Companies at risk of unauthorised access to critical data
Recent local cyber attacks are a forewarning of things to come, and it clearly shows the vulnerabilities of South African companies. Although in recent attacks customers have not necessarily suffered any financial losses, this could quickly change with personal and financial information in the hands of cyber criminals.
Ensuring the integrity of company data is not a simple task, especially as cyber crime, fraud and data breaches are on the increase. Today, both small and large companies need world-class security solutions to safeguard confidential information, ranging from Internet threat protection to policy control for secure Web traffic.
Businesses need proper protection against cyber threats and intellectual property leaks, while also ensuring compliance with corporate content and access policies. Network and user activity monitoring is crucial as threats are not always external; companies need to secure all roaming users and mobile devices.
Troye technical director Kurt Goodall points to a number of defence mechanisms to protect one's business from threats. "These could include malicious URL requests, viruses, advanced persistent threats (APTs), zero-day malware, adware, spyware, botnets, cross-site scripting, and much more.
"Troye provides a world-class Web application firewall, which is ICSA, Common Criteria and FIPS-certified. It analyses bi-directional traffic, including SSL-encrypted communication, protecting customers against a broad range of security threats," he explains.
Goodall says there are tools to perform deep-packet inspection of HTTP, HTTPS and XML, as well as protection against OWASP, SQL injection attacks, cross-site scripting attacks, and cookie tampering. "One should also do form validation and protection, HTTP and XML reply and request format validation, plus JSON payload inspection, signature and behaviour-based protections, and data loss prevention (DLP).
"In addition, one should do traffic monitoring for intended and unintended data exposure, Denial of service (DOS) protection, authentication, authorisation and auditing support and reporting, and policy tools that provide for easier PCI-DSS compliance verification," he warns.
Troye's solutions, which include the Citrix NetScaler ADC/WAF, provide for unmatched security, superior Layer 4 to Layer 7 (L4-L7) load balancing, reliable GSLB, and increased up-time. Performing application-specific traffic analysis to intelligently distribute, optimise and secure L4-L7 network traffic for Web applications helps prevent application layer attacks.
The application delivery controller (ADC) allows legitimate client requests while blocking malicious requests. It provides built-in defences against DOS attacks and supports features that protect against legitimate surges in application traffic that would otherwise overwhelm the servers.
"An available built-in firewall protects Web applications from application layer attacks, including buffer overflow exploits, SQL injection attempts, cross-site scripting attacks, and more. In addition, the firewall feature provides identity theft protection by securing confidential corporate information and sensitive customer data," he concludes.
For more information about modern security solutions for the modern data centre, contact Troye at email@example.com or on (011) 705 2757.