Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Sky Advanced Threat Prevention
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Computer Security Keeping you and your computer safe in the digital world.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
BUILD SECURE PRODUCTS AND SERVICES
Deployment Planning Services
Exchange Online Advanced Threat Protection
Barracuda Web Security Flex
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Critical Security Controls
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Data Center Firewall.
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Active Cyber Security, OnDemand
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Threat Landscape for Data Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
12/5/2018 2:50 AM How to secure your front door with real-time risk assessments of your logons Jan Ketil Skanke COO and Principal Cloud Architect CloudWay.
Anatomy of a Large Scale Attack
System Center Marketing
Strategic threat assessment
Information Protection
Cybersecurity and Cyberhygiene
Microsoft Data Insights Summit
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
STEALTHbits Technologies, Inc.
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Presentation transcript:

Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore Senior Security Engineer July 10, 2018

Web Isolation Fundamentals Browsing session is secured through isolation; access not blocked Everything assumed to be malicious All code and content prevented from reaching endpoints Enables access to unknown/risky content where there is a legitimate need Web isolation eliminates patient zero Isolation prevents infections before they ever happen Even zero-day vulnerabilities Malware has become extremely violent (e.g. ransomware) with close to zero dwell time for detection and remediation Isolation can be used to allow access to sites that previously would have been blocked. It does not depend on the Detect then Prevent construct. Everything is assumed to be bad. Easy to deploy and use given the way it is architected.

Symantec Announces Fireglass Acquisition Web isolation changes the game for protecting against advanced threats Fireglass web isolation Established in 2014 Leader in fast growing browser/web isolation market Customer value – increased malware protection for web & mail Integrates with Secure Web Gateway (ProxySG, ASG, VSWG) to allow safe access to uncategorized/risky sites Also can work with email on prem – parallel with Symantec SMG Offered stand-alone – cloud or on-prem Integrations underway with cloud-delivered Web Security Service and Symantec email security solutions (SMG, email.cloud) Integrate with 3rd party proxies and NGFW’s Symantec acquired Fireglass, a leader in the fast growing security category known as Isolation or Remote Browsing Adds capabilities in a few areas of our portfolio, primarily in Web and Email Security

Market View on Web Isolation “Evaluate and pilot a remote browser solution in 2017 as one of the most significant ways an enterprise can reduce the ability of web-based attacks on users to cause damage” Web isolation is a new threat prevention approach Sometimes referred to as Remote Browsing, but has broader applications for use Identified as top technology in 2016 & 2017 Gartner predicts that over 50% of enterprises will adopt web isolation Isolation can be used to allow access to sites that previously would have been blocked. It does not depend on the Detect then Prevent construct. Everything is assumed to be bad. Easy to deploy and use given the way it is architected.

90% of Cyber Attacks Come Through Web and Email Email & Phishing Threats Web Threats 1,400+ 83% New browser & plug-in vulnerabilities per year Growth in active phishing URLs of sites can be used to deliver malware 78% of Large Enterprise were targeted by spear phishing 55% - Security professionals often surprised to see that over 90% of cyber-attacks come through web and e-mail On the web side, it is primarily through vulnerabilities that exist in browsers or users wandering onto websites that deliver malicious content. The big vector on the email side is Phishing. Every 4 seconds 12% an unknown malware is downloaded of users click untrusted links or attachments Source: Verizon DBIR, Symantec ISTR, Gartner

The Threat of the Unknown Web Parameter BLOCK ALLOW / BLOCK? ALLOW? Known Good uncategorized or potentially risky* domains Unknown/Risky “How Can I Increase Security without over-blocking?” THE CHALLENGE Millions of new sites created every day 71% of all host names exist for 24 hours or less Many are legitimate, but some offer ideal cover for hackers launching attacks Difficult to assess w. traditional “detection” approaches Customizing protection without over-blocking Known Bad

Web Isolation Architecture Risks Symantec Web Isolation User Web 100% safe rendering information Render Execute Download Secure Disposable Container 100101001 010110100 110010101 101010011010 01 11 10 Documents Secure Disposable Container 100101001 010110100 110010101 101010011010 01 11 10 User gestures Email Some key aspects to highlight in our architecture and approach: - The solution is agentless - Web session is completely isolated in a container. Container handles rendering, execution and downloading - can be deployed as an on-premise solution or as a cloud service - Any device, OS or browser Secure Disposable Container Seamless browsing experience Isolate both web and email, including documents On premise, cloud and hybrid 100101001 010110100 110010101 101010011010 01 11 10

Demo

Key Use Cases

Problem: Over-blocking the “Middle Ground” Sites Web access policy: Always allow certain categories/sites Always block certain categories/sites Key Issue – Middle Ground Over-block – creates user issues Under-block – Increased risk of malware Allowed Categories Categories where some access may be required Uncategorized Threat Cats Health, Financial Services, etc. Dynamic DNS Host File Storage/ Sharing Hacking Suspicious Malicious in/out… … ALLOW ALLOW or DENY… DENY… MOSTLY DENY DENY …depending on organizational needs …for security best practices at the expense of user experience. Often requires additional ops to whitelist specific domains/users Some Allow Some Allow Often requires additional ops to whitelist specific domains/users

Web isolation with proxy using website categories Stop Over-blocking Web isolation with proxy using website categories Web access policy: Always allow certain categories/sites Always block certain categories/sites Middle ground categories/sites get isolated Expanded access with no malware risk Allowed Categories Categories where some access may be required Uncategorized Threat Cats Health, Financial Services, etc. Dynamic DNS Host File Storage/ Sharing Hacking Suspicious Malicious in/out… … ALLOW ISOLATE DENY

Stop Over-blocking Web isolation with proxy using categories (with risk levels: BCIS-advanced) Web access policy: Allow certain categories and low risk sites Block certain categories and riskiest sites Middle ground categories and potentially risky sites get isolated Expanded access with no malware risk Risk Level Allowed Categories Customer Category Categories where some access may be required Uncategorized Security Concerns Health, Financial Services, etc. Category of Interest File Storage/ Sharing Dynamic DNS Host Hacking Suspicious Malicious Outbound … 10 9 8 7 6 5 4 3 2 1 DENY ISOLATE ALLOW

Leveraging Symantec Global Intelligence Network (GIN) 21,000+ Cloud applications discovered and protected Discovered 430 million new unique pieces of malware last year 1B malicious emails stopped last year File URL Whitelist Blacklist Certificate Machine Learning Key Points – - Up to date, accurate data, correlated and analyzed to give you the latest information on known bads…no one can argue with the importance of this - Symantec has the largest civilian threat intelligence network in the world; sourced from: >1 billion web requests scanned daily >2 billion emails scanned per day Data from over 175M endpoint devices All analyzed and assessed by advanced algorithms to identify and risk score malicious sites The proof is in the results…data points in the black section of slide 182M web attacks blocked last year 100M social engineering scams blocked last year CLOUD GLOBAL INTELLIGENCE SOURCED FROM: 1 Billion previously unseen web requests scanned daily 2 Billion emails scanned per day 175M Consumer and Enterprise endpoints protected 9 Global threat response centers with 3,000 Researchers and Engineers

Additional Protection for Privileged Users Safeguard Privileged Users Prevent Malware with Web Access We have privileged users like executives, IT admins, HR, and finance that have extra permissions and access rights to sensitive data and systems I need to enable secure web browsing on those critical endpoints, and ensure internet delivered malware never impacts these devices C-Level Team Key IT Staff HR, Legal, Finance Malware on these endpoints has severe consequences because of unique system privileges

Prevent Phishing Attacks by Isolating Risky Embedded URL Links Prevent malware/ransomware from phishing attacks Isolate websites launched from URLs embedded in email Stop credential theft by preventing users from submitting corporate credentials and other sensitive information on unknown and malicious sites Protect my users from embedded URLs that links to malicious websites

Thank You!