Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

DenyAll introduces new licensing model and appliances for its refreshed product line

September 2013 by Marc Jacob

DenyAll introduces a new licensing model based on server capacity for physical and virtual
appliances, as an alternative to its historical scheme based on the number of applications. A
new range of hardware appliances, now based on Dell OEM rack servers, delivers more
price/performance choices. And new releases of the DenyAll product line deliver improved
productivity for application security administrators.

An alternative licensing scheme based on appliance capacity
DenyAll has been licensing its Web Application Firewalls (WAFs) based on the number of protected
applications. This scalable, “pay-as-you-grow” approach has enabled customers to increase their
investment in DenyAll technology as their application infrastructure expanded and their business
needs commanded. With datacentre virtualisation and the adoption of cloud computing, the need for
an appliance-centric approach became more obvious.
From now on, DenyAll will also be able to license its WAFs based on the number of processors (or
virtual cores) and RAM powering the server the product is meant to run on. In this alternative scheme,
which applies to both physical and virtual appliances, the number of applications protected by the
WAF will not be limited by the license but by the power of the server.

A new range of hardware appliances

For years, DenyAll has been providing its WAFs under three form factors:
 Traditional software, to be installed on various flavours of Linux;
 Virtual appliances, supporting VMware and other hypervisors;
 Physical appliances, by bundling its software with industry-standard servers.
Today, DenyAll is introducing a new range of hardware appliances, based on Dell
OEM rack servers R320 and R620. Four new models, named A1 to A4, deliver
more price/performance options for customers. Models A1 to A3 are designed for
the Protect family of WAFs and deliver performance up to 57,000 transactions per
second (tps), depending on the policy and nature of the protected applications.
The A4 model is designed specifically for the DenyAll Management Console and
features larger disk capacity for event logging purposes.
All models are “DenyAll ready”, preloaded with DenyAll’s software, shipped by Dell and bundled with
Dell’s standard 39 months professional support and maintenance service, which can be extended.
New releases deliver meaningful improvements
Version 4.1.2 of the DenyAll Protect family of WAF products delivers enhancements and new features
focused on improving administrator’s daily experience. These include:
 Updated monitoring, with a new look & feel and events/alerts grouped by attack families
(SQL injections, XSS, etc);
 DAscript, a scripting language enabling the creation of custom filters and directives, a key requirement for organizations dealing with complex applications;
 Client Shield configuration, which provides more deployment options;
 GDD (Gathering Debug Data), simplifies the sharing of system data between customers and DenyAll’s Technical Support team;
 Support for SAML 2.0 for Web Single Sign On (SSO);
 Caching for security filters, reducing the processing time of the Black List and Scoring List.

Version 4.1.2 of rWeb, rXML and sProxy will be available at the end of September to customers and partners with an active maintenance contract.
Version 4.1.2 of the DenyAll Management Console will be released a week later. This new version can manage all Protect 4.1.2 products and delivers enhanced integration of the DenyAll Application Security Dashboard, a Splunk-based advanced reporting tool.

Finally, a new version (5.2) of the DenyAll Detect products (Auditor, Vulnerability Manager and Edge Tester) is available as of today, which provides the following, among numerous enhancements and new features:
 PCI DSS references, now displayed in scan reports, help audit and compliance teams identify which requirements are targeted by the reported vulnerabilities;
 Audit logs, providing the ability to track and report on the most important actions, e.g. user management, scanning tasks and vulnerabilities management;
 Support for new, alternative licensing scheme based on number of scans.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts