Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
The Threat Landscape Jan Threat Report 2.
Real-time Security Analytics: Automating the Discovery, Understanding, and Action Against Advanced Security Threats Neal Hartsell, Vice President Marketing.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Boost your network security with NETASQ Vulnerability Manager.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Sky Advanced Threat Prevention
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Surveillance and Security Systems Cyber Security Integration.
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
Deployment Planning Services
“Introduction to Azure Security Center”
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Journey to Microsoft Secure Cloud
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Compliance with hardening standards
Active Cyber Security, OnDemand
Securing Your Digital Transformation
Varonis Overview.
Cyber Defense Matrix Cyber Defense Matrix
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
Skybox Cyber Security Best Practices
Panda Adaptive Defense Platform and Services
What’s new in the Fall Creators Update for Windows Defender ATP
Case Study 1: Security Considerations
Information Protection
Microsoft Data Insights Summit
Security intelligence: solving the puzzle for actionable insight
Plan and design the solution
STEALTHbits Technologies, Inc.
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Tripwire Threat Intelligence Integrations

2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only 51% of AV scanners detected new malware samples Lastline Labs 85% of breaches could be prevented by remediating known vulnerabilities US CERT Percentage of unauthorized data access was through compromised servers Verizon DBIR

3 Enterprise Cyberthreat Gap Response Gap Time between discovery to remediation to limit damage Detection Gap Time between actual breach and discovery Prevention Gap Time to put preventative measures in place to avoid future attacks Have we been breached? Can we avoid this from happening again? How bad is it? DETECTION GAP RESPONSE GAP PREVENTION GAP

4 Challenge to Close the Gap Advanced attacks—harder to detect and faster compromises – do I have an advanced threat? Limited context – need high-confidence, accurate information – where is the threat? is it on a critical system? Inadequate resources/time – need better prioritization – what is at risk? what do I fix first?

5 Tripwire Cyberthreat Security Portfolio Detecting indicators of breach, compromise, and vulnerability

6 Tripwire Dynamically Integrates Threat Intelligence Enabling zero-day and advanced threat detection and response Detect, analyze and report zero-day exploits and advanced persistent threats Automatic, immediate analysis of suspicious files and malware Complete forensics about all your secured assets Close the Detection Gap Close the Prevention Gap Automatically block files identified as malicious Control, monitor and adjust configurations Close the Response Gap Prioritize alerts and response by business context

7 Quickly Identify Potential Threats on High-Risk Assets Customer Use Case Identify suspicious files on critical assets Send files to partner for analysis Update controls based on identified threats !

8 Automated Threat Monitoring to Reduce Attack Surface Automatically download Indicators of Compromise Apply Tripwire policies to monitor for IOCs Drive workflow for remediation IOCs Customer Use Case

9 Quickly Detect & Respond to Advanced Threats Do I have an advanced threat? Real-time detection with advanced security intelligence High-confidence source if asset is compromised Empowering instant threat analytics and response Where is the threat? Is it on a critical system? What do I fix first? Focus on high-value assets based on business context Trigger rapid investigation based on detection & threat intel Targeted attack protection through Cybercrime Controls How can I avoid this from happening again? Continuous discovery, profiling, vulnerability and configuration assessment Control, Monitor and Adjust - configurations and policies based on new threat intelligence and new IOCs Harden configurations and adjust policies to reduce threat surface

THANK YOU!