Junos WebApp Secure

Junos WebApp Secure

The first Web Intrusion Prevention System (WIPS) that prevents web attackers in real time.

Junos WebApp Secure uses deception to detect, track, profile and prevent hackers in real-time. Unlike legacy signature-based approaches, WebApp Secure is the first technology that inserts thousands of detection points to proactively identify attackers before they do damage – without any false positives.

WebApp Secure disrupts the economics of a hacking attempt and lures the attacker into a trap. This allows customers to profile the hacker and gather valuable information about the threat they pose in real time.

Solutions Overview

1. Detect

Detect using deception

WebApp Secure effectively eliminates false positives because it employs tar traps to detect attacks with certainty. The software inserts detection points into web application code including URLs, forms and server files to create a variable minefield.

These traps detect hackers when they manipulate the deception points during the reconnaissance phase of the attack, before they can establish an attack vector.

Because hackers are manipulating code that has nothing to do with the website or web application, the malicious action is certain.

2. Track

Track attackers beyond the IP address

WebApp Secure captures an attacker’s IP address as one data point for tracking, but many legitimate users could also be accessing the site from the same IP address. For this reason, WebApp Secure goes beyond the IP address and tracks attackers more granularly.

Track browser attacks

Attackers using a browser are tracked by injecting a persistent token into their client. The token remains even if they clear their cache or cookies and persists across browsers, including those with privacy control features.

Track software and script attacks

Attackers using scripts and tools are tracked using a fingerprinting technique to identify the machine delivering the script.

3. Profile

Understand attackers and record their attack

The tracking techniques allow us to profile the attacker and record the attack like a DVR. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.

4. Respond

Respond to attackers

Once an attack has been detected, an appropriate response – from a warning, to requiring a CAPTCHA, blocking a user or forcing them to logout – can be deployed manually or automatically in real-time.



Download the Datasheet

Download

Juniper Networks® Junos® WebApp Secure is a Web Intrusion Deception system that does not generate false positives because it uses deceptive tar traps to detect attackers with absolute certainty.