Faizel Lakhani | President & COO

Slides:



Advertisements
Similar presentations
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Advertisements

1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
The Most Analytical and Comprehensive Defense Network in a Box.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
The Most Analytical and Comprehensive Defense Network in a Box.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Network security Product Group 2 McAfee Network Security Platform.
Accessing Evitech network via FTP by Susan Jansson.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Kaspersky Small Office Security INTRODUCING New for 2014!
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Network System Security - Task 2. Russell Johnston.
Proactive Incident Response
Protect your Digital Enterprise
Barracuda NG Firewall ™
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Securing Information Systems
Your Partner for Superior Cybersecurity
Computer & Network Security
IoT Security Part 2, The Malware
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Cloud App Security vs. O365 Advanced Security Management
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Critical Security Controls
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Systems Security Keywords Protecting Systems
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Jon Peppler, Menlo Security Channels
SECURITY INFORMATION AND EVENT MANAGEMENT
Security in Networking
Call AVG Antivirus Support | Fix Your PC
Myths About Web Application Security That You Need To Ignore.
Threat Landscape for Data Security
Healthcare Cloud Security Stack for Microsoft Azure
Sizing …today. T: Here’s how. .
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Home Internet Vulnerabilities
Shifting from “Incident” to “Continuous” Response
12/1/ :04 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure once, run anywhere Simplify your security with Sophos
Introduction to Systems Security
What’s new in the Fall Creators Update for Windows Defender ATP
Healthcare Cloud Security Stack for Microsoft Azure
Per Söderqvist Per Söderqvist Sales Engineer
INTERNET SECURITY.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Faizel Lakhani | President & COO SS8 BreachDetect Faizel Lakhani | President & COO

Vulnerability Weaponized The Current Model Traditional threat intelligence feeds raise alarms when known threats are detected in the future Some offer a very short window to go backwards to determine if the vulnerability was used to access the network Your Exposure Your visibility to this vulnerability History Vulnerability Weaponized Malware Discovered Threat Definition

Vulnerability Weaponized The SS8 Difference Time Machine for Breach Detection SS8 identifies when vulnerabilities were exploited in the past. We alert you to those vulnerabilities being exploited now and in the future. Leading threat intelligence feeds Your Exposure Your visibility to this vulnerability Your visibility to this vulnerability History Vulnerability Weaponized Threat Definition Malware Discovered

Introducing SS8 BreachDetect Time Machine for Breach Detection Lightweight Sensors Learning Analytics Automated Discovery Application-aware sensors deploy on the network to generate High-Definition Records (HDRs) that can be stored for years Enriches, analyzes, learns, and matches HDR data with user, device and threat intelligence information Simplified workflows and visualization built for the security analyst take the guesswork out of hunting for breaches

BreachDetect at Work Find breaches now you didn’t know about before Firewall Anti-Malware Intrusion Detection Anti-Virus Web session from 1.2.3.4 to 9.8.7.6 using Internet Explorer on a Windows 8.1 computer Email session from 12.13.14.15 to 91.84.73.62 with attachment, “Your Benefits Statement.pdf” File upload using Dropbox over HTTPS from 55.62.73.84 to 10.19.18.17, “employee information.pdf” Uncovered as a Command and Control Network Uncovered weeks later as a Phishing Attack Found to be a source of Malware installation

Differentiators 1 Workflows Built for Breach Hunting

HIGH-DEFINITION RECORDS (HDRs) Differentiators 2 HDRs Provide App-Level Visibility Layer 7 intelligence (not NetFlow) Decodes thousands of protocols 10 million HDRs processed per second HIGH-DEFINITION RECORDS (HDRs) Date Time User Device App Attachment Size 03-12-16 23:22:16 John Locno iPhone - 140 kb 03-13-16 07:10:55 Dennis Li Dell Laptop book.doc 20 MB 04-04-16 10:30:03 Tim Blattly Dev Server prez2.zip 43.7 MB 04-10-16 09:20:02 Bill Simons MacBook results.ppt 3 MB 04-15-16 20:09:01 Sandy Stall 198 kb

Conventional Packet Storage Differentiators 3 Extensive Data Storage for Retrospection Full Packets, and Coarse or No Metadata Conventional Packet Storage 2 Weeks of Data No Enrichment with Device or User Information - Investigation-grade, High-Definition Records from Every Packet Enrichment with User and Device information + 8-10 Years of Data

HDRs 4 Differentiators Network, Device, Identity, Application Not just replaying history, learning from and applying it HDRs Network, Device, Identity, Application Threat Feeds SS8 Applies Today’s Knowledge to History SS8 Supports Any Threat Feeds Other devices with the same connections? Did any employees go to newly learnt malvertising sites? SAP ThreatDetect, AlienVault, iSIGHT Partners, Critical Stack, and more… Did anyone else receive this same phishing email and attachment? Did anyone take advantage of this vulnerability in the past?

Thank You www.SS8.com