Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Development
    • Development

    Teros-100 APS 2.0 Offers New Ideas in Web App Protection

    Written by

    Timothy Dyck
    Published February 21, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      There are now three significant players in the Web application firewall space, a field that I think offers the best approach to protecting Web applications from attack.

      Teros (former Stratum8 Networks) separates its Teros-100 Application Protection System offering from Sanctums AppShield and KaVaDos InterDo, by shipping it as a 1U rack appliance for ease of installation, security hardening and overall reliability, key for an in-line network device.

      Teros-100 APS also provides SSL acceleration in hardware, something that less expensive software-only options, such as AppShield and InterDo, dont have.

      All three products have the same core approach: They turn HTTP from a stateless protocol to a statefull one, inspecting each connected clients session to determine if a URL and parameters being submitted are a valid response, given pages the client has already seen. This approach stops worms cold because they use canned attack HTTP requests that dont lie within the set of allowable initial session URLs.

      I spoke with Teros CTO and co-founder Abhishek Chauhan and VP of Marketing Tom Bennett about the Feb. 18 launch of the companys 2.0 appliance.

      The most interesting thing they mentioned was a new set of business policy modules that go much deeper into HTML pages to look for specific types of data.

      For example, the Teros-100 APS 2.0 box uses a pattern recognition algorithm to look for credit-card-number-like strings, and will block pages that have more than one credit card number in them or only allow the last four digits of the credit card number through.

      Another option looks for password pages and automatically checks user passwords to see if they meet complexity requirements. This is done in real time and without any changes to the source application—the box will dynamically redirect users to a custom error page if it needs to break into the data stream.

      It also offers defacement prevention: Certain pages can be digitally signed to ensure their content doesnt change or pages can be blocked based on stopwords (e.g. “hax0r”) or blocked if they lack approved works (such as a copyright banner). Positive page filtering is a good way of stopping application server or database error messages from accidentally getting through to clients.

      In other areas, Teros-100 APS 2.0 has a new ability to set different security rules and delegate administrator functions on an application-by-application basis—a major increase in flexibility, but also something that InterDo already provides.

      Generated security rules are also now generalized into classes to make them easier to manage, and the box offers automatic hot failover to a backup Teros-100 APS when used in a redundant pair.

      Deep page-scanning techniques, combined with pattern recognition algorithms, allow for whole new classes of protection rules to come into force, and its an approach that will pay off.

      How do you protect your Web applications? Let me know at [email protected].

      Timothy Dyck
      Timothy Dyck
      Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.