10 - 12 October 2017 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Zoom product LOGO_Web Application Firewalls

Web Application Firewalls

LOGO_Web Application Firewalls

Web Application Firewalls

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Send
Your message has been sent.

Would you like to use more facilities and advantages of the platform? Then please log in – or register here.

An error has occurred.

Web Application Firewalls are considered a special case of classical protection software and are mainly used to defend against attacks on web applications. They are also known as Web Shield or Application Layer Gateway.

The web application firewall monitors the communication on the application-level and detects intrusion attempts like SQL- and command-injection, cross-site scripting. It blocks malicious attempts and protects the application from damage or other undesirable behavior.

A preliminary learning phase is often used to prevent unnecessary interference with the normal operation. The web application firewall can be operated in a purely passive fashion, in which unallowed actions e.g. are just written to a log file.

On the basis of this log file, it can be decided whether the web application firewall works as expected or additional rules need to be defined.

Once put into operation, the web application firewall simultaneously protects all applications located behind it. This also applies to closed source applications like software from third party providers or for unmaintained legacy systems.

Despite these advantages, you should never blindly trust protection software or regard it as a replacement for secure programming. Filter rules need to be constantly updated and log files regularly checked for anomalies.

Reverse Engineering von Binärprogrammen, Verfahren und Geräten

LOGO_Reverse Engineering von Binärprogrammen, Verfahren und Geräten

Guidelines and Policies

LOGO_ Secure Coding Guidelines und Policys, sonstige Leitlinien und Standards

Penetration Testing

LOGO_Penetrationstests

Source Code Analysis

LOGO_Toolgestützte Source Code Analysen, statisch und dynamisch

There are no entries in your notes.

Show notes



top

The selected entry has been placed in your notes!

If you register you can save your notes permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your notes permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your notes mobile too! Simply log in and access them at anytime.