infoTECH Feature

August 10, 2012

Cenzic - Protecting Big Data from Malicious Attacks

One of the most frequently cited reasons companies give for putting off going to cloud-based computing is the risk of security compromises. Cenzic, a provider of security intelligence for Web applications, recently announced a joint solution that should put the fear of security risks in the cloud at ease.

F5 Networks (News - Alert), a company that specializes in IT infrastructure with open architectural framework, is teaming with Cenzic to provide a solution that gives users a way to give visibility to their processes and reveal vulnerabilities that were otherwise hidden.

The partnership has produced the “virtual patch,” a way users can implement policies with one click.

F5 has integration abilities through its BIG-IP ASM (News - Alert), which allows the automation of Cenzic cloud-based solutions and software. Users can apply the ASM GUI to run scans and check for the variety of vulnerabilities that could possibly compromise the security of a company’s network. The results of the scans are then displayed against the various policies and ASM rules.

Historically, Web applications come up as the most-often attacked aspect of a cloud-based computing solution. Cenzic’s solution uses a behavioral model to identify vulnerable areas. The model actually simulates attack scenarios to lead the way to the weak link.

There are a variety of compliance standards that companies have to live by, PCI standards being one of the most often identified. Using the BIG-IP ASM, companies will find that their security compliance standards are easily evaluated and safeguarded.

To show the value that this partnership can give to users, Cenzic and F5 are offering three free scans to interested parties. Uptime is critical, so Cenzic is able to achieve these scans on websites without having to bring the site down. Business can go on as usual while the partners work their magic.

What is clear is that users of the Cenzic/F5 product are achieving benefits, including better application security. New applications can be brought online faster. Companies have also seen a reduction in the expenditures in the realm of risk management.

“This solution collectively offers more than the sum of these two mature and highly useful components,” said John Weinschenk, president and CEO at Cenzic. “Users are now able to efficiently and quickly improve security for a large number of web sites while getting the most out of existing F5 BIG-IP devices and reducing ASM management costs.”

Prospective clients of the Cenzic/F5 partnership need not worry about interoperability; the partnership has it covered with its award-winning Web application firewall and the BIG-IP component of the solution. The joint project has developed threat management solutions that can be up and running in no time and without disruption to the day-to-day business.

Weinschenk recently joined Rich Tehrani (News - Alert) in the TMC newsroom in San Jose for the Roadshow. “One of the challenges is that its big data,” he shared during an interview. “When you make queries, you are making a request and the information is coming from the big database. Hackers don’t just ask a question; they confuse the database. The result is the database provides all information that may match the confusing request. Unfortunately, there are a lot of ways to manipulate a website to steal information.”



Check out the rest of their conversation in the TMC (News - Alert) video above. 

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. ITEXPO (News - Alert) offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. For more information on registering for ITEXPO click here.

Stay in touch with everything happening at ITEXPO. Follow us on Twitter.




Edited by Braden Becker
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers