Contain and Isolate Ransomware with Citrix and Microsoft

Slides:



Advertisements
Similar presentations
Successfully migrate existing databases to Azure SQL Database
Advertisements

Measuring end user experience in virtual desktops
Secure Hyperconnectivity with TeamViewer and Windows technologies
Enterprise Security in Practice
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
How Microsoft uses Windows Defender ATP–Welcome to a SecOps world!
Azure on Steroids: Full Automation with PowerShell
Cloud Security IS Application-Centric Security
Use any Amazon S3 application with Azure Blob Storage
6/5/2018 1:30 PM THR1029 Spend less time managing data and more time with customers: Quick tour of Outlook Customer Manager Welly Lee
Azure Information Protection Strategy and Roadmap
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Azure Cloud Shell Magic of Modern Command-line Management
Developing Hybrid Apps on Microsoft Azure Stack
Windows 10 and the cloud: Why the future needs hybrid solutions
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Optimizing Microsoft OneDrive for the enterprise
What a Real, Functioning DevOps Team Looks Like
Virtual Machine Diagnostics in Microsoft Azure
Protect sensitive information with Office 365 DLP
SQL Server on Linux on All-Flash Arrays
Microsoft Ignite /31/ :08 AM
8/6/ :17 AM THR2214 Hybrid Cloud Activated A customer case study optimizing on-premises & Azure performance and cost Mor Cohen-Tal Senior Product.
Workflow Orchestration with Adobe I/O
Customize Office 365 Search and create result sources
The utility belt for managing security and compliance in Office 365
Automated Response with Windows Defender ATP
Best Practices for Securing Hybrid Clouds
9/12/2018 7:18 AM THR1081 Don’t be the first victim of new malware Turn Windows Defender AV Cloud Protection on! Amitai Senior Program.
Azure Security in four steps
Automate all things! Microsoft Azure continuous deployment
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Strategy
Azure PowerShell Aaron Roney Senior Program Manager Cormac McCarthy
Continuous Delivery for Microsoft Azure
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Laura A. Robinson July 10, June 30, /15/2018 4:19 PM
11/22/2018 1:43 PM THR3005 How to provide business insight from your data using Azure Analysis Services Peter Myers Bitwise Solutions © Microsoft Corporation.
Continuous Delivery with Visual Studio Team Services
Access and Information Protection Product Overview October 2013
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Microsoft products for non-profits
Automating security for better, continuous compliance in the cloud
Introduction to ASP.NET Core 1.0
Five mistakes to avoid when deploying Enterprise Mobility + Security
Five cool things you can do with Windows PowerShell on Office 365
What do YOU get from SharePoint Hybrid?
Microsoft Virtual Academy
MDM Migration Analysis Tool (MMAT)
Overview: Dynamics 365 for Project Service Automation
Understand your Azure cloud assets dependencies with BMC Discovery
Surviving identity management in a hybrid world
System Center Marketing
Breaking Down the Value of A Yammer Post: 20 Things to Do
Cool Microsoft Edge Tips and Tricks
When Bad Things Happen to Good Applications
Explore PnP Partner Pack for IT pros, admins and architects
Getting the most out of Azure resources with Azure Advisor
“Hey Mom, I’ll Fix Your Computer”
4/21/2019 7:09 AM THR2098 Unlock New Opportunities with Nintex Hawkeye Process Intelligence and Workflow Analytics Sr. Product.
Business Continuity and the Microsoft Cloud
Consolidate, manage, backup, and secure your cloud content
Designing Bots that Fit Your Organization
Ask the Experts: Windows 10 deployment and servicing
Passwordless Service Accounts
Digital Transformation: Putting the Jigsaw Together
WCF and .NET Framework Microservices in Containers
Diagnostics and troubleshooting in Azure App Service Support Center
Optimizing your content for search and discovery
Microsoft Data Insights Summit
Presentation transcript:

Contain and Isolate Ransomware with Citrix and Microsoft 6/12/2018 9:26 PM THR3086 Contain and Isolate Ransomware with Citrix and Microsoft Florin Lazurca Citrix Technical Security Strategist © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

The world is under attack. 74% 80% see need for new security framework worry about data breaches Cyber Security The world is under attack. 49% $1 trillion feel they can reduce risk of DDoS or ransomware attacks spent on cyber security by 2021

Credit: Symantec

6/12/2018 9:26 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

WannaCry: 230k Hosts infected NotPetya: 15k servers, 50k endpoints at one organization

To Pay or Not to Pay? Tactically – may be the only viable option Paying or not paying the ransom incurs a cost Rewards criminal activity Strengthens the incentive for such attacks throughout the industry No guarantee of recovery - “boneidleware” and “leakerware” Paying should not be Plan A

3-2-1 Rule Have at least three copies of your data 6/12/2018 9:26 PM 3-2-1 Rule Have at least three copies of your data Store the copies on two different media Keep one backup copy offsite © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

How Microsoft Helps

Hyper-V 2016 Security Capabilities Secure Boot vTPM BitLocker Virtualization Based Security Credential Guard Device Guard - Code Integrity

Virtual Secure Mode Features Credential Guard Protects against “Pass-the-HASH like” attacks Leverages nested Hyper-V and vTPM (VSM) Device Guard Provides a “White List” of valid code for execution

Hyper-V enhancements – Shielded VMs Security value based upon separation of admin responsibility – hypervisor vs. workloads

How Citrix Helps

Citrix Secure Digital Workspace Software-Defined Perimeter Unified Experience “BYO” Identity Single Sign-on Contextual Access Unified Endpoint Mgmt. App Ops Users Secure IT Contextual Performance Legacy/ Custom Apps Content Control Security & Performance Analytics

Strategic Approach Publish virtualized, sandboxed, and hardened browsers Shield web app users and keep sensitive data off the endpoint Publish email clients to prevent email-borne ransomware Protect mobile devices using: containerization, encryption, blacklists and whitelists, and device compliance checks Protect data with an enterprise grade file sync and sharing service, enabling quick recovery

It's time to isolate your users from the internet cesspool with remote browsing Gartner published: 30 September 2016 ID: G00315285 Analyst(s): Neil MacDonald

Internet Separation Threat Mitigation Resource Location On-premises Internet SaaS Confidential Browser Intranet Internet NetScaler Secure Web Gateway Web filtering SmartAccess & Federation NetScaler Gateway XenApp Web App Firewall Hypervisor Intranet

Virtualized, sandboxed, hardened email client Resource Location On-premises Internet SaaS Secure Outlook NetScaler Secure Web Gateway Web filtering SmartAccess & Federation NetScaler Gateway XenApp Web App Firewall Hypervisor Intranet

Containerize mobile data and apps NetScaler Data XenMobile ShareFile

Security-driven design Network XenApp Farms Apps Data XenApp Sensitive Data Desktops Application 1 XenApp Sensitive Data NetScaler Application 2 Thin Clients XenApp Common Data Branch/Call Center Kiosks Various Applications Common Data Common Data Service Management Monitoring Analytics Automation Provisioning Devices

Protect data with an enterprise grade file sync and sharing service

Encrypted file by ransomware How ShareFile can help Ransomware Use Cases How ShareFile helps Encrypted file by ransomware Ransomware Detection ShareFile versioning helps store history even if the file is renamed ShareFile supports recovery from ransomware after the endpoint device is remediated (Powershell script) Configure sync on file format (registry) ShareFile Desktop App (no file sync) ICAP integration popular Malware and Antivirus solutions for on premises storage API integration with cloud security platforms that offers Multiple AV engines Malware sandboxing solutions Predictive and AI detection Macro and embedded malicious code detection

Hardening Best Practices Educate end users Don’t run applications or desktops in administrator mode Disable macros and active content Move from blacklisting to whitelisting Sandbox the email client and browser Harden the OS and critical applications

Please evaluate this session Tech Ready 15 6/12/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite https://myignite.microsoft.com/evaluations Phone: download and use the Microsoft Ignite mobile app https://aka.ms/ignite.mobileapp Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.