Web Server & Cloud Security Solution

Uninterrupted, real-time web security

Web Server Safeguard, or WSS, is UMV’s pioneering product, trusted by hundreds of global companies and institutions to enhance their web server security

Web Server & Cloud Security Solutions

Uninterrupted, real-time web security

Web Server Safeguard, or WSS, is UMV’s pioneering product, trusted by hundreds of global companies and institutions to enhance their web server security

Why WSS?

Why WSS?

In an age where cyberattacks are evolving by the day, even small delays in response can lead to devastating breaches

Ever-Increasing Variety of Attacks

Malware constantly refined to exploit new vulnerabilities in network systems

Internal and External Threats

Many security systems aren’t protected from attacks both inside and outside the organization

Exception Processing Risks

Ineffective exception processing in a cybersecurity of encoded scripts lets damaging malware through

Diverse Intrusion Methods

Further risk posed by malware that’s parsed, hidden, and/or encrypted

Preexisting Malware

Malicious scripts planted before firewalls have been set up go undetected

Other Incidents

Other security incidents like exploiting network bypass vulnerabilities or overloads can also result in infiltration

Web shells:
involved in most
web-based attacks
Consistent use of web shells by Advanced Persistent Threat
(APT) has led to significant cyber incidents.
What are Web Shells?
  • A web shell is a script, sometimes just one line long, that’s uploaded to a web server and allows a threat actor to take control of the system
  • A web shell is leveraged to add, delete, and execute system files as they wish
  • Web shells can be encoded, segmented, and customized with additional functions that allow it to destruct itself on command, leaving no trace of its activity
What Web Shells Can Do
  • Harvest and exfiltrate sensitive data and credentials
  • Upload malicious URL, malware, and forgery
  • Forge and deface websites
  • Issue commands to hosts in the network without direct internet access
  • Serve as command-and-control infrastructure
Web shells:
involved in most
web-based attacks
Consistent use of web shells by Advanced Persistent Threat
(APT) has led to significant cyber incidents
What are Web Shells?
  • A web shell is a script, sometimes just one line long, that’s uploaded to a web server and allows a threat actor to take control of the system
  • A web shell is leveraged to add, delete, and execute system files as they wish
  • Web shells can be encoded, segmented, and customized with additional functions that allow it to destruct itself on command, leaving no trace of its activity
What Web Shells Can Do
  • Harvest and exfiltrate sensitive data and credentials
  • Upload malicious URL, malware, and forgery
  • Forge and deface websites
  • Issue commands to hosts in the network without direct internet access
  • Serve as command-and-control infrastructure
WSS: COMPLETE YOUR WEB SERVER SECURITY WITH COMPREHENSIVE WEB SHELL PROTECTION

Real-time web server security for uninterrupted web services

How WSS Keeps Your Web Server Safe

WSS defends web servers from a variety of web attacks such as APT attacks, ransomware, attacks using web shell uploads, and website spoofing attacks.

Using functions such as detection, monitoring, quarantine, and reporting, WSS stops web shells before they can do any damage.

With WARSS, UMV’s security solution customized for websites, you can also prevent website defacement, source code forgery, and content forgery with ease.

WARSS detects changes to your homepage and restores it to its original state in real-time, making sure your website never misses a beat.

Against Web Shells
Web Shell Upload Attack Detection, Quarantine, Notify, Report and Treatment
Protects Personal Information
Personal Information Detection in File/Document/Database and Reporting
Against Malicious URLs
Malicious URL Detection, Quarantine and Exception Management
Protects Source Files
Source File Change Detection and Recovery
Real Time Detection
Real Time Detection against all security breaches
Recovers Config File
Web server configuration file change detection, recovery and IP report of attacker
WSS Detection Methods

To improve detection,
unknown malicious code is collected and detected
through WSS’s dedicated obfuscation analysis engine, SCR Parser.

WSS Detection Methods
  • 1. Malicious code collection to improve detection performance
  • 2. Detection analysis agents deployed in more than 30,000 units
  • 3. Pattern implementation and exception support provided to minimize false positives
Pattern Detection

Detect patterns stored in the DB via comparison with intrusive files

Signature Detection

Generate and inspect signatures of well-known web shells

Algorithm Detection

WSS’s dedicated SCR Parser detects patterns like obfuscated JavaScript webshells

Hash Value Detection

Regularly save and update web shell hash values as published on VirusTotal

Explore UMV Products

Security booster solution for webservers, protecting information data and providing uninterrupted service

Security booster solution for cloud computing (VM), protecting information data and providing uninterrupted service Web-Based Data's Security Solution in Virtual Environment

Real-time website recovery to prevent forgery and defacement