11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.

Slides:



Advertisements
Similar presentations
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Security for Today’s Threat Landscape Kat Pelak 1.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Chapter 12 Network Security.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
About Palo Alto Networks
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
How to protect your Virtual Datacenter Michiel van den Bos.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Dell Connected Security Solutions Simplify & unify.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Managed Security Vikas Khanduri CCIE#13516,CCSP,CCDP,CCNP,MCSE.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Micro segmentation with Next Generation Firewall and Vmware NSX
Security fundamentals Topic 10 Securing the network perimeter.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
IS3220 Information Technology Infrastructure Security
Critical Infrastructure Protection and the Role of the Next Generation Firewall Blaž Ivanc.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Palo Alto Networks - Next Generation Security Platform
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
Understanding and breaking the cyber kill chain
Security fundamentals
OIT Security Operations
Stop Cyber Threats With Adaptive Micro-Segmentation
Today’s cyber security landscape
Firewalls.
Company Overview & Strategy
UNM Enterprise Firewall
MISSION STRATEGIC DIRECTION
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Software-Defined Secure Networks in Action
Check Point Connectra NGX R60
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Introduction to Network Security
Presentation transcript:

11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling Regional Sales Manager, Michigan

2 WHAT’S CHANGED? THE EVOLUTION OF THE ATTACKER $1+ CYBERCRIME NOW trillion industry 100+ nations CYBER WARFARE

3 WHAT’S CHANGED? Known threats Organizational risk Identity compromise Zero-day exploits / vulnerabilities Evasive command-and-control Unknown & polymorphic malware Mobility threat THE EVOLUTION OF THE ATTACK

4 Changing Face of Security  Has Been – Block known bad traffic – Pass rest of traffic as good  New Challenge – The Unknown  Need to investigate unknown traffic and define it as either known good or known bad – Then block the newly defined bad  New World – Top Down Security Architecture – Known good – Known bad – Unknown Continuous Loop

5 FAILURE OF LEGACY SECURITY ARCHITECTURES Anti-APT for port 80 APTs Anti-APT for port 25 APTs Endpoint AV DNS protection cloud Network AV DNS protection for outbound DNS Anti-APT cloud Internet Enterprise Network UTM/Blades Limited visibility Manual response Lacks correlation Vendor 1 Vendor 2 Vendor 3 Vendor 4 Internet Connection Malware Intelligence DNS Alert Endpoint Alert AV Alert SMTP Alert AV Alert Web Alert SMTP Alert DNS Alert AV Alert DNS Alert Web Alert Endpoint Alert

6 Common traits for breached networks 1. A port based firewall 2. A static IPS 3. Zero Day Malware used to manipulate platforms in the network 4. Identity credentials hijacked

7 Laterally hop into the data center for initial infection there ENTER THE DATA CENTER Lateral Data Center motion for a foothold on the target VM REACH THE TARGET Understanding the Attack Kill-chain Attack kill-chain Prevent attacks by stopping one step in the kill-chain Steal intellectual property STEAL DATA Move laterally and infect additional hosts ENDPOINT OPERATIONS Initial compromise and malware delivery BREACH PERIMETER Deliver secondary malware and communicate with attacker DELIVER MALWARE

8 REQUIREMENTS FOR THE FUTURE DETECT AND PREVENT THREATS AT EVERY POINT ACROSS THE ORGANIZATION At the internet edge Between employees and devices within the LAN At the data center edge, and between VM’s At the mobile device Cloud Within private, public and hybrid clouds

9 ZERO TRUST NETWORKING Framework of what can be done in a modern security framework

10 Overall Historic Framework  Security has been largely based on perimeter point solutions and endpoint AV – Firewall, IPS, web gateway, etc  Some enterprises may also create security segmentation between network types— usually port based rules  Security in the Data Center has been evolved differently for different companies – Some with no security between users and data – Some with simple port based rules – Some with port rules and some degree of IPS functionality  Rules are typically blocking in nature—ports, signatures, or URLs

11 Evolution of Security Architectures  Up until ~2 years ago, best of breed security deployments were seen as the most reliable security model – No reliance on a single vendor, no single vulnerability, different engineering efforts  Today that has lead to two problems – Platform sprawl—many different security elements with different specialties required. You become the SI – Rule management—as applications or policies change, rules don’t get uniformly updated across all platforms, leaving rules that are no longer relevant or that might create new vulnerabilities  And with those problems…a lack of ability to prevent malware attacks – Malware detection becomes another piece of product sprawl – Very difficult to move from detection to prevention with so many dissimilar security products in the network  “Where” security is deployed is rapidly changing—trust zones are breaking down – Internet Edge, Network Segmentation, Data Center Edge, Data Center East/West

12 THEN AND NOW How the posture of security is changing

13 Internet Perimeter  Work to protect the network from known threats  Security posture: – Only open ports needed to support the business – Use an IPS to block all known malware via signature – Block known dangerous or unapproved URL sites  Static set of rules  Work to defend the users and applications from attack  Security posture can now: – Blacklist/Whitelist by application and user – Sandboxing to detect unknown malware – Create feedback loop to map unknown  known to prevent – Integrate AV signatures for known/unknown Malware – Disallow known dangerous URL sites—13,500 additional new per day – Integrated policies between application, signature, and URL  Dynamic security posture THENNOW GOAL  Block known bad ports, signatures and URLs GOAL  App/User security focused on Zero-Day prevention

14 Segmentation Strategy GOAL  Limit traffic flow between different network segments  Different user groups create different privileges GOAL  Defeat lateral movement of malware in the network  Create segmentation zones to limit users per group  Strictly control flows between security zones  Limit types of flows that can move between segments THENNOW Typically port based firewall rules with specific open ports between segments Policy tends toward user/application whitelisting where specific applications are allowed and all other traffic blocked Passive detection strategy for malware and hackers

15 Data Center Perimeter (N/S flows) GOAL  Protect your data center from disallowed traffic GOAL  Protect your data center from any hacked user or malware (no longer trust your users) at the application level THENNOW  Policy typically based on: – Opening ports in and out of the DC based on applications supported – Typically little to no IPS monitoring – Less focus on securing traffic egressing the DC  Often focused on compliance vs security  Policy based on: – Whitelisting policies: You know both sides of the flow, only allow specific interactions between users and applications  For allowed rules, use Wildfire/WF-500 to examine any executable or file shared to look for embedded malware  Enforce application based egress policies to limit data exfiltration

16 Intra-Data Center (E/W flows) GOAL  Protect your data center VMs by enforcing the ports that applications can use to communicate GOAL  Protect your data center from any hacked user or malware (no longer trust your VMs) at the application level THENNOW  Policy typically based on: – Opening allowed ports between VM’s – Typically limited or no IPS functions  Policy based on: – Whitelisting policies: You know both sides of the flow, only allow specific application interactions (not port rules)  For allowed rules, use sandboxing to examine any executable or document shared to look for embedded malware

17 Remote Users  Ensure users from outside the network can get secured access to the network  Policy typically based on: –Creating secured tunnels from remote users to an access concentrator in the network –Once authenticated into the network, full rights are now allowed –Typically limited or no additional security mapped to remote users  Ensure users from outside the network can get secured access to the network  Security posture relies on: –Validation of the devices to determine how safe it is to allow on the network –Protection of the device to determine if it has malware –Encrypted access for all traffic –User-ID integration to create policies regardless of where/how accessing the network –Full inspection of all flows to watch for malware from the remote device THENNOW GOAL  Remote VPN with malware prevention GOAL  Remote VPN

18 Requirements for Security in todays Threat Landscape 1. Application based security rules – Including the ability to decrypt flows 2. Rules based on User Identity/User Groups 3. Sandbox Technology to detect unknown malware 4. Threat Prevention updates to enable dynamic prevention signatures for malware 5. URL Technology to enable dynamic prevention of malware Command & Control

19