BrixBits Runtime Application Self Protection BrixBits - Security Analyzer

Security Benefits



Why BrixBits Security Analyzer

Protecting applications and data is an ongoing battle. The bad guys are everywhere and are finding innovative ways to break through barriers and trick applications so as to access lucrative information stored on servers.

It’s important to implement security at all layers of the application stack and most solutions don’t cover every layer. Security Analyzer is focused on the application layer and when used in conjunction with other solutions that cover other layers, can help provide a complete security model.

The majority of traditional security solutions focus on OS and network level security leaving the application layer exposed. Security Analyzer provides enhanced visibility into the application layer and when combined with other security or application management solutions can provide a complete picture of potential security risk and vulnerabilities.

BrixBits Security Analyzer is the only application server-neutral security product on the market that detects and notifies on all exceptions, as well as major application vulnerabilities and threats such as cross site scripting, SQL injection, authentication and application configuration. Potential damage is mitigated before today’s security breach becomes tomorrow’s headline.

REAL TIME DASHBOARD
Easy to use interface provides insight into
security threats and vulnerabilities.

How does it work

BrixBits Security Analyzer monitors web applications to detect major application threats such as cross site scripting, SQL injection, and more. When an issue is detected, Security Analyzer triggers an alert that can be turned into a notification that can be sent via syslog, SNMP, SMS, email, or to a third party event management console or SIEM. Alerts and notifications contain the detailed threat information needed to quickly identify and resolve security issues before the damage is done.

What Is Security Analyzer

BrixBits Security Analyzer is a comprehensive RASP solution that detects and protects against major application security threats such as cross site scripting, SQL injection, authentication and application configuration changes and other vulnerabilities. Security Analyzer delivers the critical information needed to thwart a potential attack as it’s happening.

Audit

Permissions Auditing

Audit permission requests and permission usage by type as well as session activity for users with administrative privileges or elevated roles. Permission request events include stack trace information to help identify the code location where the permission request originated.

Class Package and Jar File Auditing

Keeping track of third party components and dependencies can be difficult and those components and packages may have vulnerabilities you are not aware of. Security Analyzer audits currently loaded jar files and class packages to identify any potential software vulnerabilities and risks.

JVM Memory Scanning

Keeping track of third party components and dependencies can be difficult and those components and packages may have vulnerabilities you are not aware of. Security Analyzer audits currently loaded jar files and class packages to identify any potential software vulnerabilities and risks.Security Analyzer scans JVM memory and classes to identify sensitive data that may be exposed in clear text and that may be vulnerable to exploitation.

Detect

Continuous Security Monitoring & Real-Time Notifications

Continuous monitoring of the application detects security vulnerabilities and generates alerts that can be converted into real-time notifications via SNMP traps, syslog messages, emails, or text messages.

Cross Site Request Forgery Detection

Ensure your trusted users aren’t being taken advantage of. Detect CSRF attacks with customizable filters to define which pages, resources and forms should be protected.

Security and System Exception Monitoring

Monitor and capture all application server security and system exceptions regardless of whether or not they are being logged. Security Analyzer also provides additional information such as who generated the exception, what type of exception, and when it occurred giving you complete visibility into the security of your web applications.

Cross Site Scripting (XSS) Detection

Detect cross site scripting vulnerabilities so your trusted, mission critical applications are not used for malicious intent and your reputation stays intact.

SQL Injection (SQLi) Detection

Applications can be prone to injection flaws and data can be stolen, modified or deleted. Security Analyzer detects potential SQL injection attempts keeping you informed of potential attacks.

Sensitive Data Vulnerability Monitoring

URLs can be vulnerable to network sniffing regardless of whether HTTPS is used therefore, passwords and other sensitive data should not be sent in clear text. Security Analyzer looks for text patterns that could expose sensitive information to prying eyes.

Security Configuration Monitoring

Systems can be vulnerable without your knowledge and the result is that data can be modified or stolen over time. Track and receive notifications on application configuration risks, compliance and changes that can make the runtime vulnerable.

Authentication Vulnerability Monitoring

Detects authentication vulnerabilities such as insecure cookies, session reuse/validation issues, log in/log activity.

Application Vulnerability Assessment

Identify any OS command executions or attempts to access forbidden areas vulnerable to unwanted access.

Port Monitoring

Identifies open TCP port listeners that could indicate a possible back door in the application framework or open source libraries.

Serialization

Performs startup checks to see if the Apache Commons serialization patch has been manually disabled and detects serialized classes.

Protect

Runtime Application Self-Protection

Protect applications at the runtime with proactive responses to security threats.

Block Cross Site Scripting, SQL Injection and Cross Site Request Forgery Threats

Block any transactions that are suspected of being cross site scripting, SQL injection or cross site request forgery threats.

Block Serialized Classes

Security Analyzer can be configured to block any standard or custom classes that use serialization to protection against vulnerabilities that can be exploited when using this function.

HTTP Response Header Patching

Security Analyzer will evaluate HTTP header requests and if security headers are missing, Security Analyzer will insert the appropriate headers in the response to ensure the browser and ultimately, your users are safe from attempted security vulnerabilities.

Enterprise Features

Security Dashboard

A new security specific dashboard presents security data and information in an easy to digest format.

Custom Dashboards and Widgets

Create custom dashboards and widgets to create a view that is meaningful to you.

Detailed Threat Intelligence

Event notifications include pertinent details such as stack trace details, xss URLs, etc providing the information needed to quickly identify and resolve security threats.

Configurable rules based alerting

Quickly and easily configure which security event alerts to receive using our simple rules based system.

Detailed Reporting

Security Analyzer reports provide detailed information on the exception such as user name, exception type, method, class, and stack trace and more.

Works out of the Box

Security Analyzer is easy to install and requires minimal configuration. Be up and running within minutes.

Centralized Dashboard

Our centralized dashboard makes it easy to view all security events, data and reports in one place.

Embedded Agent

Embedding our agent in the JVM means a lightweight solution with no additional process to manage. This method also gives us enhanced capabilities to capture data and change workflows such as denying access.

Application Server Neutral

Most environments have more than one application server, that’s why we made Security Analyzer application server neutral. No matter what Java runtime you use, we’ve got you covered.