By Mehul Shah, Chief Strategy Officer, Indusface
” Sow a thought and you reap an action;
sow an act and you reap a habit;
sow a habit and you reap a character;
sow a character and you reap a destiny. ”
– Ralph Waldo Emerson
Stephen R Covey’s best seller, “The 7 Habits of Highly Effective People” is largely considered to be the best business and self-help book. This book was the very first to introduce the concept of a paradigm shift and emphasized on self-change and interdependence rather than the often confusing power of independence. Mr. Covey said, “We believe that organizational behavior is individual behavior collectivized”. With great finesse, Mr. Covey conveyed a fact to us which many of us choose not to give importance to.
Just like, we know that our online presence is an extremely important and crucial part of our and our organization’s existence, and getting access to it is a very lucrative deal for the cybercriminals. An online presence that exists primarily in the form of web and mobile applications. But we do not make securing them a priority unless we suffer a loss. Unfortunately, this loss at times is too great to be measured only in dollars, as trust and loyalty loss of customers is priceless.
Web application firewalls (WAF) have been a critical part of securing external facing websites for years now. According to Gartner, 70% of attacks happen at the application layer. According to most industry analysts, organizations need to ensure that they deploy WAFs to ensure agile application layer protections. Network elements are unable to provide broad coverage for application layer issues. WAFs should be considered for more than just Compliance, they should be designed with the end security posture in mind.
This illustration is aimed at highlighting an ideal security vendor’s Application Security Paradigms.
Key Paradigms According to COVEY
Key Application Security Paradigms According to Indusface
Founder & Chief Marketing Officer, Indusface
Venky has played multiple roles within Indusface for the past 6 years. He was instrumental in building the product/service and technology team from scratch and grew it from ideation to getting initial customers with a proven/validated business model poised for scale. He has proven experience (10+ years) in the security industry and has held various mgmt/leadership roles in Product Development, Professional Services, and Sales during his time at Entrust Data card.