Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/20/2011
08:28 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Forum Systems Delivers Unified Content Firewall

Next generation of flagship XML Gateway for faster, more powerful and seamless Web experience

LONDON, INFOSECURITY EUROPE 2011, BOOTH # F79 and BOSTON, April 19, 2011 – Forum Systems, a wholly owned subsidiary of Crosscheck Networks, Inc., today announced the next generation of its flagship XML Gateway fueling faster, more powerful and seamless Web experiences for users.

Forum Sentry WAF unites – natively, for the first time in one appliance – the threat protection, scalability and Federated Identity capabilities of an XML Gateway with the security of a Web Application Firewall (WAF). By removing the identity and security burden from Web sites and composite applications, this unified Content Firewall securely authenticates and authorizes users invoking services, regardless of where the services reside. Unlike legacy WAFs, Forum Sentry WAF enforces decisions across complex identity tokens and repositories and throughout the entire transaction, rapidly delivering rich online content to users without requiring multiple sign-ins.

Global enterprises continue to develop intelligent, sophisticated Web applications in response to end-users’ demands for real-time information. Content-rich, widget-driven portals presenting comprehensive user information shared between and across multiple business lines has given rise to both HTML and XML data patterns. This dynamic is causing significant challenges for organizations as current WAFs are inherently unable to support, secure and scale this ever-increasing rise in hybrid traffic.

“With the convergence of browser- and application-based technologies accessing back-end systems that house corporate and user data, the requirement for protecting that sensitive information across and between corporate boundaries is paramount,” said Mamoon Yunus, CEO of Crosscheck Networks. “Though current WAF offerings are a core component of IT infrastructures – as PCI DSS requirements mandate the use of a WAF to protect cardholder data – they cannot secure and scale both HTML and XML traffic and meet the deep content inspection demands of today’s enterprises.”

Yunus continued: “Compounding matters, the ‘light’ identity management capabilities available in the existing generation of WAFs make them woefully ill-equipped to handle Federated Identity decisions. In response to increasing customer demand fueled by such shortcomings, we are unveiling Forum Sentry WAF to power more secure, rapid and enhanced user-portal experiences.”

Forum Systems Fuels Faster Online and Mobile Banking

Based in Columbus, Georgia, Synovus is a financial services company with more than $30 billion in assets under management. Its multiple divisions provide commercial and retail banking, investment and mortgage services to customers in Georgia, Alabama, South Carolina, Florida and Tennessee.

Synovus is dedicated to delivering best-in-class service to its online and mobile banking customers. As part of that commitment, the firm ensures that when users sign in to access their accounts, network performance never impacts their ability to conduct transactions – particularly during peak business hours. To accomplish that mission, Synovus consolidated its entire banking system on Forum Systems. Now with Forum Sentry WAF centralizing XML and HTML policies and performing the requisite identity management, Synovus has reduced sign-in time by more than 20 times what it was previously – to just over 1 second – significantly enhancing its users’ experiences.

Key Forum Sentry WAF Benefits:

• Seamless, Detailed Authentication and Authorization – Complex SAML-based token types can be consumed and produced rapidly and securely with leading identity management offerings for enhanced Federated Identity decisions. • Security, Control and Visibility – o RegEx and other common filter policies, like those to protect against SQL injections, are authored, shared and maintained across the entire infrastructure to close vulnerability gaps and eliminate the need for policy duplication across separate products. o PKI management, SSL termination and initiation of HTML and XML traffic are centrally managed and maintained. • Centralized Management and Monitoring – A repository for all message types fuels better capacity planning decisions. • “Single Pane of Glass” View – Consolidation of logs and traffic in one UI serves as the foundation for more efficient and effective root-cause analysis, auditing and compliance reporting. • Reduction in “Box Fatigue” – IT has less equipment to maintain and manage within the infrastructure.

Forum Systems at Infosecurity Europe 2011 Forum Systems will be showcasing Forum Sentry WAF in Booth # F79 in the U.S. Pavilion at Infosecurity Europe 2011 taking place April 19-21, Earls Court, London UK. Forum Sentry WAF is available immediately.

About Forum Systems Forum Systems, a wholly owned subsidiary of Crosscheck Networks, Inc., is a leader in Service Oriented Architecture (SOA) and XML security. Through comprehensive Threat mitigation and Trust enablement, Forum’s family of hardware, software and cloud-based instances provides enterprises and government organizations with the foundation for achieving secure SOA federation. Processing more than one billion transactions per day worldwide, the FIPS- and DoD-certified Forum products offer the industry’s most comprehensive protection against XML- and SOAP-based vulnerabilities. Forum Sentry has been issued an industry-first patent (7,516,333) for XML security functions such as XML Encryption, XML Decryption and XML Signatures using a network appliance. For more information, please visit www.forumsys.com. # # #

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31793
PUBLISHED: 2021-05-06
An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the ...
CVE-2021-31916
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a syst...
CVE-2021-31918
PUBLISHED: 2021-05-06
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
CVE-2019-25043
PUBLISHED: 2021-05-06
ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.
CVE-2020-18889
PUBLISHED: 2021-05-06
Cross Site Request Forgery (CSRF) vulnerability in puppyCMS v5.1 that can change the admin's password via /admin/settings.php.