Webcasts

This is the place to download DenyAll last recordings and Webinar to become a specialist in Web application security.

How to defend your SAP against vulnerabilities?

SAP applications are usually quite sensitive and vulnerable. While SAP continuously releases security patches – 30 per month on average – these tend not be applied systematically. Mostly because of their adverse effect on application functionality in custom environments. Indeed, administrators worry that applying patches may generate bugs and regressions. As a consequence, many companies decide not to apply them. Such organizations remain exposed to some old vulnerabilities being exploited by hackers. There is a way for companies to protect themselves however, even without modifying their environment.

Security for e-commerce sites: issue or opportunity?

The e-commerce market worth $1 671 billion in 2015, an increase of 25% from 2014. The quantity of data collected and the sheer value of transactions make e-retailer the perfect target for cybercriminals. Website security is a priority, especially when it helps ensure quality of service and data-protection for your customers.

Want to be a Super Hero? Discover DenyAll IP Reputation Service

As kids, many of us wished to be a superhero, to possess an exceptional power to demolish the villains. Today, DenyAll offers you the opportunity to become the IT superhero of your company thanks to the power of IP Reputation paired with User Reputation Scoring. You can now combine information about the category of threats an IP address has been associated with (botnets, scanners, DDoS, anonymous proxies, spammers, malware), together with a reputation score.

Customers: How to protect your shadow IT apps?

Your DenyAll WAF is doing a great job at protecting your critical web applications and services. But what about the myriads of websites your organization publishes every day, without your IT’s approval? The solution is Cloud Protector, DenyAll’s robotic WAF. Based on the same technologies you know and love. It scales automatically, takes no time to setup and costs only a fraction of what attacks may cost your business.

Partners: Looking for more margin in security with Cloud Protector?

The rise of cybercrime is slowing down your customers’ digital transformation, they need website security to become a lot more efficient and affordable than it has been. By offering a managed security service, Cloud Protector is the right solution for your customers. As a powerful service, it is leveraging a relationship of trust between our company and partners. A level of trust that should be based on a set of objective criteria.

Angel or Devil? Sort out the good user from the ugly

Contextual behavior analysis has been the way to go to sort out the good from the ugly. And it just got much better! With User Reputation Scoring, DenyAll introduces a concept that goes beyond per-request analysis and IP reputation, to sort out robots from actual people and control how the latter use their access rights.

Don’t feed the sharks with your data

“We thought we were safe, with big brand vendors securing our boat.” That’s a no-brainer, right? During this webcast, Stéphane de Saint Albin (CMO) and Vincent Maury (CTO) teach you in just 30 minutes how to prevent attackers from chipping off your IT infrastructure, using leveraging vulnerabilities your apps and web services to go after your data.

Strong Authentication for All

Users struggle with multiple IDs to access multiple applications. They need simplicity. Developers could use a centralized service handling user authentication, once and for all. You’ll discover how to help both. A solution of Web Access Management provides single sign on to all Web-based applications, the ability to deploy strong authentication, without requiring any changes to the applications, or the need to deploy an agent.

DenyAll & Numergy: Cloud Security

Join this webinar co-hosted with Numergy. Flexibility, cost control and responsiveness are the main benefits of Cloud computing for businesses. These benefits of migrating to the Cloud are recognized but some issues must be asked in order to effectively and safely.

The Hacker Ethic, from 1994 to 2014

In 1994, Steven Levy published ‘the Hacker Ethic’, in which he defined the foundation of the hacker culture in six tenets which are serving not so much as a history of the computer revolution than as a cultural investigation. What remains of that, twenty years later? Threats have evolved, technical attacks have changed but the six rules remain.

DenyAll-BeeWare Integration Roadmap

Following the acquisition of BeeWare by DenyAll, join this webinar to learn how we are going to accelerate innovation and deliver best-of-breed solutions to help you effectively protect your IT. Your applications are leaking data … What are you doing about that?

Heartbleed explained by DenyAll’s CTO

The OpenSSL bug known as Heartbleed is probably the web security vulnerability of the decade, affecting two thirds of the Internet’s servers. Since April 7th 2014, the result is a widespread panic, worldwide, as system administrators rush to secure their websites and applications. Here’s what you need to know and do.

XSS Reloaded

Cross-Site Scripting (XSS) attacks are 15 years old. Beyond simple cookie theft, XSS should be considered as the buffer overflow of the decade. However, security controls are far from being effective against this threat…

HTML5, a clear and present danger

Although not fully standardized yet, HTML5 is a reality. And potentially a very disruptive one, from a security perspective. It’s time to understand how its many innovations can turn into serious threats. The cybercrime industry is retrofiting existing attack tools and creating new ones to take advantage of HTML5’s specific features.

Dinosaurs will die, will your security survive?

The strong adoption of new evasion techniques, associated to technologies such as HTML5 and JSON, are structurally incompatible with existing scanning engines. They will accelerate the obsolescence of application security systems, be it older or “next generation” ones. They are currently a real break line in information systems that nobody dares to question. However we should be more awareness of the fact, and suggest a more credible alternative.