© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Palo Alto Networks Jay Flanyak Channel Business Manager
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Security+ Guide to Network Security Fundamentals
MIGRATION FROM SCREENOS TO JUNOS based firewall
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
John Prisco President and CEO Triumfant, Inc. Our defenses are designed to defeat threats we have seen before. We have very little protection against.
Director of Research, SANS Institute
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
The Most Analytical and Comprehensive Defense Network in a Box.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x4242 Cloud Network Defense.
Threat Management Service October Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Sky Advanced Threat Prevention
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
How to Make Cyber Threat Intelligence Actionable
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Palo Alto Networks - Next Generation Security Platform
1 | Company Confidential The Modern Cyber Threat Pandemic Cameron Erens LogRhythm.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
NPM and Security Forensics Mark Cromley Solutions Engineer Viavi Solutions, Inc.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Real-time protection for web sites and web apps against ATTACKS
Closing the Breach Detection Gap
Threat Landscape for Data Security
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ISMS Information Security Management System
Panda Adaptive Defense Platform and Services
Presentation transcript:

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Security Intelligence and Analytics See everything. Know everything.™ Steve Shillingford, President and CEO

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. The Threat Landscape Has Evolved… HACKTIVISTS STATE- SPONSORED ATTACKERS CYBERCRIMINALS 2 FINANCIALLY MOTIVATED NATIONALISTICALLY MOTIVATED POLITICALLY MOTIVATED ATA/APT GRADE DDOS Ransom & fraud Gov’t, enterprise & infrastructure targets Public data leakage Defacement DATA THEFT MALWARE BAD STUFF IN GOOD STUFF OUT

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. The Malware Problem – Overwhelming Odds 1/3 of malware is customized (no signature available at time of exploit) 85% of breaches took weeks or more to discover (+6%) (VzB, 2012) (Ponemon) 91% of organizations believe exploits bypassing their IDS and AV systems 3

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Finding Answers to Dreaded Post-breach Questions 4 ? Who did this to us? How did they do it? What systems and data were affected? Can we be sure it is over? Can it happen again?

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Records, classifies and indexes all packets, flows, and files from L2–L7 On the wire, file-level visibility of data exfiltration and malware infiltration Unmatched multi-dimensional flow enrichment and Big Data warehousing Actionable intelligence, forensics and situational awareness Flexible, open and easy-to-use platform-Hardware, Software, and VM Providing real-time analysis and full visibility of everything going in and out of your network Solera Networks is the Security Camera for your Enterprise Network 5

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. NGFW DPI IDS/IPS NGFW DPI IDS/IPS ACLs Flow Analysis Stateful Firewalls Solera is Solving the Visibility Gap in Today’s Tools 6 Time PREVENTION PREVENTION CONTENT CONTEXT VISIBILITY BIG DATA SECURITY Security Intelligence and Analytics TODAY’S SECURITY GAP Coverage Real-Time File Extraction Real-Time Analytics Deep Packet Inspection Log Analysis & Aggregation Malware Analysis Application-Based Blocking Signature-Based Blocking L2-L7 Indexing Storage Full Packet Capture TCP/IP Model

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Advanced Persistent Security ™ that easily tells users what to look for—and at 7

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Solera DeepSee ™ The Most Scalable and Flexible Big Data Security Solution 8

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Big Data Security Intelligence and Analytics for Visibility of Today’s Advanced Threats Goes beyond traditional approaches to deliver 20/20 visibility of advanced malware, APTs and ATAs—for every packet, flow and file Automatically and accurately tells enterprises and organizations what zero-day threats and attacks to look for—instead of the other way around Seamlessly integrates with best-of-breed 3rd party security tools to provide a single, correlated event view 9

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Security Intelligence & Analytics Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years. —Neil MacDonald, Distinguished VP GARTNER “ ” INTRUSION PREVENTION SYSTEMS NEXT-GEN FIREWALLS LOG MANAGEMENT SECURITY INFORMATION EVENT MANAGEMENT CONTENT FILTERING DATA LEAKAGE PREVENTION 10

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. What We Do Matters We help protect companies and government agencies from those who want to do them harm. And, by doing that, we are helping to protect our way of life…

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.