Select Page

Web applications are everywhereIn many ways, particularly in today’s world of remote work, they are the cornerstone of daily business operations.  

However, web apps are the most frequently attacked assets in an IT environment and present some of the greatest security challenges. Why? Well, the obvious reason is that they’re public (on the internet), and they’re typically tied into a back-end system that houses restricted data, making them rich targets.   

To put the risk in perspective, the more employees there are in an organization, the greater the number of custom web apps. Add to that the fact that each web app carries an average of 22 vulnerabilities, and you end up with a significant security concern.  

So, how do you go about addressing this risk? Let’s explore the solutions:  

Web Application Firewalls (WAFs) 

WAFs are a proven technology; however, they do have drawbacks—they’re expensive, hard to manage, and can be too restrictive and not aligned to business risk. Given that mid-sized organizations can have upwards of 50 web applications, this process can quickly become unmanageable.  

Furtherconsider the fact that 80 percent of all internet traffic is encrypted. Cybercriminals hide in this encrypted traffic to carry out their attacks, and this modern encryption can’t be seen by traditional network security like intrusion detection systems (IDS) 

For example, the Diffie-Hellman encryption protocol encodes at the sender and decodes at the recipient point. Such protocols have been designed to prevent maninthemiddle attacks in which an attacker could decrypt a transmission, inject harmful code, re-encrypt, and then send it on its way. This kind of encryption prevents many IDS technologies from being effective. This requires a WAF to serve as the destination for the traffic, where it would decode it, analyze it, then send it on to its destinationThe obvious solution would be to put a WAF in front of every single web application, but this is not financially feasible for the vast majority of organizations 

Extending Your Posture with Threat Detection 

The solution is to extend your security posture, beyond prevention methods, to include log based threat detection technologies. The value of threat detection is to provide early warning, faster detection, deeper visibility, and broader coverage. Detection solutions are delivered through focused expertise in threat research, data science and analysis, deep system knowledge, and behavior analysis. They are applied everywhere an organization operates—in the cloud, in the network, and at endpoints. 

However, most vendor’s threat detection technologies do not include web applications. 

Maximizing Coverage with Web Log Analytics (WLAs) 

Alert Logic takes a unique approach to WLAs, providing specific security for web applications as part of our threat detection solution 

Through our Web Log Analytics (WLA) technology, web server access logs are routinely analyzed using a combination of techniques including pattern-matching signatures, anomaly detection, and machine learning. WLA provides detection of known vulnerabilities and exploits, anomalous behavior, attempted attacks, and unauthorized vulnerability scans. It additionally detects unknown and zero-day attack attempts on an organization’s web applications.  

The addition of WLA, included as part of Alert Logic Professional, will help you determine where you need to prioritize protection with a WAF. The two co-exist to provide maximum coverage, visibility, and protection.  

Our just-announced AWS Network Firewall extends this capability and provides yet another point of threat visibility for web applications. Through this integration, Alert Logic provides web application threat detection coverage to AWS users through a curated set of Alert Logic signatures covering thousands of web application exploits.  

Learn More—Exclusive Webinar 

To learn more, attend the exclusive webinarClosing the Gap: Comprehensive Threat Detection for Web Applications, where you will:  

  • Learn about the key capabilities needed to prevent, detect, and respond to web application attacks
  • Discover requirements to detect attacks at the endpoint, network, cloud, and application layers
  • Explore the critical role a response strategy plays in minimizing the impact of an attack

Register for the webinar here 

Bharath Vasudevan
About the Author
Bharath Vasudevan

Bharath Vasudevan is Vice President, Product Marketing at Alert Logic. His organization is responsible for the go-to-market strategy of Alert Logic’s offerings and technical marketing efforts. In addition to this, his team leads Alert Logic’s customer advocacy programs. Prior to Alert Logic, Bharath held leadership roles at Forcepoint (a subsidiary of Raytheon), Hewlett Packard Enterprise and Dell Technologies across engineering, product marketing, product management, business development, and technology partnerships. In his 20 years in the IT industry, Bharath has been very active in intellectual property programs and has received 13 patents from the USPTO covering both hardware and software designs. He holds a bachelor’s degree and a master of science in electrical and computer engineering from Carnegie Mellon University.

Related Post

March 15, 2021

What is Cloud Security?

Ready to protect your company with Alert Logic MDR?