For new issues inherent in Web-based applications, new solutions are necessary to ensure the growth of business and operations increasingly automated and virtualized. Such solutions must be available 24×7 to browser users. The answer to the new challenges comes from a behavioral assessment of technology’s own applications, called WAF (Web Application Firewalls), the scope of evaluation and protection features far beyond that achieved by traditional tools aimed at network protection. The WAF technology is necessary due to the application development process. The Web still leaves much to be desired about safety issues. There are now between 100 and 150 million Web applications running.

Firewalls

(1). On the other hand hackers, finding increasingly difficult to penetrate network defenses of the institutions that intend to attack – 97% depending on their use since adequate tools protection at this level, such as firewalls and intrusion detection systems – turn their efforts to the applications, which access to home is free to the general public through browsers. The result is that significant 60% of attacks today are targeted to Web applications

(2). According to data collected in Brazil, this percentage can reach 75%

(3). The problem is even more alarming if we consider the transaction values globally available by these applications, in the hundreds of billions of dollars. such ciphers encourage the efforts made by cyber crooks and require constant attention and proactive attitudes on the part of the institutions responsible for these values. What is gauged in compared to losses is that on average, each incident costs the US $ 6,655,000.00 to be repaired or about the US $ 202.00 per compromised record?

(4) Because of these losses and, above all, the need to protect users, are created standards security that should be adopted by segments in which the practice is the virtual traffic values. Basel 2, Sarbanes Oxley and other standardizations try to regulate the market, making serious demands on the environment and the processes of the institutions.

Firewalls

Long such requirements overflowed the narrow limits of ISO 9000, and compliance is now more a market differentiator: it is a matter of survival.

The intangible losses should also be considered in this evaluation, for an incident that customer data compromise always takes proportions that go beyond financial losses measurable. Take, for example, the case of theft of TJX information announced in 2007.

At that time, the company had 450,000 customer records stolen by hackers, resulting in a mandatory exchange of over 45 million cards in the United States.

The loss on cost impact for the brand, loss of existing customers and lots of new clients, in that case, was estimated at one million four hundred thousand dollars, not considering litigation costs there and class organizations campaigning against the company.

This is a sample paper to get assistance in similar essays visit us at www.termpaperqueen.com