200 OK? For sure!
Solutions for technicians

Maximum availability and the best possible security? Airlock can deliver both. We reconcile these conflicting aims by making it possible to implement specific adaptations – simply and efficiently, in easy-to-understand steps. And Airlock's system architecture reduces susceptibility to errors, thanks to finely-honed solutions and tried-and-tested concepts.

SIEM integration

For a seamless integration of SIEM solutions with Airlock WAF, support for JSON and CEF (Common Event Format) data formats for log forwarding was added. Airlock’s CEF integration in HP ArcSight has been officially certified. Furthermore, the Airlock App for Splunk has been revised based on the new log format and will soon be published in version 2.0.

The Airlock App for Splunk® makes aggregated management reports available on security issues and application usage. Network administrators can use various dashboards to investigate security-critical events so application and performance problems are rapidly resolved.

Dashboards

All eight dashboards allow statistic grouping by virtual host, mappings, countries, etc.​ The dashboards include an overview and details reports for session statistics, traffic, attacks, rejected requests, performance, request analyzer and connectivity issues.

Highlights

  • Ready-made product
  • Specific dashboards for Airlock use cases
  • Ongoing product enhancements
  • Aggregated management reports
  • Splunk field definitions for Airlock log reports
  • Individual search queries are possible
  • Maintenance by Ergon

 

Security for Microsoft Applications

The productivity of virtual teams and mobile employees depends on how effectively they are supported by IT as they work together over the internet.

Microsoft Exchange Server, the Microsoft SharePoint family, the Lync unified communication solution and the ActiveSync protocol are the cornerstones of groupware and collaboration environments. ActiveSync is increasingly evolving into a standard that is applied beyond the Microsoft world. This is generating a demand for interfaces that can guarantee high accessibility as well as optimal security and flexibility, with low operating costs. Airlock is the answer.

A particular challenge is often posed by mobile synchronization of appointments, contacts and tasks between Microsoft Exchange Server and mobile clients. A large volume of critical data is stored in Exchange and SharePoint, so these resources cannot be made available via the internet without protection. Direct connections from the internet to the servers present too much of a risk. This problem also arises in connection with other applications, prompting many businesses to impose a general ban on internet connections to internal servers that store sensitive data.

Airlock provides a secure way of integrating Microsoft Exchange, SharePoint and other servers into the network. Enhanced security with strong upstream authentication and protocol filtering go hand- in-hand with a comfortable user experience and excellent support for mobile processes. In short: Airlock combines the best of both worlds in one tool that is flexible, efficient and reliable.

Highlights

  • Support for MS Exchange
    • Outlook Web Access
    • Outlook Anywhere
    • SharePoint
    • ActiveSync
  • Support for WebDAV
  • Support for Skype for Business
  • Integration of Office365 in SSO architecture

Consolidating security measures

With Airlock Suite, security measures can be consistently consolidated at one central point so that key aspects such as authentication and filtering are given the necessary attention. This central upstream solution delivers various benefits. IT architecture is made far less complex and up to 70% of the infrastructure elements and servers can be eliminated. Standard solutions for single sign-on, user self services and SIEM integration are also possible.

Highlights

  • OWASP Top Ten
  • Single sign-on
  • User self-services
  • SIEM integration (Splunk app)
  • Infrastructure elements are reduced

Virtual patching

Secure now, fix later – that's virtual patching in a nutshell. Airlock WAF's reverse proxy approach makes it very easy for you to virtualize servers and services. Virtual import of patches is also possible. The benefit: security-relevant weaknesses are quickly remedied.

Heartbleed, Bash Bug, Poodle – recent years have seen an upsurge in security breaches that have hit many backend systems. Airlock's security team actively monitors these developments so that we can promptly provide hotfixes to protect the backend systems downstream of Airlock or to prevent exploitation of weak points with the help of instructions and information on filter settings.

Highlights

  • Secure reverse proxy
  • Virtual patching: secure now, fix later
    • Multi-level filtering
    • Dynamic whitelist filtering
  • Examples of actual cases: solutions for Poodle, Bash Bug, and Heartbleed were available within 24 hours

Co-browsing

Browse together, not alone – that's the principle of co-browsing. It allows two people to surf together on a website, and each of them can see their partner's mouse pointer. The advantage: you can use unblu and Airlock to assist with your customers' support queries (or purchasing decisions). This is an efficient, straightforward and confidential solution that provides better advice more quickly – leading to higher customer satisfaction.

Highlights

  • Live support
  • Guided selling and consulting
  • Integration of unblu

High availability

One of the main benefits of central security architecture is that it relieves the pressure on web applications and web services – because now, they only have to deal with authenticated, authorized users and valid data traffic. Airlock WAF can run in cluster mode as the central network component, with seamless failover guaranteed in case of malfunctions. DoS protection is integrated into Airlock WAF, together with load balancing and failover for connected backend services. Individual backends can be switched offline to carry out maintenance work with no noticeable interruptions for users.

Highlights:

  • Failover cluster
  • Load balancing