SlideShare una empresa de Scribd logo
1 de 20
Bitrix Software Security Bitrix Intranet Portal Bitrix Site Manager
Site. Portal. Image. Reputation. Your web site is a part of the Corporate Infrastructure. More than  50% of attacks  are done through the  Web . Corporate site hacks hit the  reputation  and  image  of a company. What is more, the loss of data and client information leads to  sheer material losses .  The more  solid  and  famous  the name and products of a company, the more  substantial can be the risks and losses  caused by a corporate site hack. Which to choose?
Security at All Stages   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],My Site is My Castle During the development of the Bitrix Site Manager software  particular attention  is paid  to  the  security issues   at all stages  of developing and testing.
New Approach to Security   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Proactive Protection  is the latest security technology combining technical and organizational measures that allow  combating malicious programs  that have  undergone modifications  and those that are  still unknown ! Proactive Protection Armed Castle
Security Panel with Security Levels   With the  Proactive Protection  module, you can  significantly improve  the  security of your site . You need only to select and configure one of the module security levels. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Application FireWall  (Proactive Filter) The  Proactive Filter  is the most  effective way to protect  sites  against  possible security defects in the web project implementation ( XSS ,  SQL Injection ,  PHP Including,  and others).   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One-time Password Technology (OTP)   The concept of  one-time passwords  empowers the standard authorization scheme and significantly reinforces web project security. The one-time password system requires a physical hardware token (device) (e.g., Aladdin eToken PASS) or special OTP software. What OTP gives you? Confidence  that only a user to whom a token was issued can authorize on the site.   Password interception loses meaning  in this case, as a password *  can be used only once. A token is a hardware physical device that generates unique passwords only when a token button is being clicked. It means that a token owner is unable to tell the password to a third party to allow them authorize as well.   *  the password = your password + unique numerical combination
Authorized Session Protection   Most web attacks are purposed to steal the authorized user session data. Enabling  Authorized Session Protection  makes session hijacking senseless.   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Activity Control  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],You can set maximum user activity for your site (for example, number of queries per second).
Intrusion Log  All events  occurring in the system, including the unusual or malicious,  are logged . You can view entries in the log immediately after they are generated. The log is updated in real time so you can view the events as soon as they have been registered. This feature enables you to discover attacks and intrusion attempts while they occur, so  you can riposte immediately and even prevent attacks .  ,[object Object],[object Object],[object Object],[object Object]
IP-based Control Panel Pages  This type of protection strictly regulates secure networks from which the users are allowed to access Control Panel. All you have to do is specify the legal  IP   addresses  (or a range). No need to worry about not adding yourself to this list: the system will check your IP automatically. What effect would this protection produce? Any XSS/CSS attacks become ineffective, interception of authorization data – absolutely useless.
Stop Lists   The stop list contains parameters used to  restrict access to a site  and possibly redirect to a specified page. Any visitor matching the stop list criteria (e.g. an IP address), will be blocked.   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Script Integrity Monitor   File integrity control Verification of the file integrity control script ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Protection Phishing   is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords ,  and credit card details by masquerading as a trustworthy entity in an electronic communication.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Under Development   In the nearest future Transmission channel encryption using SSL   Recommendations on configuration   Update monitor
Permanent Updates Audit   Bitrix has assigned a treaty of permanent update security audits with Positive Technologies. Each time a new set of updates is released through the SiteUpdate system, minute security work is done by the Positive Technologies company. Thanks to this work, the level of  product security is always high .
[object Object],[object Object],[object Object]
Have a question?   E-mail to: [email_address]   [email_address]
Download the Free 30-Day Trial: http:// www.b itrixsoft.com/products/cms/ Test Online: http:// www.b itrixsoft.com/products/cms/
USA Toll Free Number (US only)  +1-888-5BITRIX  (+1-888-524-8749) Telephone Number: +1.703.740.8301 Postal address 901 N. Pitt str, Suite 325 Alexandria, VA 22314 Sales Department:   [email_address] ;  [email_address]   Web Site :   http:// www.bitrixsoft.com   Contact Information

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO""EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
 
Security Testing for Web Application
Security Testing for Web ApplicationSecurity Testing for Web Application
Security Testing for Web Application
 
SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis
 
Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide	Firewall Monitoring 1.1 Security Use Case Guide
Firewall Monitoring 1.1 Security Use Case Guide
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Forti web
Forti webForti web
Forti web
 
Firewall
FirewallFirewall
Firewall
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 

Similar a Bitrix Software Security

Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
Soap MacTavish
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
techworldvn
 
9781423903055 ppt ch10
9781423903055 ppt ch109781423903055 ppt ch10
9781423903055 ppt ch10
临枫 盖
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 

Similar a Bitrix Software Security (20)

Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
ip pier solution
ip pier solutionip pier solution
ip pier solution
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application Hacking
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
9781423903055 ppt ch10
9781423903055 ppt ch109781423903055 ppt ch10
9781423903055 ppt ch10
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
S T M U T M
S T M  U T MS T M  U T M
S T M U T M
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Bitrix Software Security

  • 1. Bitrix Software Security Bitrix Intranet Portal Bitrix Site Manager
  • 2. Site. Portal. Image. Reputation. Your web site is a part of the Corporate Infrastructure. More than 50% of attacks are done through the Web . Corporate site hacks hit the reputation and image of a company. What is more, the loss of data and client information leads to sheer material losses .  The more solid and famous the name and products of a company, the more substantial can be the risks and losses caused by a corporate site hack. Which to choose?
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. One-time Password Technology (OTP) The concept of one-time passwords empowers the standard authorization scheme and significantly reinforces web project security. The one-time password system requires a physical hardware token (device) (e.g., Aladdin eToken PASS) or special OTP software. What OTP gives you? Confidence that only a user to whom a token was issued can authorize on the site. Password interception loses meaning in this case, as a password * can be used only once. A token is a hardware physical device that generates unique passwords only when a token button is being clicked. It means that a token owner is unable to tell the password to a third party to allow them authorize as well. * the password = your password + unique numerical combination
  • 8.
  • 9.
  • 10.
  • 11. IP-based Control Panel Pages This type of protection strictly regulates secure networks from which the users are allowed to access Control Panel. All you have to do is specify the legal IP addresses (or a range). No need to worry about not adding yourself to this list: the system will check your IP automatically. What effect would this protection produce? Any XSS/CSS attacks become ineffective, interception of authorization data – absolutely useless.
  • 12.
  • 13.
  • 14.
  • 15. Under Development In the nearest future Transmission channel encryption using SSL Recommendations on configuration Update monitor
  • 16. Permanent Updates Audit Bitrix has assigned a treaty of permanent update security audits with Positive Technologies. Each time a new set of updates is released through the SiteUpdate system, minute security work is done by the Positive Technologies company. Thanks to this work, the level of product security is always high .
  • 17.
  • 18. Have a question? E-mail to: [email_address] [email_address]
  • 19. Download the Free 30-Day Trial: http:// www.b itrixsoft.com/products/cms/ Test Online: http:// www.b itrixsoft.com/products/cms/
  • 20. USA Toll Free Number (US only) +1-888-5BITRIX (+1-888-524-8749) Telephone Number: +1.703.740.8301 Postal address 901 N. Pitt str, Suite 325 Alexandria, VA 22314 Sales Department: [email_address] ; [email_address] Web Site : http:// www.bitrixsoft.com Contact Information