This is the place to download DenyAll last recordings and Webinar to become a specialist in Web application security.

DenyAll is acquired by Rohde & Schwarz Cybersecurity

DenyAll is acquired by Rohde & Schwarz Cybersecurity, the leading German Cybersecurity company, further expanding its current portfolio of network and endpoint security, management solutions, and contributing additional sales and marketing presence. During this webinar, Ammar Alkassar, CEO of Rohde & Schwarz Cybersecurity and Jacques Sebag, CEO of DenyAll are covering all you need to know about this acquisition.

7 tips to vulnerability scanning in a digital world

The digital world abounds with rapidly expanding opportunities for innovation and businesses. In the rush, many precautions have been neglected and over 86 percent of websites and web applications contain at least one serious vulnerability that could lead to the theft of sensitive corporate data and customer information. Simone Hoefig (Territory Manager) and Harald Beutlhauser (Team Account Manager) has rolled up their sleeves during this webinar with 7 tips to help you stay ahead of the game in the digital world

The NextGen Web Application Firewall is here!

DenyAll announced a major update of DenyAll Web Application Firewall 6.2 that will be very useful for your business! In this webinar, Stéphane de Saint Albin (CMO) and Jean-Philippe Rantin (Technical Account Manager) have revealed the new functionnalities that you should be aware of.

Security for e-commerce sites: issue or opportunity?

The e-commerce market worth $1 671 billion in 2015, an increase of 25% from 2014. The quantity of data collected and the sheer value of transactions make e-retailer the perfect target for cybercriminals. Website security is a priority, especially when it helps ensure quality of service and data-protection for your customers.

Want to be a Super Hero? Discover DenyAll IP Reputation Service

As kids, many of us wished to be a superhero, to possess an exceptional power to demolish the villains. Today, DenyAll offers you the opportunity to become the IT superhero of your company thanks to the power of IP Reputation paired with User Reputation Scoring. You can now combine information about the category of threats an IP address has been associated with (botnets, scanners, DDoS, anonymous proxies, spammers, malware), together with a reputation score.

Customers: How to protect your shadow IT apps?

Your DenyAll WAF is doing a great job at protecting your critical web applications and services. But what about the myriads of websites your organization publishes every day, without your IT’s approval? The solution is Cloud Protector, DenyAll’s robotic WAF. Based on the same technologies you know and love. It scales automatically, takes no time to setup and costs only a fraction of what attacks may cost your business.

Partners: Looking for more margin in security with Cloud Protector?

The rise of cybercrime is slowing down your customers’ digital transformation, they need website security to become a lot more efficient and affordable than it has been. By offering a managed security service, Cloud Protector is the right solution for your customers. As a powerful service, it is leveraging a relationship of trust between our company and partners. A level of trust that should be based on a set of objective criteria.

Angel or Devil? Sort out the good user from the ugly

Contextual behavior analysis has been the way to go to sort out the good from the ugly. And it just got much better! With User Reputation Scoring, DenyAll introduces a concept that goes beyond per-request analysis and IP reputation, to sort out robots from actual people and control how the latter use their access rights.

Don’t feed the sharks with your data

“We thought we were safe, with big brand vendors securing our boat.” That’s a no-brainer, right? During this webcast, Stéphane de Saint Albin (CMO) and Vincent Maury (CTO) teach you in just 30 minutes how to prevent attackers from chipping off your IT infrastructure, using leveraging vulnerabilities your apps and web services to go after your data.

Strong Authentication for All

Users struggle with multiple IDs to access multiple applications. They need simplicity. Developers could use a centralized service handling user authentication, once and for all. You’ll discover how to help both. A solution of Web Access Management provides single sign on to all Web-based applications, the ability to deploy strong authentication, without requiring any changes to the applications, or the need to deploy an agent.

The Hacker Ethic, from 1994 to 2014

In 1994, Steven Levy published ‘the Hacker Ethic’, in which he defined the foundation of the hacker culture in six tenets which are serving not so much as a history of the computer revolution than as a cultural investigation. What remains of that, twenty years later? Threats have evolved, technical attacks have changed but the six rules remain.

Heartbleed explained by DenyAll’s CTO

The OpenSSL bug known as Heartbleed is probably the web security vulnerability of the decade, affecting two thirds of the Internet’s servers. Since April 7th 2014, the result is a widespread panic, worldwide, as system administrators rush to secure their websites and applications. Here’s what you need to know and do.

XSS Reloaded

Cross-Site Scripting (XSS) attacks are 15 years old. Beyond simple cookie theft, XSS should be considered as the buffer overflow of the decade. However, security controls are far from being effective against this threat…

HTML5, a clear and present danger

Although not fully standardized yet, HTML5 is a reality. And potentially a very disruptive one, from a security perspective. It’s time to understand how its many innovations can turn into serious threats. The cybercrime industry is retrofiting existing attack tools and creating new ones to take advantage of HTML5’s specific features.

Dinosaurs will die, will your security survive?

The strong adoption of new evasion techniques, associated to technologies such as HTML5 and JSON, are structurally incompatible with existing scanning engines. They will accelerate the obsolescence of application security systems, be it older or “next generation” ones. They are currently a real break line in information systems that nobody dares to question. However we should be more awareness of the fact, and suggest a more credible alternative.