Uncover Threats in SSL Traffic with SSL Insight

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Barracuda Web Application Firewall
Lisa Farmer, Cedo Vicente, Eric Ahlm
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Norman SecureSurf Protect your users when surfing the Internet.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Security fundamentals Topic 10 Securing the network perimeter.
Synchronized Security Revolutionizing Advanced Threat Protection
Sky Advanced Threat Prevention
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Confidential | © A10 Networks, Inc. When Your Security Measures Become the Threat: The Hidden Dangers of SSL Traffic February
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
FireEye NX In line Solution
Complete Cloud Security Anyone, anywhere, any app, any device.
Blue Coat Cloud Continuum
IXIA + FIREEYE SECURITY BATTLECARD
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Security fundamentals
Web Content Security Unlock the Power of the Web
Protect your Digital Enterprise
Accelerating Your Journey to a Safe Cloud
勒索軟體事件分析與SSL流量可視性.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Grow Your Business with the Security Leader
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Web Application Protection Against Hackers and Vulnerabilities
Cost-Effective Strategies for Countering Security Threats:  IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Grow Your Business with the Security Leader
Barracuda Web Filtering Service
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Securing the Network Perimeter with ISA 2004
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
Threat Management Gateway
100% Exam Passing Guarantee & Money Back Assurance
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Jon Peppler, Menlo Security Channels
Prevent Costly Data Leaks from Microsoft Office 365
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Threat Landscape for Data Security
Sizing …today. T: Here’s how. .
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Collaborative Business Solutions
Panda Adaptive Defense Platform and Services
Chapter 4: Protecting the Organization
F5 Networks Solutions Silverline Silverline
Comodo Dome Data Protection
Presentation transcript:

Uncover Threats in SSL Traffic with SSL Insight November, 2015 Stephen Shapiro Regional Sales Director NY Metro 02242015

World’s Largest Data Breaches Impact of a Breach: Investigation and notification costs Brand damage Lost revenue Regulatory fines Lawsuits Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Source: Information Is Beautiful

Cyber Threats Hidden in SSL Traffic 67% 50% 80% of Internet traffic will be encrypted by 2016 of attacks will use encryption to bypass controls by 2017 of organizations with firewalls, IPS, or UTM do not decrypt SSL traffic Sources: Sandvine Internet Phenomena Report “Security Leaders Must Address Threats From Rising SSL Traffic,” 2013

100%? 67% 25-35% SSL Traffic Is Increasing… In 2016 In 2013 4 Source: Sandvine 4

Reasons Why More Organizations Are Encrypting Traffic Snowden revelations of NSA snooping Disclosures in 2014 that governments were injecting surveillance software in web traffic YouTube and Microsoft Live used as conduits to inject malware Both now encrypt traffic Google ranks SSL sites higher for SEO Source: Washington Post As a result “Google and Microsoft executives said they are accelerating previous plans to encrypt” traffic Source for picture: https://www.washingtonpost.com/world/national-security/spyware-tools-allow-buyers-to-slip-malicious-code-into-youtube-videos-microsoft-pages/2014/08/15/31c5696c-249c-11e4-8593-da634b334390_story.html Application owners are adding SSL support to improve Google search engine ranking.

Solutions are Failing Despite $71.1B investment in security Next Gen Firewall Network Forensics Secure Web Gateway Data Loss Prevention Intrusion Detection & Prevention Network Access Control Advanced Threat Prevention Unified Threat Management SIEM SOURCE: Information Security, Worldwide, 2012-2018, 2Q14 Update, Gartner 

Attacks that Can Hide in SSL Traffic

Infiltration and Attacks Malvertising delivered over SSL-encrypted Adtech networks Malware distributed via social media Malware sent as attachments in email and instant messaging apps DDoS and Web app attacks Yahoo malvertising attack Facebook, Twitter, LinkedIn use SSL Koobface was a multimillion malware campaign that used Facebook Skype, Whatsapp, Snapchat encrypt IM Attackers can use SSL to bypass controls or overwhelm servers

Data Exfiltration Hidden in SSL Insider Abuse Insiders can send sensitive data through web-based email Gmail, Yahoo Mail, MS Live encrypt Insiders can upload sensitive files to file sharing services Box, Dropbox, iCloud, OneDrive encrypt data C&C Communications Malware-infected machines communicate to command & control servers via SSL China’s APT1, Zeus, Shylock, KINS and CryptoWall malware use SSL

How Malware Developers Exploit Encrypted Traffic Bot Infection Hidden in SSL Traffic Data Exfiltration over SSL Malicious attachment sent over SMTPS Malicious file in instant messaging Drive-by download from an HTTPS site C&C = Command and Control Command and control server communication Stolen data sent via email or to cloud storage sites Malware receiving C&C updates from social media sites

Security Infrastructure Inspects Traffic to Stop Attacks ATP IPS Firewall DLP Network Forensics Accounting Engineering Sales & Marketing Alert Alert Block Block z Sales & Marketing Accounting Engineering

Encryption Makes Security Devices Blind to Attacks Anomalous Activity Data Exfiltration Network Forensics DLP Successful Attack Undetected Malware Accounting Engineering Sales & Marketing IPS ATP Firewall z Sales & Marketing Accounting Engineering

SSL Insight Uncover Threats In SSL Traffic

SSL Insight Difference Flexible transparent and explicit proxy deployment modes 10x more performance SSL Insight Difference Scale security performance with load balancing

Eliminate the SSL Blind Spot with Compromising Performance SSL Insight Benefit: Detect encrypted malware, insider abuse, and attacks in SSL/TLS traffic Client A10 Thunder ADC Internet Server Security Device Encrypted Decrypted SSL Insight Features: Full SSL visibility including ECDHE ciphers 10x more performance 40 Gbps max compared to 4 Gbps Load balancing to scale security infrastructure Transparent proxy or explicit proxy deployment ICAP support to decrypt traffic for DLP or AV scanners Dynamic port intercept of SSL traffic

URL Classification Service Powered by Webroot Meet compliance by keeping sensitive data encrypted Block malicious sites with URL filtering* 460+ million domains 83+ website categories Web Classification Cloud Security Device Inspection and Protection URL Category Validation Thunder ADC Internet Server User * URL filtering supported in ACOS 4.1.0

CASE STUDY: Fortune 500 Healthcare Company Customer Challenge Needed a high-performance solution that would enable FireEye IronPort, Palo Alto and other vendors to inspect SSL traffic Competitors: F5 and Blue Coat SOLUTION A10 Thunder appliances with SSL Insight URL Classification subscription WHY A10 Scalability and reliability: A10 was the only vendor that could meet the customer’s performance requirements Product expertise: A10 was the only company that answered company’s technical questions completely; customer required advanced SSL inspection features like URL classification and explicit forward proxy deployment

Government Case Study: Impact of Not Inspecting SSL Background Organization had deployed security devices from many leading security vendors SSL traffic not inspected due to performance, scale, & complexity Result of Attack Attackers infiltrated network, installed malware, and stole data across multiple end-points Organization dropped internet connectivity for days, performed lengthy forensics and remediation FINDINGS: Network security tools could have prevented this attack if the tools had had visibility into SSL traffic ESTIMATED FINANCIAL COSTS Lost productivity and forensic investigation= Medium Cost Loss of intellectual property = High Cost

Ironclad Protection from the A10 Security Alliance SSL Inspection and Scaling Advanced Detection & Analysis Programmatic Security Control Certificate Management Intelligence Authentication

SSL Inspection and Scaling Partners A10 has validated and documented SSL Insight integration with leading security vendors FireEye NX IBM QRadar Incident Forensics RSA Security Analytics Trend Micro Deep Discovery Check Point Next Generation Firewall Cisco ASA and FirePOWER Cyphort Threat Defense Vectra S-series & X-series

Why Customer Choose A10 Best-in Class Performance Advanced Security & Networking Features All-Inclusive Licensing and Support Flexible Cloud Deployment & APIs Data Center Efficient Design Gold Standard for Reliability and Support

SSL Insight Provides the Visibility You Need Escalating Risks from SSL Traffic SSL Insight Value $ Data breaches are costly SSL traffic renders security devices ineffective; decrypting SSL traffic slows down firewalls To ensure you’re not the next victim, deploy an SSL inspection platforms Full SSL visibility to uncover attacks and prevent breaches C&C = Command and Control 10x More Performance Decrypt once and inspect many times with load balancing and flexible explicit and transparent proxy deployment

Thank you

Reference Architectures

SSL Insight – Inline Single Appliance Deployment Firewall or Inline Security Device HTTP ADP 1 ADP 2 SSL SSL Secure Traffic Clear Traffic This deployment mode provides SSL visibility to an inline security device One partition decrypts SSL traffic and forwards it to security devices A second partition encrypts traffic L2 deployment

SSL Insight – Inline and Passive Mode Security Devices SWG Secure Web Gateway SSL HTTP IPS/Firewall ATP / SIEM Client Secure Traffic Clear Traffic Open once and inspect multiple times Multiple security devices Inline (Layer 2) and passive (TAP) mode devices supported on SPAN/Mirror Port

SSL Insight – Network and Passive Mode Security Devices ATP / SIEM SSL SSL HTTP HTTP Client SWG Secure Web Gateway IPS/Firewall Secure Traffic Clear Traffic Open once and inspect multiple times Multiple security devices Network (Layer 3) and passive (TAP) mode devices supported on SPAN/Mirror Port High availability (HA) Support

SSL Insight Inline Mode with Explicit Proxy Firewall or Inline Security Device HTTP SSL (Explicit Proxy) ADP 2 ADP 1 ADP 3 SSL Client First A10 Partition Forwards the explicit proxy traffic to SSL; Connect Header is removed and destination IP is changed Second A10 Partition Forwards SSL traffic to HTTP and sends traffic to firewall for inspection Third A10 Partition Convert HTTP back to SSL HTTPS traffic is forwarded to destination

SSL Insight – ICAP topology Data Loss Prevention(DLP) Reqmod/ Respmod Firewall or Inline Security Device SSL ADP 1 SSL ADP 2 This deployment mode provides an SSL visibility to an ICAP enabled DLP Requires an ICAP template bound to a vPort ICAP solution is based on RFC standard 3507 Configurable to work with internal and external Thunder devices

SSL Insight in Passive Inline with Explicit Proxy ATP / SIEM Firewall/IPS HTTP SSL (Explicit Proxy) SSL ADP 2 ADP 1 ADP 3 Client This deployment mode offers explicit proxy configuration and supports multiple inline and passive (TAP) security devices Customers deploy in explicit proxy mode when they are replacing an existing explicit proxy or prefer it over our standard SSL proxy

Inline mode with Bypass Switch/AFO Firewall or Inline Security Device HTTP ADP 1 ADP 2 SSL SSL Bypass Traffic Bypass Switch This deployment is standard inline mode with the option to deploy a bypass switch AFO-Active Failover Open- utilizes network traffic as a heartbeat. If the network heartbeat fails, the traffic will switch to bypass mode with network interruptions

Inline mode with Bypass Switch/AFO Firewall or Inline Security Device HTTP SSL SSL Bypass Traffic Bypass Switch This deployment is standard inline (L2) mode in a multi-device deployment with a bypass switch option. AFO-Active Failover Open- utilizes network traffic as a heartbeat. If the network heartbeat fails, the traffic will switch to bypass mode with network interruptions

Additional Slides

Top Causes of Large-Scale Breaches Advanced Persistent Threats Insider Abuse Malware 225,000 new malware strains detected per day 55% of abuse caused by users with legitimate access 66% believe their organization will be the target of APT Sources: PandaLabs Report Q1 2015 | 2015 Verizon Data Breach Investigation Report | Mandiant, a FireEye company

SSL Insight Benefits 1 3 Security Uncover threats concealed in inbound and outbound SSL traffic Availability Faster server response time and automatic redundancy 2 4 Performance Relieves the security gateway and server of SSL tasks Scalability Scale server and security gateway capacity with integrated load balancing

Advanced SSL Insight Features URL Classification for Bypass and Filtering Selective bypass of sensitive sites URL filtering to block malicious or undesirable sites in 4.1.0 Explicit Proxy and ICAP Explicit proxy is commonly used by Secure Web Gateways ICAP connectivity offers inline inspection for DLP & AV scanners SSL Insight for vThunder Lab Edition available in 4.0.3 General availability in 4.1.0 Bypass Traffic that Can’t Be Decrypted Dynamic SSL Insight bypass for client certificate traffic Auto-bypass and white lists