Web Insight
 
Web Insight °³¿ä

Positive Security Model ±â¹ÝÀÇ Web Insight´Â °ø°ÝÆÐÅÏ¿¡ ÀÇÁ¸ÇÏ´Â ±âÁ¸ÀÇ Signature-based Àåºñµé°ú´Â ´Þ¸® Signature Based Inspection±â¼ú°ú Profile Based Inspection±â¼úÀ» ¸ðµÎ Àû¿ëÇÑ °­·ÂÇÑ Stream Inspection¿¡ ÀÇÇØ ¸ðµç À¥Æ®·¡ÇȵéÀ» °Ë»çÇÑ ÈÄ Á¤»óÀûÀÎ Æ®·¡Çȵ鸸À» À¥¼­¹ö·Î Àü´ÞÇÏ¿© À¥¼­¹ö¿Í À¥¾ÖÇø®ÄÉÀÌ¼Ç Ãë¾àÁ¡À» ºÐ¼®ÇÏ¿© ±â¾÷ÀÇ Áß¿ä À¥ ¾ÖÇø®ÄÉÀ̼ÇÀ» º¸È£Çϱâ À§ÇØ °³¹ßµÈ Á¦Ç°ÀÔ´Ï´Ù.

Why Web Insight¢â ?

ÃÖ±Ù E-Commerce°¡ ±Þ¼ÓÈ÷ ¹ßÀüÇÔ°ú µ¿½Ã¿¡ »ç¿ëÀÚÀÇ °³ÀÎÁ¤º¸°¡ À¯ÃâµÇ°Å³ª ±â¾÷ÀÇ È¨ÆäÀÌÁö º¯Á¶, ±ÝÀ¶»ç°íµî°ú °°Àº ÇØÅ·»ç°í°¡ ±ÞÁõÇϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ »ç°ÇµéÀº ´ëºÎºÐ ½Ã½ºÅÛÀ» Á÷Á¢ ÇØÅ·Çϴ°ÍÀÌ ¾Æ´Ï¶ó ´©±¸¿¡°Ô³ª °³¹æµÇ¾î Àִ ȨÆäÀÌÁö¸¦ ÅëÇØ¼­ ½Ã½ºÅÛ¿¡ ħÅõÇÏ´Â °ÍÀÔ´Ï´Ù. µû¶ó¼­, ±âÁ¸ÀÇ ¹æÈ­º®À̳ª IDS, IPS µî¸¸À¸·Î´Â ÀÌ·¯ÇÑ À¥ÇØÅ·À» Â÷´ÜÇÒ ¼ö ¾ø°Ô µÇ¾ú½À´Ï´Ù.

WebÀ» ÀÌ¿ëÇÑ °ø°Ý±â¹ýÀº ²ÙÁØÈ÷ ¹ßÀüÇϸ鼭 Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ÀϹÝÀûÀ¸·Î ¹ß»ýÇÏ´Â WebÀ» ÀÌ¿ëÇÑ °ø°Ý¹æ¹ý¸¸Çصµ cross-site scripting, SQL Injection, Buffer overflow¸¦ ºñ·ÔÇÏ¿© 20¿©Á¾ µÇ°í °ø°´µÈ °ø°ÝÀº 4,000°³ÀÌ»óÀ̰í, ¾Ë·ÁÁöÁö¾ÊÀº °ø°ÝÀ» Æ÷ÇÔÇÑ´Ù¸é ¿ì¸®´Â Ç×»ó ³ª»Û °ø°Ý¿¡ ´ëÇØ ºÒ¾ÈÇØ Çϸ鼭, ±× °ø°Ý¿¡ ´ëÇØ Áغñ¸¦ ÇØ¾ß¸¸ Çϰí, ¹«¹æºñ »óÅ¿¡¼­ °ø°ÝÀ» ¹Þ¾ÒÀ» °æ¿ì °ø°³µÇÁö¾ÊÀº payloadÀÇ Á¢±ÙÀÌ °¡´ÉÇϰí, Àΰ¡µÇÁö ¾ÊÀº applicaationÀ¸·ÎÀÇ Á¢±ÙÀÌ °¡´ÉÇϸç, PasswordÀÇ µµ³­, °í°´Á¤º¸ÀÇ µµ³­, °í°´ µ¥ÀÌÅÍÀÇ µµ³­, µ¥ÀÌÅÍÀÇ º¯Çü¼­ºñ½º Áß´Ü, web-sight ÈѼÕ, µ¥ÀÌÅÍ »èÁ¦µîÀÇ ºÒÀÌÀÍÀ» ´çÇÏ°Ô µË´Ï´Ù.

Web Insight¢â´Â ÀÌ·¯ÇÑ À¥ ÇØÅ·°ø°Ý¿¡ ´ëÇØ ÃÖ°í ¼öÁØÀÇ ÇØÅ·Â÷´Ü ¼­ºñ½º¸¦ Á¦°øÇÏ¿© °í°´ÀÇ ±â¾÷ºê·£µå À̹ÌÁöÁ¦°í¿Í Áö¼ÓÀûÀÎ ¼öÀÍâÃâ¿¡ µµ¿òÀ» µå¸±°ÍÀÔ´Ï´Ù.




The Positive Security model

Web Insight¢â´Â ÃÖÃÊ ÀÏÁ¤ ±â°£ Learning °úÁ¤À» °ÅÃÄ À¥ ¼­¹öÀÇ Á¤»óÀûÀÎ Åë½ÅµéÀ» ProfilingÈ­ ÇÑ ÈÄ Å¬¶óÀÌ¾ðÆ®µéÀÇ Requestµé°ú ºñ±³ÇÏ¿© Á¤»óÀûÀÌÁö ¾ÊÀº RequestµéÀº ÀáÀçÀûÀÎ À§Çù¿ä¼Ò·Î ÆÇ´ÜÇÏ¿© Â÷´ÜÇÕ´Ï´Ù.
ÀÌ·¯ÇÑ Security modelÀº ±âÁ¸ÀÇ Signature-based model°ú º´ÇàÇÏ¿© ¿î¿ëÇÔÀ¸·Î½á ¾Ë·ÁÁöÁö ¾ÊÀº ÇØÅ·°ø°ÝÀ¸·ÎºÎÅÍ °¡Àå È¿°úÀûÀ¸·Î À¥»çÀÌÆ®¸¦ º¸È£ÇÒ ¼ö ÀÖ½À´Ï´Ù.





Advan Application Inspection

Web Insight¢âÀÇ °­·ÂÇÑ Stream InspectionÀº ÇöÀç¿Í °°ÀÌ º¹ÀâÇÑ À¥ ȯ°æÇÏ¿¡¼­ ±â¾÷ÀÇ Áß¿äÇÑ ºñÁî´Ï½º ¼ö´ÜÀÎ À¥ »çÀÌÆ®ÀÇ ¾ÈÀüÀ» Æø³Ð°Ô º¸È£ÇÏ¿© ÁÖ´Â Çٽɱâ´ÉÀÔ´Ï´Ù.

Web Insight¢â´Â Ŭ¶óÀÌ¾ðÆ®¿Í À¥ ¼­¹ö »çÀÌÀÇ ¸ðµç Æ®·¡ÇȵéÀ» ¾ç¹æÇâÀ¸·Î °¨½ÃÇϸ鼭 ÇØÅ· °ø°ÝµéÀ» »çÀü¿¡ Â÷´Ü(Bi-directional Inspection)½Ãŵ´Ï´Ù.

¸ðµç TransactionµéÀº Stream Inspection¿¡ ÀÇÇØ µ¿ÀûÀ¸·Î °Ë»çµÇ¾îÁö¸ç, ÇØÅ·°ø°Ý ¶Ç´Â ÀáÀçÀûÀÎ À§Çù¿ä¼ÒµéÀÌ ³ªÅ¸³¯½Ã ·Î±×¸¦ ±â·ÏÇÏ°í °ü¸®ÀÚ¿¡°Ô °æ°í¸Þ½ÃÁö¸¦ ÅëÁöÇÕ´Ï´Ù.



Strong Prevetion of Information Leakage

Web Insight¢â´Â Web server°¡ º¸À¯Çϰí ÀÖ´Â Áß¿äÇÑ Á¤º¸µéÀÌ ÇØÄ¿¿¡ ÀÇÇØ À¯ÃâµÇÁö ¾Êµµ·Ï ¾Æ·¡¿Í °°Àº ´Ù¾çÇÑ ±â´ÉµéÀ» Á¦°øÇÕ´Ï´Ù.

- Web Server Cloaking
- Web serverÀÇ response¸¦ Á¶ÀÛÇÔÀ¸·Î¼­ ÇØÄ¿ÀÇ Web server ºÐ¼®½Ãµµ¸¦ »çÀü ¿¡ Â÷´Ü.
- Data Theft Prevention
- Áֹεî·Ï¹øÈ£, ½Å¿ëÄ«µå¹øÈ£ °°Àº Áß¿äÇÑ Á¤º¸µéÀÌ À¯ÃâµÇ´Â °ÍÀ» Â÷´Ü.
- Error Page Appointment by Administrator
- ÇØÄ¿¿¡ ÀÇÇØ °íÀÇÀûÀ¸·Î À¯¹ßµÈ Error page¸¦ ÅëÇÑ Á¤º¸À¯ÃâÀ» °ü¸®ÀÚ°¡ Error page¸¦ ÀÓÀÇ·Î ÁöÁ¤ÇÔÀ¸·Î¼­     ¹æÁö.
- Cookie Encryption
- Cookie¸¦ ÅëÇÑ Áß¿äÁ¤º¸ÀÇ À¯ÃâÀ» ¸·±â À§ÇØ Cookie¸¦ ¾ÏȣȭÇÔ.




Efficient Centralized Management

Áß¾ÓÀÇ °ü¸®ÀÚ´Â ¿©·¯ »çÀÌÆ®µé¿¡ ¹èÄ¡µÈ Web Insight¢âµéÀ» Áß¾Ó Manager¸¦ ÅëÇØ ¸ðµç Á¤Ã¥°ú °ü¸®À» Á¦¾îÇϸç, °¢ »çÀÌÆ®ÀÇ °ü¸®ÀÚ´Â ºÎ¿©µÈ ±ÇÇÑÀ» ¹ÙÅÁÀ¸·Î ÀÓ¹«¸¦ ¼öÇàÇÕ´Ï´Ù.

¶ÇÇÑ, °ü¸®ÀÚµéÀº Web Insight¢âÀÇ ´Ù¾çÇÏ°í °­·ÂÇÑ ¸®Æ÷ÆÃ ±â´ÉµéÀ» ÅëÇØ º¸¾È°ü·Ã ¹®Á¦µéÀ» »çÀü¿¡ ºÐ¼®ÇÏ°í ¹æÁöÇÒ ¼ö ÀÖ½À´Ï´Ù.

- Health Checking for Gateway
- Use Statistics of web service
- Real time monitoring to chase attacker
- Functions for log searching, analysis and filtering