Protect your Digital Enterprise

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
Jeff Hart M2 Technology IT Situational Awareness 2.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Microsoft Ignite /16/2017 4:54 PM
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Website Hardening HUIT IT Security | Sep
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Dell Connected Security Solutions Simplify & unify.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Marin Frankovic Datacenter TSP
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Why SIEM – Why Security Intelligence??
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Nuts and Bolts of ATA Chris Lloyd 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Senior Architect
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
IoT Security Part 2, The Malware
Deployment Planning Services
Cloud App Security vs. O365 Advanced Security Management
Comprehensive Security and Compliance at an Affordable Price.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Journey to Microsoft Secure Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Active Cyber Security, OnDemand
Secure & Unified Identity
Office 365 Security Assessment Workshop
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Securing Cloud-Native Applications Jason Schmitt CEO
Varonis Overview.
Understanding IDENTITY Assurance
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Human (user) behavior patterns and analytics
Secure once, run anywhere Simplify your security with Sophos
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
How to Mitigate the Consequences What are the Countermeasures?
The MobileIron® Threat Detection difference:
Information Protection
Microsoft Data Insights Summit
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
STEALTHbits Technologies, Inc.
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Protect your Digital Enterprise Sajith Rahman K Hewlett Packard Enterprise . Solution Architect-Pre-Sales Consultant. South India & Sri Lanka. Sajith.Rahman@hpe.com +91-9880435416

Today’s digital Enterprise needs a new style of protection IaaS SaaS PaaS Off Premise On Premise USERS Protect your most business-critical digital assets and their interactions, regardless of location device APPS DATA BIG DATA BYOD Off Premise

Managing risk in today’s digital enterprise Data User Interaction Application

Traditional data security Everything encrypted at the end point

Challenges with traditional data security Performance issues. Managing keys. Application rewrite. Data visible to privilege users. PCI scope reduction

Format-Preserving Encryption & Tokenization. Preserves referential integrity Supports data of any format: name, address, dates, numbers, etc. Provides production protection and data masking Embeds the key rotation policy in the data Reduces the need to re-encrypt PCI Scope Reductions.

Traditional Application Security 84% of breaches target applications Applications have become the new perimeter  Develop Test Deploy

80% of successful attacks target the application layer $3.8m Average Cost of breach Less than 10% of IT Security Spend on Application Security 86% of applications are in trouble 13% of applications compromised completely automatically Sources: Gartner , Ponemon Institute, Annual Study: $U.S. Cost of a Data Breach, The Open Security Foundation

Cyber attackers are targeting applications Intellectual Property Customer Data Business Processes Trade Secrets Applications Hardware Security Measures Switch/Router security Firewalls NIPS/NIDS VPN Net-Forensics Anti-Virus/Anti-Spam DLP Host FW Host IPS/IDS Vuln. Assessment tools Networks

Operate Securing the new SDLC Secure Development Security Testing Deploy Secure Development Find and fix as developer codes Security Testing Expand testing to web, mobile and cloud applications in production Software Security Assurance Programmatic approach to securing applications at scale

Application Security A proactive approach to defend the organisations from application layer threats by building security within the applications… Secure By Design Secure By Development Secure By Deployment

Internal Users are Now the Weakest Link SIEM focuses on the “known”; Analytics shines a light on the “unknown A determined attacker will get in 98% of all breaches investigated, evidence of the attacker activity was available and contained in security log files (Verizon Data Breach Report) 83% of all data loss was via legitimate credentials (Verizon Data Breach Report, 100% Mandiant) Little/no visibility inside the enterprise of lateral movement, applications Lack of monitoring/tracking of internal sources / networks

User Behavior Analytics Overview Identity Risk scoring & Prioritization Abnormal Behavior Detection Active Monitoring of Events Contextual Visual Investigation Learn normal Identify Weird Access UBA Activity (Events & Applications)

What value does UBA bring to our customers? Find the malicious user Faster event resolution Prioritization of high risk users Investigation efficiency & visualization 5-1 ROI impact

Detecting not “normal” for that user +1 +1 Frequency spike Event rarity Behavioral analysis +1 +1 Behavior profiles Peer group profiles Amount spike Peer group comparison Peer analysis Suspicious activities & transactions Suspicious account usage Suspicious system usage

How Destructive is Malware? In an average week, an organization receives 17,000 malware alerts $1.27 million annually Average cost of time wasted responding to inaccurate intelligence 205 Percentage of malware alerts deemed to be reliable Median number of days threat groups were present on a victim’s network before detection Mandiant Ponemon Institute

DNS Malware Analytics USE CASE: An automated service to Detect and Identify hosts inside my Enterprise which: Are positively infected with malware, bots, or other unknown threats Are trying to contact Command and Control Servers or exfiltrate data, Other perimeter or internal security products have not detected, High fidelity – Low false-positive Alerts, Enable Operational Staff (L1) to mitigate/remediate, Data feeds/Alerts fit into my existing SOC infrastructure without expansion.

Thank You