Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You NeededDowntime for even a few minutes can have a major impact on businesses’ bottom line and image. Businesses suffering from server downtime are subject to potential loss in sales, profits, productivity and customer satisfaction. In fact, the U.S. per record cost of data breach averages $194, according to Ponemon Institute.

Another unfortunate result of network outages and downtime is severe data loss, forcing businesses to cope with the cost of recreating data and the cost of notifying users in the event their data is compromised. As customers rely on access to a business’ website for purchases, support, information and services, 100 percent connectivity, 24/7 is imperative to businesses’ customer satisfaction.

Hackers and other security attacks are a source of server downtime and have consequently become a major concern for businesses. Fortunately, there are several preventative measures businesses can take to secure and protect their network against hackers and network infrastructure attacks. For example, application delivery controllers (ADCs), which are used primarily for traffic management and to ensure optimal application performance, are also equipped with security features that protect against the most common types of network attacks, meaning that businesses can utilize tools they already have to protect against oncoming threats.

Protecting Against Hackers

Hackers are a serious security threat for business of all sizes. Hackers are generally exploiting the network to discover the identity of the network content servers. After the hacker physically identifies the servers, he begins to work on cracking the security screen. This type of unauthorized access to sensitive data has the potential to cause serious consequences to businesses.

Fortunately, ADCs are equipped with several security features to protect networks against this type of attach. ADCs enhanced security capabilities prevent hackers from obtaining IP addresses of the network content servers by utilizing the NAT (Network Address Translation). The NAT protects the real IP address of the server that holds outside users in a DMZ, protecting the server from potential harm from the hackers.Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Network Infrastructure Attacks

Network infrastructure attacks generate large volumes of traffic to overwhelm the network appliances. These types of attacks are typically a planned and well-synchronized massive generation of incoming traffic that is aimed at the edge devices in a businesses’ network infrastructure. Network infrastructure attacks will penetrate as deep into the network as possible, with razor sharp focus on the network content servers.

ADCs add a layer of protection to the network infrastructure by mitigating attack vectors and monitoring all incoming requests. IPS/IDS and basic firewall functionality ensure that malicious attempts are not passed through to application instances. ADCs lie between the Internet and the application environment, putting them in a prime position to perform these functions.

For a complete implementation that can not only scale and withstand attacks, geographic site load balancers work in conjunction with local application delivery controllers to intelligently distribute user application traffic across dispersed data centers. Real time site monitoring coupled with configurable business-rule driven traffic steering algorithms results in the optimal use of a global data center fabric. In the case of multi-tier applications where an administrator is alerted to server resources requesting other servers through the ADC, and one random server exhibits anomalous traffic patterns, the ADC can block access to the offending server and act as an additional layer of protection against DDoS attacks.

Another common window of vulnerability in terms of application security is Missing Function Access Level Control exploits (a top 10 OWASP web app security concern). When developers create web interfaces, they have to restrict which users can see various links, buttons, forms, and pages but graphic design layers on top of HTML in terms of the web page look and feel often hide the exposed URLs.

ADCs can restrict which hosts and users can access fronted resources, as well as dictate which directories can even successfully be accessed. For most deployments the only successful traffic flow will be one that traverses the ADC for the request and the response, which helps to mitigate the amount of attack vectors that malicious efforts proffer. Additionally, as a reverse proxy, ADCs terminate TCP traffic, acting as a basic firewall in the strictest sense and only allowing explicitly allowed connections to ever make it through to the application infrastructure.

ADCs: A Key Security Tool

ADCs, while usually relied upon to improve the scalability and performance of business-critical applications running on the network, also serve as a key tool against network attacks. By utilizing the security features of ADCs, businesses can protect their networks against hackers and network infrastructure attacks to avoid any downtime while making the most of existing IT tools.

About the Author

Atchison Frazer is the CMO at KEMP Technologies.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3