assuring web services integrity activeintegrity system

25
Assuring Web Services Integrity Assuring Web Services Integrity ActiveIntegrity System ActiveIntegrity System

Post on 21-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Assuring Web Services Integrity ActiveIntegrity System

Assuring Web Services IntegrityAssuring Web Services Integrity

ActiveIntegrity SystemActiveIntegrity System

Page 2: Assuring Web Services Integrity ActiveIntegrity System
Page 3: Assuring Web Services Integrity ActiveIntegrity System

Web Services as a Paradigm Shift

• Today’s Web designed for Application-Human interactions

• WS enable systematic Application-Application interactions on the Web– E-marketplaces

– Open, automated B2B e-commerce

– Business process integration on the Web

– Resource sharing, distributed computing

• Enable universal interoperability

Page 4: Assuring Web Services Integrity ActiveIntegrity System

The Four Levels of Web Security

Security

Threat

Antivirus

Disruption

Desktop

1

Encryption

Interception

Transport

2

Manual Patching

Perversion

WebApplications

4

Firewall

Illegal Access

3

NetworkNetwork

All Levels are crucial!

Page 5: Assuring Web Services Integrity ActiveIntegrity System

Web Services Hacking Scenario

Business Logic

Web Browser

Wireless Device

Another Web Service Web Services

Hacker

Invalid Content!

Page 6: Assuring Web Services Integrity ActiveIntegrity System

The Pain

• The logic of the Web Service may be damaged by internal or external hacking

• Great financial losses due to:– Theft of valuable information

– Invalid content provided to customers

– Damaged reputation

• Current solutions are not secure enough – 85% of large companies detected security breaches in the past year (Computer Security Institute, 2002)

Page 7: Assuring Web Services Integrity ActiveIntegrity System

Why Firewalls are not enough?

• 95% of all hacked web servers had a firewall

• Firewalls leave HTTP port wide open to allow Web traffic

• Hackers exploit known errors in applications that reside behind firewalls

• Firewalls of big companies are hacked on the average 10 times a year

Page 8: Assuring Web Services Integrity ActiveIntegrity System

Our Solution

Page 9: Assuring Web Services Integrity ActiveIntegrity System
Page 10: Assuring Web Services Integrity ActiveIntegrity System

ActiveIntegrity Architecture

ActiveIntegrity Server

FirewallWS Client

Web Services Business Logic

Agent

Agent

Page 11: Assuring Web Services Integrity ActiveIntegrity System

ActiveIntegrityServer

ActiveIntegrity in Action

FirewallWS Client

Web Services Business Logic

Hacked Server

Invalid Content

Notification

Recovery

Page 12: Assuring Web Services Integrity ActiveIntegrity System

ActiveIntegrity Components

• Consists of two components:– ActiveIntegrity Secure Server (hardware,software)

– ActiveIntegrity Secure Agents (software)

Page 13: Assuring Web Services Integrity ActiveIntegrity System

ActiveIntegrity Secure Server

• Highly secured dedicated server• Integrity Enforcement Point - Controls the

Secured Agents • Supports Recovery mode

Page 14: Assuring Web Services Integrity ActiveIntegrity System

ActiveIntegrity Secure Agents

• Reside on the protected servers

• Act in a distributed environment

• The Agents run in a hostile environment vulnerable to hacking attacks

• We provide a unique technology to prevent the Agents from being compromised

Page 15: Assuring Web Services Integrity ActiveIntegrity System
Page 16: Assuring Web Services Integrity ActiveIntegrity System

Market Size Evaluation

Market size is dependent upon:

ROI and current ROI and current pricing modelspricing models

Application-level Application-level securitysecurity

Composite Composite Applications Applications marketmarket

Page 17: Assuring Web Services Integrity ActiveIntegrity System

Target Market

• Composite-Applications market:$15.4B by 2003 (Gartner, 0.8 probability)

• Application-level Security market:$3.5B by 2005 (Bear Stearns)out of total security spending of $19B (IDC).

• ROI considerations…

Page 18: Assuring Web Services Integrity ActiveIntegrity System

Target Market: ROI

• 9% of companies lose about $50K per hour of server downtime

• Average downtime: 20-25 hours• Estimated damage: +$1M

Page 19: Assuring Web Services Integrity ActiveIntegrity System

Target Market

• Potential market size:Large firms considered – Fortune 5000Avg. number of web services per firm – 6.5 (META Group).Avg. price per hardware security system - $50K

Potential Sum: 5000 x 6.5 x 50K = $1,600M

• 2001 competitors revenues: $60M• Actual market size probably smaller

Page 20: Assuring Web Services Integrity ActiveIntegrity System

Market Segmentation

• Sales by Customer type:– Fortune 500 – Due to ROI considerations: 50%– Fortune 5000 – light-weight version: 20%– Federal and government bodies: 10%

– Misc. (private customers, small firms): 20%

• Estimate based upon security spending survey (Secure Computing Magazine)

Page 21: Assuring Web Services Integrity ActiveIntegrity System

Limited-protection market veteran; AT&T, e-Bay and more ($1,095)

Low-featured software for IIS web servers ($595)

1998-founded, feature-rich, multi-platform software solution ($995)

Israeli company - Feature-rich, high-end hardware solution ($54,000)

Competition

• Main competitors in web-services market:

Page 22: Assuring Web Services Integrity ActiveIntegrity System

Competitive Advantage

• Technological Advantage– Tailored especially to protect Web Services

– Unique technology for dynamic Agent Generation

– Suited for distributed applications

• Marketing Advantage– Web Services are a paradigm shift, which is not

addressed by our competitors

Page 23: Assuring Web Services Integrity ActiveIntegrity System

Pricing Model, Business Model

• System price (hardware-solution): $49,000

• Start-ups security products sales through:– Direct Sales

– OEMs

– Strategic Alliances with market leaders

Page 24: Assuring Web Services Integrity ActiveIntegrity System

Current Position

• Prototype scheduled: 7/14/2002• Beta-site tests: 10/30/2002• Future meeting planned with Gilian Technologies.

• Open Issues:– Indirect Sales partner

– Development of lightweight, software-only version

Page 25: Assuring Web Services Integrity ActiveIntegrity System

Thank You