Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You NeededDowntime for even a few minutes can have a major impact on businesses’ bottom line and image. Businesses suffering from server downtime are subject to potential loss in sales, profits, productivity and customer satisfaction. In fact, the U.S. per record cost of data breach averages $194, according to Ponemon Institute.

Another unfortunate result of network outages and downtime is severe data loss, forcing businesses to cope with the cost of recreating data and the cost of notifying users in the event their data is compromised. As customers rely on access to a business’ website for purchases, support, information and services, 100 percent connectivity, 24/7 is imperative to businesses’ customer satisfaction.

Hackers and other security attacks are a source of server downtime and have consequently become a major concern for businesses. Fortunately, there are several preventative measures businesses can take to secure and protect their network against hackers and network infrastructure attacks. For example, application delivery controllers (ADCs), which are used primarily for traffic management and to ensure optimal application performance, are also equipped with security features that protect against the most common types of network attacks, meaning that businesses can utilize tools they already have to protect against oncoming threats.

Protecting Against Hackers

Hackers are a serious security threat for business of all sizes. Hackers are generally exploiting the network to discover the identity of the network content servers. After the hacker physically identifies the servers, he begins to work on cracking the security screen. This type of unauthorized access to sensitive data has the potential to cause serious consequences to businesses.

Fortunately, ADCs are equipped with several security features to protect networks against this type of attach. ADCs enhanced security capabilities prevent hackers from obtaining IP addresses of the network content servers by utilizing the NAT (Network Address Translation). The NAT protects the real IP address of the server that holds outside users in a DMZ, protecting the server from potential harm from the hackers.Application Delivery Controllers (ADCs): The Security Tool You Didnt Know You Needed

Network Infrastructure Attacks

Network infrastructure attacks generate large volumes of traffic to overwhelm the network appliances. These types of attacks are typically a planned and well-synchronized massive generation of incoming traffic that is aimed at the edge devices in a businesses’ network infrastructure. Network infrastructure attacks will penetrate as deep into the network as possible, with razor sharp focus on the network content servers.

ADCs add a layer of protection to the network infrastructure by mitigating attack vectors and monitoring all incoming requests. IPS/IDS and basic firewall functionality ensure that malicious attempts are not passed through to application instances. ADCs lie between the Internet and the application environment, putting them in a prime position to perform these functions.

For a complete implementation that can not only scale and withstand attacks, geographic site load balancers work in conjunction with local application delivery controllers to intelligently distribute user application traffic across dispersed data centers. Real time site monitoring coupled with configurable business-rule driven traffic steering algorithms results in the optimal use of a global data center fabric. In the case of multi-tier applications where an administrator is alerted to server resources requesting other servers through the ADC, and one random server exhibits anomalous traffic patterns, the ADC can block access to the offending server and act as an additional layer of protection against DDoS attacks.

Another common window of vulnerability in terms of application security is Missing Function Access Level Control exploits (a top 10 OWASP web app security concern). When developers create web interfaces, they have to restrict which users can see various links, buttons, forms, and pages but graphic design layers on top of HTML in terms of the web page look and feel often hide the exposed URLs.

ADCs can restrict which hosts and users can access fronted resources, as well as dictate which directories can even successfully be accessed. For most deployments the only successful traffic flow will be one that traverses the ADC for the request and the response, which helps to mitigate the amount of attack vectors that malicious efforts proffer. Additionally, as a reverse proxy, ADCs terminate TCP traffic, acting as a basic firewall in the strictest sense and only allowing explicitly allowed connections to ever make it through to the application infrastructure.

ADCs: A Key Security Tool

ADCs, while usually relied upon to improve the scalability and performance of business-critical applications running on the network, also serve as a key tool against network attacks. By utilizing the security features of ADCs, businesses can protect their networks against hackers and network infrastructure attacks to avoid any downtime while making the most of existing IT tools.

About the Author

Atchison Frazer is the CMO at KEMP Technologies.

If you like what you see, get more delivered to your inbox weekly.
Click here to subscribe to our free premium content.

comments powered by Disqus

Digital Edition

  • Security Today Magazine - July August 2019

    July/August 2019

    Featuring:

    • A Winning Security Plan
    • Moving to the Door
    • Relying on Power
    • Thermal Imagers Deployed
    • Using Mass Notification

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety