STRATEGIC BUSINESS PARTNERS

Platin Bilişim has cooperations with the strongest and leader brands. Our target is not only make a difference on our rivals via our certificated and powerful engineer staff but also; providing IT security products and services for our customers from end to end.

F5 Networks ASM (APPLICATION SECURITY MANAGER)

BIG-IP Application Security Wall (ASM) provides protection against (OWASP) TOP 10 threats, application vulnerabilities and zero-day attacks. It provides DDOS protection with DDoS defending and sensation method without entering into your intranet.

APPLICATION SECURITY MANAGER APPLICATION TYPES

The first thing that must be done in the configuration of application security manager is creating a security policy. Creation of security policy over F5 can be done with 4 different ways. They are listed as below; 

 

  1. Creation of automated security policy; it develops a security policy for web application with observing received traffic. At this scenario; Policy Builder creates security policy automatically. (Creates a policy that intends to the statical analysis of traffic and behavior of application.)  
  2. Manually creating a principle or using templates; used for rapid distribution or developing a security policy that can be used as ready for application.
  3. Creating a policy for XML and web services manually; develops a security policy for protecting web services or XML applications. Like applications that use WSLD or XML schema document. It creates security policy that depends on system configurations and offers additional learning suggestions for providing you to make observation and fine tuning.
  4. Creating a policy with using 3rd party vulnerability tool; creates a security policy with being integrated into vulnerability evaluation tool like WhiteHat Sentinel. Depend on the result of vulnerability report that uploaded into device, ASM automatically eases the vulnerability on your website.