Why Web Insight¢â
?
ÃÖ±Ù E-Commerce°¡ ±Þ¼ÓÈ÷ ¹ßÀüÇÔ°ú µ¿½Ã¿¡ »ç¿ëÀÚÀÇ °³ÀÎÁ¤º¸°¡ À¯ÃâµÇ°Å³ª ±â¾÷ÀÇ È¨ÆäÀÌÁö º¯Á¶,
±ÝÀ¶»ç°íµî°ú °°Àº ÇØÅ·»ç°í°¡ ±ÞÁõÇϰí ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ »ç°ÇµéÀº ´ëºÎºÐ ½Ã½ºÅÛÀ» Á÷Á¢ ÇØÅ·Çϴ°ÍÀÌ ¾Æ´Ï¶ó
´©±¸¿¡°Ô³ª °³¹æµÇ¾î Àִ ȨÆäÀÌÁö¸¦ ÅëÇØ¼ ½Ã½ºÅÛ¿¡ ħÅõÇÏ´Â °ÍÀÔ´Ï´Ù. µû¶ó¼, ±âÁ¸ÀÇ ¹æÈº®À̳ª IDS,
IPS µî¸¸À¸·Î´Â ÀÌ·¯ÇÑ À¥ÇØÅ·À» Â÷´ÜÇÒ ¼ö ¾ø°Ô µÇ¾ú½À´Ï´Ù.
WebÀ» ÀÌ¿ëÇÑ °ø°Ý±â¹ýÀº ²ÙÁØÈ÷ ¹ßÀüÇÏ¸é¼ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ÀϹÝÀûÀ¸·Î ¹ß»ýÇÏ´Â WebÀ» ÀÌ¿ëÇÑ °ø°Ý¹æ¹ý¸¸Çصµ
cross-site scripting, SQL Injection, Buffer overflow¸¦ ºñ·ÔÇÏ¿©
20¿©Á¾ µÇ°í °ø°´µÈ °ø°ÝÀº 4,000°³ÀÌ»óÀ̰í, ¾Ë·ÁÁöÁö¾ÊÀº °ø°ÝÀ» Æ÷ÇÔÇÑ´Ù¸é ¿ì¸®´Â Ç×»ó ³ª»Û °ø°Ý¿¡
´ëÇØ ºÒ¾ÈÇØ Çϸé¼, ±× °ø°Ý¿¡ ´ëÇØ Áغñ¸¦ ÇØ¾ß¸¸ Çϰí, ¹«¹æºñ »óÅ¿¡¼ °ø°ÝÀ» ¹Þ¾ÒÀ» °æ¿ì °ø°³µÇÁö¾ÊÀº
payloadÀÇ Á¢±ÙÀÌ °¡´ÉÇϰí, Àΰ¡µÇÁö ¾ÊÀº applicaationÀ¸·ÎÀÇ Á¢±ÙÀÌ °¡´ÉÇϸç, PasswordÀÇ
µµ³, °í°´Á¤º¸ÀÇ µµ³, °í°´ µ¥ÀÌÅÍÀÇ µµ³, µ¥ÀÌÅÍÀÇ º¯Çü¼ºñ½º Áß´Ü, web-sight ÈѼÕ, µ¥ÀÌÅÍ
»èÁ¦µîÀÇ ºÒÀÌÀÍÀ» ´çÇÏ°Ô µË´Ï´Ù.
Web Insight¢â´Â ÀÌ·¯ÇÑ À¥ ÇØÅ·°ø°Ý¿¡ ´ëÇØ ÃÖ°í ¼öÁØÀÇ ÇØÅ·Â÷´Ü ¼ºñ½º¸¦ Á¦°øÇÏ¿© °í°´ÀÇ ±â¾÷ºê·£µå
À̹ÌÁöÁ¦°í¿Í Áö¼ÓÀûÀÎ ¼öÀÍâÃâ¿¡ µµ¿òÀ» µå¸±°ÍÀÔ´Ï´Ù.

|
The Positive Security model
Web Insight¢â´Â ÃÖÃÊ ÀÏÁ¤ ±â°£ Learning °úÁ¤À» °ÅÃÄ À¥ ¼¹öÀÇ Á¤»óÀûÀÎ Åë½ÅµéÀ» ProfilingÈ
ÇÑ ÈÄ Å¬¶óÀÌ¾ðÆ®µéÀÇ Requestµé°ú ºñ±³ÇÏ¿© Á¤»óÀûÀÌÁö ¾ÊÀº RequestµéÀº ÀáÀçÀûÀÎ À§Çù¿ä¼Ò·Î ÆÇ´ÜÇÏ¿©
Â÷´ÜÇÕ´Ï´Ù.
ÀÌ·¯ÇÑ Security modelÀº ±âÁ¸ÀÇ Signature-based model°ú º´ÇàÇÏ¿© ¿î¿ëÇÔÀ¸·Î½á
¾Ë·ÁÁöÁö ¾ÊÀº ÇØÅ·°ø°ÝÀ¸·ÎºÎÅÍ °¡Àå È¿°úÀûÀ¸·Î À¥»çÀÌÆ®¸¦ º¸È£ÇÒ ¼ö ÀÖ½À´Ï´Ù.
Advan Application Inspection
Web Insight¢âÀÇ °·ÂÇÑ Stream InspectionÀº ÇöÀç¿Í °°ÀÌ º¹ÀâÇÑ À¥ ȯ°æÇÏ¿¡¼ ±â¾÷ÀÇ
Áß¿äÇÑ ºñÁî´Ï½º ¼ö´ÜÀÎ À¥ »çÀÌÆ®ÀÇ ¾ÈÀüÀ» Æø³Ð°Ô º¸È£ÇÏ¿© ÁÖ´Â Çٽɱâ´ÉÀÔ´Ï´Ù.
Web Insight¢â´Â Ŭ¶óÀÌ¾ðÆ®¿Í À¥ ¼¹ö »çÀÌÀÇ ¸ðµç Æ®·¡ÇȵéÀ» ¾ç¹æÇâÀ¸·Î °¨½ÃÇÏ¸é¼ ÇØÅ· °ø°ÝµéÀ»
»çÀü¿¡ Â÷´Ü(Bi-directional Inspection)½Ãŵ´Ï´Ù.
¸ðµç TransactionµéÀº Stream Inspection¿¡ ÀÇÇØ µ¿ÀûÀ¸·Î °Ë»çµÇ¾îÁö¸ç, ÇØÅ·°ø°Ý ¶Ç´Â
ÀáÀçÀûÀÎ À§Çù¿ä¼ÒµéÀÌ ³ªÅ¸³¯½Ã ·Î±×¸¦ ±â·ÏÇÏ°í °ü¸®ÀÚ¿¡°Ô °æ°í¸Þ½ÃÁö¸¦ ÅëÁöÇÕ´Ï´Ù.
Strong Prevetion of Information Leakage
Web Insight¢â´Â Web server°¡ º¸À¯Çϰí ÀÖ´Â Áß¿äÇÑ Á¤º¸µéÀÌ ÇØÄ¿¿¡ ÀÇÇØ À¯ÃâµÇÁö ¾Êµµ·Ï
¾Æ·¡¿Í °°Àº ´Ù¾çÇÑ ±â´ÉµéÀ» Á¦°øÇÕ´Ï´Ù.
- Web Server Cloaking
- Web serverÀÇ response¸¦ Á¶ÀÛÇÔÀ¸·Î¼ ÇØÄ¿ÀÇ Web server ºÐ¼®½Ãµµ¸¦ »çÀü ¿¡ Â÷´Ü.
- Data Theft Prevention
- Áֹεî·Ï¹øÈ£, ½Å¿ëÄ«µå¹øÈ£ °°Àº Áß¿äÇÑ Á¤º¸µéÀÌ À¯ÃâµÇ´Â °ÍÀ» Â÷´Ü.
- Error Page Appointment by Administrator
- ÇØÄ¿¿¡ ÀÇÇØ °íÀÇÀûÀ¸·Î À¯¹ßµÈ Error page¸¦ ÅëÇÑ Á¤º¸À¯ÃâÀ» °ü¸®ÀÚ°¡ Error page¸¦ ÀÓÀÇ·Î
ÁöÁ¤ÇÔÀ¸·Î¼ ¹æÁö.
- Cookie Encryption
- Cookie¸¦ ÅëÇÑ Áß¿äÁ¤º¸ÀÇ À¯ÃâÀ» ¸·±â À§ÇØ Cookie¸¦ ¾ÏÈ£ÈÇÔ.
|
Efficient Centralized Management
Áß¾ÓÀÇ °ü¸®ÀÚ´Â ¿©·¯ »çÀÌÆ®µé¿¡ ¹èÄ¡µÈ Web Insight¢âµéÀ» Áß¾Ó Manager¸¦ ÅëÇØ ¸ðµç Á¤Ã¥°ú
°ü¸®À» Á¦¾îÇϸç, °¢ »çÀÌÆ®ÀÇ °ü¸®ÀÚ´Â ºÎ¿©µÈ ±ÇÇÑÀ» ¹ÙÅÁÀ¸·Î ÀÓ¹«¸¦ ¼öÇàÇÕ´Ï´Ù.
¶ÇÇÑ, °ü¸®ÀÚµéÀº Web Insight¢âÀÇ ´Ù¾çÇÏ°í °·ÂÇÑ ¸®Æ÷ÆÃ ±â´ÉµéÀ» ÅëÇØ º¸¾È°ü·Ã ¹®Á¦µéÀ» »çÀü¿¡
ºÐ¼®ÇÏ°í ¹æÁöÇÒ ¼ö ÀÖ½À´Ï´Ù.
- Health Checking for Gateway
- Use Statistics of web service
- Real time monitoring to chase attacker
- Functions for log searching, analysis and filtering
|