Cisco News

Five Networking Trends You Can’t Ignore at Gartner IT Symposium/XPO

Whether you’re the CIO of a Fortune 500 company, or you’re managing the still-complex network strategy of a smaller company, you need to know what to prepare for—what are the trends in networking you can’t ignore? I am delighted to speak at next week’s Gartner
/
Google News

Breast cancer and tech…a reason for optimism

I was diagnosed with breast cancer twice, in 2001 and again in 2004. Thanks to early detection and access to extraordinary care—including multiple rounds of chemo, radiation and more surgery than any one person should ever have in a lifetime—I’m still here and able to
/
Bots

Protect Your Web Applications with a Firewall That Understands Your AWS Environment

Protect Your Web Applications with a Firewall

MediaTemple & CloudTweaks Thought Leadership Brand Series

As cloud computing moves closer and closer to the center of business operations, there are more threats than ever from malicious players looking to hack or disrupt the flow of data. It seems that every month there are stories about huge data hacks where millions of users’ most private information is stolen by shadowy, well-organized groups of criminals.

In sports, coaches often say that attack is the best form of defense. On the web, that thinking can be applied to the use of firewalls that  can block malicious requests before they reach your server.  The AWS Web Application Firewall (“WAF”) includes a full-featured API, in addition to the AWS Management Console, that can be used to automate the creation, deployment, and maintenance of web security rules.

5 Of The Most Common Attacks You May Experience

  • DDoS Attack: Using an overwhelming flood of internet traffic, malicious actors attempt to disrupt the normal flow of information to and from a server by using multiple exploited machines and IoT devices.
  • Bad Bots: Malicious users can hide their identities behind bad bots “which can be used for many different purposes, such as price scraping, Distributed Denial of Service (“DDoS”) attacks, account takeover, and many more malicious ways that defraud a brand or website.”
  • Cross-site Scripting (XSS): A common vulnerability that dupes an application into sending a malicious script through the browser, which then believes the script is coming from the trusted website.
  • HTTP Floods: ‘a type of DDoS attack in which the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application. … This makes HTTP flood attacks significantly harder to detect and block.”
  • SQL Injection: A code injection technique where malicious code is inserted into the SQL statements. It’s designed to force a database to dump its contents to the attacker.

It’s not enough to be protected from some threats but not others. A broad overview of the security environment needs to be developed and monitored in real-time.

Companies are increasingly turning to cloud deployments for their rich feature set, improved time to market and significant cost savings over traditional infrastructure,” according to the CTO of Drawbridge Partners, Viktor Tadijanovic.While cloud technology can be made very secure, the array of available configurable options must be taken into serious consideration. Maintaining cybersecurity and compliance can be challenging if resource provisioning is not thoughtfully planned, especially as the ease of provisioning new resources leaves the potential threat of resource sprawl and minimal controls. Implementing uniform policies holistically over the entire cloud infrastructure is crucial to maintaining a secure and compliant program.”

One of the most effective tools to monitor your cloud security is through Amazon’s Web Application Firewall that ‘gives you control over which traffic to allow or block to your web applications by defining customizable web security rules.’

Media Temple deploys the AWS WAF via its Managed Cloud offering in order to keep your site safe, reduce potential downtime and protect your customers. Our WAF setup is setup to block 10 universal attacks, and can also be extended to a full custom rule set which will..Prevent hacks and vulnerability exploits

  • Stop brute force attempts on site login pages
  • Protect against the OWASP Top 10 and more
  • Mitigate Distributed Denial-of-Service (DDoS) attacks

We also make certain that WAF is seamlessly integrated with your Amazon CloudFront so that all your rules run in AWS CloudFront Edge locations that are closest to your clients, as well as the ability to block or blacklist full subnets of IPs.

Security is vital, but it should not come at the expense of performance.

That’s why Media Temple uses a global content delivery network (“CDN”), advanced content optimization, and caching in order to ensure high-speed delivery that is still 100% secure.

Our state-of-the-art CDN and WAF systems offer you faster load times around the world, as well as reduced bandwidth on your primary server and secure end-to-end encryption for SSL. Together, the software blocks hacks and attacks and virtually patches vulnerabilities and offers peace of mind for you to deploy your most sensitive applications, and your most valuable data, to the cloud.

Media Temple’s CDN & WAF solution is available for all our hosting customers through our Cloud Managed Services. If you’re ready for a more complete security package, then click here and find out what MediaTemple can do for you.

By Jeremy Daniel

  • Recent Articles
Jeremy Daniel Contributor
Technology Writer
Jeremy Daniel is an author, online marketing strategist and a firm believer in the transformative power of mobile technology for emerging markets. Jeremy has written across various media platforms since 2001, from television to advertising to print, and spends most of his time in the beautiful city of Cape Town, South Africa.
How Can We Use Artificial Intelligence When We Can't Handle Real Intelligence?

How Can We Use Artificial Intelligence When We Can’t Handle Real Intelligence?

Artificial Versus Real Intelligence In this article we will be discussing the pitfalls of societal disillusionment with facts, and how this trend may become troubling ...
The Cloudification of Healthcare: Benefits and Risks

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The healthcare industry is no exception ...
Daren Glenister

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security and private industry to ensure ...
Brian Wheeler

3 Major Concerns For The Cloud

Concerns For The Cloud With the rise of cloud computing, different concerns about adopting the cloud have arisen over the years. In 2016, the top ...
Daren Glenister

What’s Next In Cloud And Data Security?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data ...
It Programs Compressor