What is WebAlarm ?
WebAlarm is an enterprise-grade data integrity monitoring and recovery system. Its main functionality includes:
- Continuous monitoring of files and folders, including system configuration, application files and content files.
- Instant error notification to respective system owners via console alerts, emails or network management consoles.
- Automatic file recovery upon detection of file integrity violation
For more information on WebAlarm, click here.
Why do we need WebAlarm when we already have a firewall ?
WebAlarm plays a different role compared to the firewall.
A firewall is good as a network gateway that controls what network traffic is allowed to pass through it. Firewalls are important to filter unnecessary traffic and some common network-based attacks. However, many web attacks are embedded within the web traffic that is allowed by the firewalls.
That’s where WebAlarm comes into the picture to function as an additional layer of defense against unauthorized data changes. WebAlarm, even though will not prevent the attacks, will immediately detect any successful data change caused by these attacks and will take the necessary actions. WebAlarm is there to clean up the mess when all other preventive measures have failed.
Does WebAlarm prevents website hacking ?
WebAlarm monitors the web data, detects unauthorized changes and performs automatic recovery.
WebAlarm does not prevent the hacking activities, but will play an important role after any successful hacking to recover the web content to its original state.
WebAlarm is not a preventive system (like firewalls), but a data change detection and recovery system.
Can WebAlarm monitor dynamic web content ?
Dynamic web content is generated by a web application where the output of the web application is changing based on either user input, system time, or data in the database.
WebAlarm can protect dynamic content by firstly monitoring the web application program files that generates the content. Next, WebAlarm can be used to monitor selected data in the database by using custom SQL scripts.
Can WebAlarm monitor database ?
The database files are controlled directly by the database management system (such as Oracle, SQL server, etc). These files are not suitable to be monitored directly by WebAlarm.
However, database query scripts can be written to select critical data within the database and to output the query results to text files that can be monitored by WebAlarm. The scripts can be scheduled to run periodically to generate the output data.
In this case, WebAlarm will only detect changes, but will not perform automatic recovery.
Can WebAlarm stop cross-site-scripting and SQL injection attack ?
WebAlarm is a detection and recovery system. It does not prevent web attacks such as cross-site-scripting or SQL injection.
However, if such web attacks have modified any of the data monitored by WebAlarm, it will trigger data violation alerts and performs the necessary data recovery where possible.
WebAlarm will complement web application firewalls in defending against such attacks.
How does WebAlarm differentiate between an unauthorized data change by the hacker and a legitimate update by the webmaster ?
WebAlarm provides the most comprehensive data update management options, including on-demand updates, scheduled updates, and also automated update detetion and publishing using the WebAlarm UMA component.
For on-demand and scheduled updates, WebAlarm only accepts changes during the speficied time period.
For automated update using UMA, WebAlarm only accepts changes sent from the UMA.
Will WebAlarm consume much server resources and slow down the server performance ?
WebAlarm runs as a background process on the server. During each file scan cycle, WebAlarm will consume some CPU and I/O resources but will not introduce much delays to the server, typically less than 10% of the server resources. When WebAlarm is not scanning, no resource is consumed.
WebAlarm configuration allows administrator to throttle WebAlarm scanning speed to reduce system resource usage.
WebAlarm on the Windows OS has a special feature using the OS file event triggers to detect file changes, which does not use any system resources.
Can WebAlarm integrate with any network management system ?
WebAlarm can be configured to send SNMP events to any network management system (such as HP OpenView, IBM Tivoli, CA Unicenter, OpenNMS, etc).
The administrator will see the WebAlarm data integrity violation alerts within the network management console.
Can WebAlarm integrate with content management system ?
By using the WebAlarm Update Management Agent (UMA), WebAlarm should work with various types of content management systems.
In this case, the content management system should be configured to publish any content change to a folder monitored by the WebAlarm UMA. The UMA will then propagate the updates to the live web servers.
What is TheGRID?
TheGRID is a user device identification and authentication solution, which typical complements any existing access control authentication measures such website login authentication or transaction authentication.
What is TheGRID for?
TheGRID is used for two primary purposes:
- To stop identity theft – as a countermeasure to online identity theft and frauds (such as “phishing”), by providing two-factor authentication and optional mutual authentication.
- To stop subscription sharing – as a control measure to prevent sharing of paid online subscription services, by identifying and limiting the devices used to access the subscription account
Who would need TheGRID?
- Financial institutions – to provide two-factor authentication for online financial transactions and to comply to regulatory requirements.
- Government – to provide additional access protection to confidential information.
- Online subscription business – to prevent excessive sharing of paid accounts.
- Any online business website that requires additional authentication during login or prior to a transaction.
What are the key benefits of TheGRID?
- Effective – TheGRID is a truly workable solution to battle the issue of identity theft or subscription sharing.
- Easy – TheGRID is easy to implement, easy to deploy and easy to use.
- Affordable – TheGRID offers a cost-effective solution with low total cost of ownership.
How is TheGRID different from other alternative solutions?
TheGRID has the following advantages over alternative solutions:
- TheGRID addresses not only the common identity theft techniques such as phishing, but also the more advanced man-in-the-middle attacks which are known to defeat other two-factor authentication solutions such as hard tokens and SMS tokens.
- TheGRID is based on web technologies, allowing rapid integration with any existing web applications, hassle-free over-the-web deployment to millions of users and minimal user learning.
- TheGRID requires minimal startup investment, with no end-user hardware distribution and maintenance, and at the same time, offers flexible subscription packages to fit any budget.
How does TheGRID stop identity theft?
TheGRID implements two-factor authentication using the user’s device as the additional proof of user’s identity. By registering the set of devices used by the user to access the website and associating the set of devices to the user’s login ID, two-factor authentication is achieved by uniquely identifying the user’s device and verifying it with the list of registered devices for that particular user. The device registration process can easily be incorporated seamlessly into a website’s existing login workflow.
How does TheGRID stop subscription account sharing?
TheGRID enforces account sharing restrictions by imposing a limit to the number of devices allowed for each subscriber account. Unauthorized account sharing now becomes extremely inconvenient because these users typically do not share their physical computers and they might not even be within a localized geographic location. The time-sharing of the subscription account is no longer possible.
Product Brochures & Datasheet
Download WebAlarm Brochure here WebALARM_Brochure
Download WebAlarm Web Based Console here Enterprise WebALARM Web Console Data Sheet
e-Lock Corporation Sdn Bhd (318992-M)
Business Suite, 19A-26-3, Level 26, UOA Centre
19 Jalan Pinang, 50450 Kuala Lumpur, Malaysia.
e-Lock Japan Co., Ltd.
6F, 3-12-7, Kojimachi, Chiyoda-ku,
102-0083 Tokyo, Japan.