Attacks/Breaches
7/25/2012
04:45 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Micro​soft/Trust​wave Expand ModSecurit​y To IIS And Nginx Servers

ModSecurity is a free, open source Web application firewall

CHICAGO– July 25, 2012 – Trustwave, a leading provider of cloud-based compliance and information security solutions, today announced that the popular, open source ModSecurity® Web Application Firewall now supports the top three Web server platforms, including new support for Microsoft’s Internet Information Services (IIS) and Nginx, in addition to existing support for Apache Web servers. Trustwave collaborated with the Microsoft Security Response Center (MSRC) to extend the reach of ModSecurity to Microsoft IIS.

Web applications allow companies to use the power of the Internet to conduct business and interface with a larger market, delivering a better user experience for their customers and partners. With this growth in usage, attackers are targeting Web applications to break into the core of an organization and gain access to its privileged information.

ModSecurity is a free, open source Web application firewall (WAF) that is continuously developed and managed by SpiderLabs, Trustwave's advanced security team. This open source technology enforces security policies to Web transactions, reducing the risk of Web-based attacks. As an open source technology, users and developers contribute to the community to help maintain a sustainable solution that defends Web applications.

"Having ModSecurity available for these additional platforms will help organizations protect their Web applications from attacks," said Nicholas J. Percoco, senior vice president and head of Trustwave SpiderLabs. "As the principal custodian of the ModSecurity open source product, we believe this new support for Microsoft IIS and Nginx will further expand the popularity of the industry’s open-source Web application firewall.”

Trustwave’s participation in the Microsoft Active Protections Program (MAPP), a program for security software providers, gives Trustwave early insight into “Patch Tuesday” vulnerabilities. Trustwave SpiderLabs uses this insight to develop protections for Trustwave products, including Trustwave’s managed security services and its Web application firewalls, Web Defend and ModSecurity.

"It is critical for organizations to address identified Web application vulnerabilities as soon as possible," added Percoco. "ModSecurity is an excellent tool for addressing the vulnerability before the Web application can be updated. Our update for ModSecurity is another testament to Trustwave’s commitment to helping organizations secure their applications and data.”

ModSecurity is a viable option for organizations such as hosting providers that have multiple customers using Web applications or companies that want a deeply customized Web application firewall to protect their Web application environment.

Trustwave also offers a proprietary Web application firewall called Trustwave Web Defend, which gives organizations a simplified and easy-to-install Web application firewall that offers out-of-the-box reporting, a graphical user interface, and secured integration with Trustwave SIEM. Trustwave WebDefend can be purchased as a stand-alone product, or as a component of the Trustwave360 Application Security program, which combines secure code training, application penetration testing and code review with the Trustwave Web Defend Web application firewall.

Supporting this announcement, Greg Wroblewski of Microsoft’s Security Response Center and Ryan Barnett of Trustwave SpiderLabs will present: “ModSecurity as a Universal Cross-Platform Web Protection Tool,” and give live demonstrations as part of Arsenal Tools at the Black Hat USA2012 security conference in Las Vegas, today, July 25.

The latest version of ModSecurity is currently available at http://www.modsecurity.org/download/.

About Trustwave

Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper® portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices worldwide. For more information, visit https://www.trustwave.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MROBINSON000
50%
50%
MROBINSON000,
User Rank: Apprentice
8/2/2012 | 12:19:07 PM
re: Micro​soft/Trust​wave Expand ModSecurit​y To IIS And Nginx Servers


We think that WAF is not a solution to the application
security problem challenging us today. WAFs have their place, we canG«÷t deny it,
but that is just a small part of the story. For more information about our
vision, we invite you to read the following article: http://blog.securityinnovation...


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web