Wednesday, 16 December 2020 11:19

How to protect applications across multiple clouds

By
Yaniv Hoffman, Radware Yaniv Hoffman, Radware

GUEST OPINION by Yaniv Hoffman, Radware: With cloud-based applications come new security risks that require expertise which is typically scarce and that can delay application deployment and maintenance.

While web application firewalls (WAFs) play a critical role in protecting applications, deploying and managing a WAF can be complex and require ongoing refinement of security policies.

Managing these policies often requires expertise and intimate familiarity with any WAF solution. In addition, it is not always possible to leverage the same WAF across heterogenous cloud environments, which limits the ability to enforce security policies across environments.

DevOps typically automates application integration and deployment cycles (CI/CD) to accelerate the process of deploying new applications. To accomplish this, they will often integrate with solutions that facilitate integration and speed. Security solutions, which are typically complex, are not prioritised for this reason, leaving applications unprotected.

Monitoring security events across applications is another challenge because there is no central dashboard across disparate cloud computing environments. It also requires security expertise to understand which security policy updates need to be implemented based on the aforementioned reporting information.

What to look for

When evaluating a solution, look for the highest level of application protection while minimising false positives and maintenance, and the ability to run across multiple private and public cloud environments. Further, consider if the solution offers the following:

# Full Coverage of OWASP Top-10 including injections, cross-site scripting (XSS), cross-site request forgery, broken authentication and session management and security misconfiguration.

# Reduced total cost of ownership with lowest false positives through unique auto-policy generation technology designed to secure a web application automatically.

# Protection from Zero-Day Web Attacks using both negative (signature based) and positive security models that ensure the lowest false positives and minimal operational effort, but also robust protection against known and unknown (zero-day) threats.

 # Device fingerprinting for bot protection. The power of the fingerprint is in the consolidated information extracted from dozens of browser attributes collected on the client side, facilitating accurate bot classification.

# Actionable reporting. For example, Radware’s Alteon Multi Cloud provides a monitoring and reporting tool that makes it easy to monitor application protection events and actions, the attacks it identifies, and any blocked transactions.

# Scalability. A WAF is a resource-intensive function. Allocating WAF resources to match peak application usage periods can be costly when operating in a cloud environment.

Deploying a firewall does not need to be a complex, resource-intensive process. Choosing a solution with the ability to span multiple cloud environments and automatically scale WAF services to match application usage levels will allow organisations to deploy application security policies seamlessly without extensive expertise.

Through an application centric approach, leading technology enables application owners, DevOps, SecOps and others to deploy application delivery and security services instantly, in a self-service manner, with advanced WAF and analytics to manage proactively and protect their applications, wherever they are deployed.


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments