Confidential | © A10 Networks, Inc. When Your Security Measures Become the Threat: The Hidden Dangers of SSL Traffic February 2016 02242015.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

© 2011 Infoblox Inc. All Rights Reserved. Infoblox – control, secure & automate Mike Carroll.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
The Most Analytical and Comprehensive Defense Network in a Box.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
Barracuda Web Application Firewall
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Barracuda Load Balancer Server Availability and Scalability.
Director of Research, SANS Institute
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
APT29 HAMMERTOSS Jayakrishnan M.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Akamai Technologies - Overview RSA ® Conference 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Sky Advanced Threat Prevention
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
FireEye NX In line Solution
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Complete Cloud Security Anyone, anywhere, any app, any device.
IXIA + FIREEYE SECURITY BATTLECARD
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Protect your Digital Enterprise
勒索軟體事件分析與SSL流量可視性.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Firewall The Next-Generation Firewall for Everyone
Uncover Threats in SSL Traffic with SSL Insight
Web Application Protection Against Hackers and Vulnerabilities
Cost-Effective Strategies for Countering Security Threats:  IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Do you know who your employees are sharing their credentials with
Real-time protection for web sites and web apps against ATTACKS
Threat Landscape for Data Security
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chapter 4: Protecting the Organization
STEALTHbits Technologies, Inc.
Presentation transcript:

Confidential | © A10 Networks, Inc. When Your Security Measures Become the Threat: The Hidden Dangers of SSL Traffic February

Confidential | © A10 Networks, Inc. The Cyber Threat Landscape The Need for Encryption SSL Usage Trends Threats Introduced by SSL Traffic How to Protect Against SSL Threats Agenda

Confidential | © A10 Networks, Inc. Impact of a Breach: Source: Information Is Beautiful Investigation and notification costs Brand damage Lost revenue Regulatory fines Lawsuits World’s Largest Data Breaches

Confidential | © A10 Networks, Inc. Data Breaches by the Numbers $3.79 million Average total cost of a data breach Total Cost Individual Cost Escalating Risk $154 Cost per lost or stolen record 23% increase in total cost of a data breach since 2013 Sources: Ponemon Institute, 2015 Cost of Data Breach Study: Global Analysis

Confidential | © A10 Networks, Inc. Top Causes of Large-Scale Breaches 225,000 new malware strains detected per day Malware Insider Abuse Advanced Persistent Threats 55% of abuse caused by users with legitimate access 66% believe their organization will be the target of APT Sources: PandaLabs Report Q | 2015 Verizon Data Breach Investigation Report | Mandiant, a FireEye company

Confidential | © A10 Networks, Inc.  Next Gen Firewall  Secure Web Gateway  Intrusion Detection & Prevention  Advanced Threat Protection  SIEM  Network Forensics  Data Loss Prevention  Unified Threat Management Solutions are Failing Despite $71.1B investment in security SOURCE: Information Security, Worldwide, , 2Q14 Update, Gartner

Confidential | © A10 Networks, Inc. In % SSL Traffic Is Increasing… 7 In % Sources: NSS Labs, Sandvine 100%?

Confidential | © A10 Networks, Inc. Reasons Why More Organizations Are Encrypting Traffic  Snowden revelations of NSA snooping  Disclosures in 2014 that governments were injecting surveillance software in web traffic  YouTube and Microsoft Live used as conduits to inject malware  Both now encrypt traffic  Google ranks SSL sites higher for SEO Source: Washington Post

Confidential | © A10 Networks, Inc. Security Experts Agree: SSL Can Create New Risks SOURCE SANS –Speaker OK. Gartner ask permission for BDM LOGOS “Bad actors are after our data... and encrypting data is the best way to hide their transfers and malware communications from security devices.” ―J. Michael Butler, SANS Institute SOURCE: Finding Threats by Decrypting SSL.

Confidential | © A10 Networks, Inc. Cyber Threats Hidden in SSL Traffic Sources: Sandvine Internet Phenomena Report “Security Leaders Must Address Threats From Rising SSL Traffic,” %50%80% of Internet traffic will be encrypted by 2016 of attacks will use encryption to bypass controls by 2017 of organizations with firewalls, IPS, or UTM do not decrypt SSL traffic

Confidential | © A10 Networks, Inc. Security Infrastructure Inspects Traffic to Stop Attacks AccountingEngineeringSales & Marketing ATP IPS Firewall SIEM Network Forensics AccountingEngineeringSales & Marketing z Alert Block

Confidential | © A10 Networks, Inc. AccountingEngineeringSales & Marketing ATP IPS Firewall SIEM Network Forensics AccountingEngineeringSales & Marketing z Data Exfiltration Anomalous Activity Successful Attack Undetected Malware Encryption Makes Security Devices Blind to Attacks

Confidential | © A10 Networks, Inc. Attacks that Can Hide in SSL Traffic

Confidential | © A10 Networks, Inc. Infiltration and Attacks Malvertising delivered over SSL-encrypted Adtech networks Malware distributed via social media Malware sent as attachments in and instant messaging apps DDoS and Web app attacks Yahoo malvertising attack Facebook, Twitter, LinkedIn use SSL Koobface was a multimillion malware campaign that used Facebook Whatsapp, Snapchat encrypt IM Attackers can use SSL to bypass controls or overwhelm servers

Confidential | © A10 Networks, Inc. Insider Abuse Insiders can send sensitive data through web-based Gmail, Yahoo Mail, MS Live encrypt Insiders can upload sensitive files to file sharing services Box, Dropbox, iCloud, OneDrive encrypt data C&C Communications Malware-infected machines communicate to command & control servers via SSL China’s APT1, Zeus, Shylock, KINS and CryptoWall malware use SSL Data Exfiltration Hidden in SSL

Confidential | © A10 Networks, Inc. How Malware Developers Exploit Encrypted Traffic Bot Infection Hidden in SSL TrafficData Exfiltration over SSL Drive-by download from an HTTPS site Malicious file in instant messaging Malicious attachment sent over SMTPS Command and control server communication Stolen data sent via or to cloud storage sites Malware receiving C&C updates from social media sites

Confidential | © A10 Networks, Inc. Security Experts Agree: Businesses Must Inspect SSL SOURCE SANS –Speaker OK. Gartner ask permission for BDM LOGOS “ Organizations without traffic decryption plans are blind not only to these new sophisticated attacks but also to any attacks that take place over encrypted connections.” ― Gartner SOURCE: Security Leaders Must Address Threats From Rising SSL Traffic, Jeremy D’Hoinne, Adam Hills, December 2013, refreshed Jan 2015  “Many current security tools also cannot inspect encrypted traffic, allowing hackers to hide behind the encryption that protects sensitive data.. ” Robert L. Scheier Six Steps to Stronger Retail Security, Robert L. Scheier

Confidential | © A10 Networks, Inc. Eliminate Blind Spots Detect Advanced Threats Empower Your Security Infrastructure Prevent Data Breaches SSL Decryption is Critical

Confidential | © A10 Networks, Inc. SSL Insight Overview  Client Initiates outbound communication  Traffic is decrypted  Decrypted traffic is inspected by security solutions  Data is encrypted  Secure tunnel is established  Any data returned is decrypted, inspected and encrypted before reaching the client Other DLP UTM IDS Internet SSL decryption Encrypted Decrypted Encrypted Inspection/ Protection Client

Confidential | © A10 Networks, Inc. SSL Insight – Inline Single Appliance Deployment Firewall or Inline Security Device HTTP SSL ADP 1 ADP 2 SSL This deployment mode provides SSL visibility to an inline security device One partition decrypts SSL traffic and forwards it to security devices A second partition encrypts traffic L2 deployment Secure Traffic Clear Traffic

Confidential | © A10 Networks, Inc. SSL Insight – Inline and Passive Mode Security Devices Client Open once and inspect multiple times Multiple security devices Inline (Layer 2) and passive (TAP) mode devices supported on SPAN/Mirror Port SWG Secure Web Gateway SSLHTTP SSL IPS/Firewall ATP / SIEM Secure Traffic Clear Traffic

Confidential | © A10 Networks, Inc. Why Customers Choose A10 All-Inclusive Licensing and Support Advanced Security & Networking Features Best-in Class Performance Gold Standard for Reliability and Support Data Center Efficient Design Flexible Cloud Deployment & APIs

Confidential | © A10 Networks, Inc. Security Uncover threats concealed in inbound and outbound SSL traffic Performance Relieves the security gateway and server of SSL tasks Availability Faster server response time and automatic redundancy Scalability Scale server and security gateway capacity with integrated load balancing SSL Insight Benefits

Confidential | © A10 Networks, Inc. SSL Insight Provides the Visibility You Need Escalating Risks from SSL TrafficSSL Insight Value Full SSL visibility to uncover attacks and prevent breaches 10x More Performance Decrypt once and inspect many times with load balancing and flexible explicit and transparent proxy deployment Data breaches are costly SSL traffic renders security devices ineffective; decrypting SSL traffic slows down firewalls To ensure you’re not the next victim, deploy an SSL inspection platforms $

Thank you