperva is the closest thing to a silver bullet for application security” Rolling Review: Well-Rounded Data Protection “SecureSphere is a solid product. It is quick to learn user behavior, and it handily blocks known attacks” Security Magazine – Reader’s Choice Award “SecureSphere scored well in every criteria: granularity of access controls… scalability and management.”
42. Key Industry Segments - CONFIDENTIAL - 26 Media/Telco Government Technology Other - CONFIDENTIAL - 26
43. Key Industry Segments: Finance - CONFIDENTIAL - Protecting three of the top five US commercial banks “We evaluated every major vendor and only Imperva could scale to the size and complexity of our environment.” — Top 10 US bank 27 - CONFIDENTIAL -
44. Key Industry Segments: Healthcare/Insurance - CONFIDENTIAL - 28 Protecting the largest Insurance and Healthcare providers “We manage huge amounts of sensitive data and need to protect our customers and satisfy stringent regulators. Imperva improves our security while greatly facilitating compliance.” — Largest insurance company worldwide - CONFIDENTIAL -
45. Key Industry Segments: E-commerce - CONFIDENTIAL - Protecting two of the top three food and drug stores and three of the top five specialty retailers “SecureSphere allows us to track and document all database users, including database administrators and developers, and trace their actions, without impacting the performance or stability. We now have the data needed to prove we are in compliance with Sarbanes Oxley and PCI.” — Caribou Coffee - CONFIDENTIAL -
46. 10 Pasospara el Exito Luiz Eduardo dos Santos Senior Security Engineer Latin America Adriana García Regional Sales Director Mexico and CA
47. Imperva Success in ten Steps Familiarizarte con la forma de trabajo de Imperva Ser capaz de dar una presentación. https://www.imperva.com/sign_in.asp? (partner portal) Registrar la oportunidad Comparte casos de éxito, videos con tu prospecto. Dimensiona correctamente Llena el Success of Criteria de Imperva (demo) Pon el equipo en Evaluación. Propuesta de solución. Vende!!! - CONFIDENTIAL - 31
48. Step 1. Review Partner Playbook - CONFIDENTIAL - 32 1. Imperva Solutions: Overview 2. Imperva Value to the Customer 3. Why protect web applications? 4. Why protect databases? 5. Questions to ask to detect opportunities 6. FAQ Do you have it?
49. Step 6. Dimensionamiento General BD - CONFIDENTIAL - 33
50. Step 6. Dimensionamiento General WAF - CONFIDENTIAL - 34
51. Step 6. Otras preguntas Generales - CONFIDENTIAL - 35
52. Step 9: The Proposal - CONFIDENTIAL - 36 Information needed: What gateway(s) – X2500? X4500? X6500? Which licenses: DAS? WAF? Database monitoring Database security (includes DAM, WAF) Fault tolerance? Redundancy? Management server Support – 1,2 or 3 years Example Proposal
55. Lists required information before installationReview success criteria with client Have client sign off on success criteria before installation Reinforce to client: this is a demonstration Ensure timeframes and hold to them Contact Luiz dos Santos for support Success Criteria Document
As the threat and regulatory landscape is shifting to focus on data – organizations remained focus on protecting against network attacks. The fact is that network firewalls and intrusion prevention systems lack the application and data awareness that are required to protect against today’s sophisticated external and internal attacks. Imperva is focused on developing the capabilities required to address that shift and focus on business-critical data.
To summarize, Imperva helps customers:- Prevent data breach from hackers and insiders- Achieve and maintain compliance with regulations and- Reduce risk to sensitive data through data discovery and classification, vulnerability assessment and management of user rights to the data.
Track Attack Sources on a Global ScaleLeveraging the security community collective insight, centralized ThreatRadarservers aggregate information on attack sources from credible data providers. These providers monitor global malicious activity originating from anonymous proxies, specific IP addresses, botnets, and phishing sites. ThreatRadar allows organizations to benefit from traffic source reputation data based on attack attempts on other websites. Continuous, Automated Feed of Current Attack SourcesThreatRadarservers automatically deliver synthesized attack sources feed in near real time to all ThreatRadar-powered SecureSphere WAFs. ThreatRadar is fully maintained by Imperva and eliminates the manual effort required to identify, subscribe, and maintain these security feeds. ThreatRadarcontinuously refreshes the feed, providing up-to-date protection against malicious traffic. Dynamically Adapt Web Security PoliciesAs SecureSphere WAF receives attack source information, ThreatRadar dynamically adjusts web security policies to alert or block traffic from newly identified attack sources. Furthermore, custom security rules can use information provided by the feeds to fine-tune the response for specific types of traffic, such as the ability to block only the traffic that comes from a malicious source exhibiting suspicious behavior. Stop Traffic from Malicious Sources, EarlyThreatRadar increases the stopping power of SecureSphere WAF and dramatically reduces application visibility to attackers. By blocking access requests based on traffic source reputation, hackers have virtually no opportunity to explore the web application for possible weaknesses and are less likely to launch a successful attack. Streamlined Forensic Analysis and Attack Source IntelligenceThreatRadar removes the guesswork out of event analysis by providing greater operational insight into attacker origins and methods. Source information such as malicious IP addresses and geographic locations of the attack source provides additional context on attackers enabling precise incident response procedures and minimizing operational workload.
This diagram describes the complete SecureSphere product line and illustrates where each product would be deployed within the network.
NIC/Network—put the number of NICS used for monitoring, i.e 4NICS/2