Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Security Life Cycle for Advanced Threats
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
Security for Today’s Threat Landscape Kat Pelak 1.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Expose The Underground Advanced Persistent Threats
(Geneva, Switzerland, September 2014)
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
About Palo Alto Networks
What Are We Missing? Practical Use of the Next-Generation Firewall: Controlling Modern Malware and Threats Jason Wessel – Solutions Architect.
Norman SecureSurf Protect your users when surfing the Internet.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Dell Connected Security Solutions Simplify & unify.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Smart Protection Network Kelvin Liu AVP, Core Tech Development.
The Changing World of Endpoint Protection
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Winning with Check point
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Sky Advanced Threat Prevention
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Palo Alto Networks - Next Generation Security Platform
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Understanding and breaking the cyber kill chain
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Exchange Online Advanced Threat Protection
Sophos Intercept Next-Gen Endpoint Protection
Active Cyber Security, OnDemand
Sophos Intercept Next-Gen Endpoint Protection
Threat Ready: The Benefits of Segmentation
Prevent Costly Data Leaks from Microsoft Office 365
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Healthcare Cloud Security Stack for Microsoft Azure
Security Trends and Threats Affecting Innovations in Technology
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models Virtualized Data Centers Minimize Business Risks from Cybersecurity Assets, Operations Product, Services IP, Reputation Support IT Initiatives Support Business Priorities Cloud Computing, SaaS, IaaS… Mergers and Acquisitions Outsourcing Data Center Consolidation Cost Control Private Cloud

A New Threat Landscape  Mostly addressed by traditional AV and IPS  Low sophistication, slowly changing  Machine vs. machine  Somewhat more sophisticated payloads  Evasion techniques often employed  Sandboxing and other smart detection often required  Intelligent and continuous monitoring of passive network-based and host-based sensors  Comprehensive investigation after an indicator is found  Highly coordinated response is required for effective prevention and remediation Commodity threats (very common, easily identified) Organized cybercrime (More customized exploits and malware) Nation state (Very targeted, persistent, creative) Advanced threat

Malware trends 1 minute = 2,021 instances 15 minutes = 9,864 instances 30 minutes = 45,457 instances After…. Actual new malware every < 3 seconds

Today Security Infrastructure… Best of Breed Products  Staffing and time to market  Operations  Accuracy Your investment in SIEM for normalisation of disparate solutions or as strategic asset to help break the Attack Lifecycle? Internet Network FW

Gather intelligence Plan the attack Exploit Silent infection Deliver malware Malicious file delivered C2 Malware communicates with attacker Steal data High-value intellectual property stolen The Cyber attack Lifecycle

Breaking the Attack Lifecycle at Multiple Points 1.Segment your network with a “zero-trust” model as the foundation for defense  Only allow content to be accessed  By a limited and identifiable set of users  Through a well-defined set of applications  Blocking everything else 2.Block all known threats:  Threat Prevention would have identified and stopped parts of the attack  Across known vulnerability exploits, malware, URLs, DNS queries  And command-and-control activity 3.Identify and block all unknown threats:  Using the Sandboxing Solution  Using Behavioral characteristics such as  Communicating over often-abused ports (139 or 445)  Using WebDev to share information,  Changing the security settings of Internet Explorer  Modifying Windows registries and many more 6 | ©2013, Palo Alto Networks. Confidential and Proprietary.

Breaking the Lifecycle at Every Possible Step 7 | ©2012, Palo Alto Networks. Confidential and Proprietary. App-ID URL IPS Spyware AV Files Unknown Threats Bait the end-userExploit Download Backdoor Command/Control Block high-risk apps Block known malware sites Block the exploit Block malware Prevent drive- by-downloads Detect 0-day malware Block new C2 traffic Block spyware, C2 traffic Block fast-flux, bad domains Block C2 on open ports

A New Breed of Malware 8 | ©2012, Palo Alto Networks. Confidential and Proprietary. 64% of malware found by Sandbox are not covered by traditional AV at time of detection 40% of malware still not covered after 7 days

Turning the Unknown into Known  Scans ALL applications (including SSL traffic) to secure all avenues in/out of a network, reduce the attack surface area, and provide context for forensics  Prevents attacks across ALL attack vectors (exploit, malware, DNS, command & control, and URL) with content-based signatures  Detects zero day malware & exploits using public/private cloud and automatically creates signatures for global customer base Identify & control Prevent known threats Detect unknown threats Rapid, global sharing All applications

Integrated = More Than the Sum of It’s Parts Prevent known threats Detect unknown threats Validate attackRemediate Vulnerability exploits (IPS) Malware Bad web sites Bad domains C&C Vulnerability exploits (IPS) Malware Bad web sites Bad domains C&C Unknown applications Suspicious file types / websites Global Intelligence Unknown applications Suspicious file types / websites Global Intelligence Bit9 Splunk More to come Bit9 Splunk More to come Apply positive controls Attack surface Non-standard ports Port-hopping SSL & SSH Non-standard ports Port-hopping SSL & SSH Malware intelligence Forensics Malware intelligence Forensics Centralised Management Enterprise-wide Policy

Summary  Evolution of your Network Security  It’s a new Threat Landscape  Need for an integrated approach  Traditional solutions no longer suffice  Focus on breaking the Attack Lifecycle, not just on the point- attack 11 | ©2013, Palo Alto Networks. Confidential and Proprietary.

12 | ©2012, Palo Alto Networks. Confidential and Proprietary.