Call a Specialist Today! 855-958-0756

Secure Web Development

Web application vulnerabilities, including OWASP Top 10 threats SQL injection, XSS, and CSRF, account for more than 80% of all vulnerabilities.1 Based on this high rate of application vulnerabilities, organizations should invest significant resources in secure Web development. Unfortunately, many do not. According to a 2010 Ponemon report, 70% of organizations do not allocate sufficient resources to secure Web applications and 55% of respondents believe developers are too busy to address security issues. Secure Web Development

While Web security may seem like an insurmountable challenge, organizations can follow application coding best practices, scan applications for vulnerabilities and deploy virtual patching solutions to minimize the window of exposure and the risk of a data breach.

Implement Secure Coding Best Practices and Vulnerability Scanning

Secure Web development is an iterative process that comprises application design, implementation, vulnerability testing, and monitoring. According to OWASP Secure Coding Principles, application design should incorporate confidentiality, integrity and availability, contain necessary controls to prevent unauthorized activity and enforce separation of duties. Once applications have been written, they should be rigorously tested for vulnerabilities using a combination of application scanning tools and code review.

Minimize the Window of Exposure with Virtual Patching

Fixing discovered vulnerabilities takes time—on average two to four months per vulnerability.2 Virtual patching can reduce the window of exposure and the disruption of emergency fix and test cycles. Organizations that use vulnerability assessment tools can import the scan results into a Web application security solution such as a Web Application Firewall (WAF). The WAF will create granular policies that block attempts to exploit known vulnerabilities. This integration instantly mitigates vulnerabilities, enabling organizations to fix applications on their own schedule.

Monitor Web Applications for Attacks

To effectively address Web application security, developers must understand how their applications are used. Application monitoring reveals the areas of the Web site that are targeted by hackers, illustrates attack trends, and uncovers exploit techniques in real time. Application developers can leverage this knowledge to identify and prioritize vulnerability fixes and to architect more resilient Web applications.

Accelerate Application Defect Analysis and Reporting

Application defects, such as broken links and server errors, can hinder online purchases--reducing revenues—or even damage company brand. Application flaws can also lead to detrimental leaks of sensitive data such as credit card numbers or financial records. To remediate application defects, developers must be able to access reports of broken links, URL response times, application errors, and sensitive data and code leakage. To further isolate errors, reports should pinpoint which SQL queries slowed Web page response times. Defect reports inspect Web and database traffic to reveal real, user-encountered errors.

Related Products:

Database Security
Product Name: Capabilities:
SecureSphere Database Firewall
  • Maps application users to database transactions for end-to-end visibility
  • Associates SQL queries to URLs with slow response times to help resolve application performance issues
  • Identifies SQL injection attacks in Web applications and stored procedures

File Security
Product Name: Capabilities:
SecureSphere File Firewall
  • Monitor and optionally block unauthorized file activity
  • Investigate and respond to incidents with advanced analytics and reporting
  • Prevent sensitive file data leaks
User Rights Management for Files
  • Aggregate access rights across file servers
  • Remove excessive rights and dormant users

Web Security
Product Name: Capabilities:
SecureSphere Web Application Firewall
  • Block known and zero-day attacks using white list and black list security models, protocol validation, and correlation
  • Stop automated attacks with ThreatRadar
  • Prevent sensitive file data leaks
  • Detect and block known malicious sources
  • Identify phishing attacks