assuring web services integrity activeintegrity system
Post on 21-Dec-2015
217 views
TRANSCRIPT
![Page 1: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/1.jpg)
Assuring Web Services IntegrityAssuring Web Services Integrity
ActiveIntegrity SystemActiveIntegrity System
![Page 2: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/2.jpg)
![Page 3: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/3.jpg)
Web Services as a Paradigm Shift
• Today’s Web designed for Application-Human interactions
• WS enable systematic Application-Application interactions on the Web– E-marketplaces
– Open, automated B2B e-commerce
– Business process integration on the Web
– Resource sharing, distributed computing
• Enable universal interoperability
![Page 4: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/4.jpg)
The Four Levels of Web Security
Security
Threat
Antivirus
Disruption
Desktop
1
Encryption
Interception
Transport
2
Manual Patching
Perversion
WebApplications
4
Firewall
Illegal Access
3
NetworkNetwork
All Levels are crucial!
![Page 5: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/5.jpg)
Web Services Hacking Scenario
Business Logic
Web Browser
Wireless Device
Another Web Service Web Services
Hacker
Invalid Content!
![Page 6: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/6.jpg)
The Pain
• The logic of the Web Service may be damaged by internal or external hacking
• Great financial losses due to:– Theft of valuable information
– Invalid content provided to customers
– Damaged reputation
• Current solutions are not secure enough – 85% of large companies detected security breaches in the past year (Computer Security Institute, 2002)
![Page 7: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/7.jpg)
Why Firewalls are not enough?
• 95% of all hacked web servers had a firewall
• Firewalls leave HTTP port wide open to allow Web traffic
• Hackers exploit known errors in applications that reside behind firewalls
• Firewalls of big companies are hacked on the average 10 times a year
![Page 8: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/8.jpg)
Our Solution
![Page 9: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/9.jpg)
![Page 10: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/10.jpg)
ActiveIntegrity Architecture
ActiveIntegrity Server
FirewallWS Client
Web Services Business Logic
Agent
Agent
![Page 11: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/11.jpg)
ActiveIntegrityServer
ActiveIntegrity in Action
FirewallWS Client
Web Services Business Logic
Hacked Server
Invalid Content
Notification
Recovery
![Page 12: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/12.jpg)
ActiveIntegrity Components
• Consists of two components:– ActiveIntegrity Secure Server (hardware,software)
– ActiveIntegrity Secure Agents (software)
![Page 13: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/13.jpg)
ActiveIntegrity Secure Server
• Highly secured dedicated server• Integrity Enforcement Point - Controls the
Secured Agents • Supports Recovery mode
![Page 14: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/14.jpg)
ActiveIntegrity Secure Agents
• Reside on the protected servers
• Act in a distributed environment
• The Agents run in a hostile environment vulnerable to hacking attacks
• We provide a unique technology to prevent the Agents from being compromised
![Page 15: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/15.jpg)
![Page 16: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/16.jpg)
Market Size Evaluation
Market size is dependent upon:
ROI and current ROI and current pricing modelspricing models
Application-level Application-level securitysecurity
Composite Composite Applications Applications marketmarket
![Page 17: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/17.jpg)
Target Market
• Composite-Applications market:$15.4B by 2003 (Gartner, 0.8 probability)
• Application-level Security market:$3.5B by 2005 (Bear Stearns)out of total security spending of $19B (IDC).
• ROI considerations…
![Page 18: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/18.jpg)
Target Market: ROI
• 9% of companies lose about $50K per hour of server downtime
• Average downtime: 20-25 hours• Estimated damage: +$1M
![Page 19: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/19.jpg)
Target Market
• Potential market size:Large firms considered – Fortune 5000Avg. number of web services per firm – 6.5 (META Group).Avg. price per hardware security system - $50K
Potential Sum: 5000 x 6.5 x 50K = $1,600M
• 2001 competitors revenues: $60M• Actual market size probably smaller
![Page 20: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/20.jpg)
Market Segmentation
• Sales by Customer type:– Fortune 500 – Due to ROI considerations: 50%– Fortune 5000 – light-weight version: 20%– Federal and government bodies: 10%
– Misc. (private customers, small firms): 20%
• Estimate based upon security spending survey (Secure Computing Magazine)
![Page 21: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/21.jpg)
Limited-protection market veteran; AT&T, e-Bay and more ($1,095)
Low-featured software for IIS web servers ($595)
1998-founded, feature-rich, multi-platform software solution ($995)
Israeli company - Feature-rich, high-end hardware solution ($54,000)
Competition
• Main competitors in web-services market:
![Page 22: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/22.jpg)
Competitive Advantage
• Technological Advantage– Tailored especially to protect Web Services
– Unique technology for dynamic Agent Generation
– Suited for distributed applications
• Marketing Advantage– Web Services are a paradigm shift, which is not
addressed by our competitors
![Page 23: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/23.jpg)
Pricing Model, Business Model
• System price (hardware-solution): $49,000
• Start-ups security products sales through:– Direct Sales
– OEMs
– Strategic Alliances with market leaders
![Page 24: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/24.jpg)
Current Position
• Prototype scheduled: 7/14/2002• Beta-site tests: 10/30/2002• Future meeting planned with Gilian Technologies.
• Open Issues:– Indirect Sales partner
– Development of lightweight, software-only version
![Page 25: Assuring Web Services Integrity ActiveIntegrity System](https://reader038.vdocuments.mx/reader038/viewer/2022110207/56649d635503460f94a46730/html5/thumbnails/25.jpg)
Thank You