$3.5M The average cost of a data breach to a company 243 The average number of days that attackers reside within a victim’s network before detection 76%

Slides:



Advertisements
Similar presentations
XProtect ® Professional Efficient solutions for mid-sized installations.
Advertisements

XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
The Most Analytical and Comprehensive Defense Network in a Box.
Security for Today’s Threat Landscape Kat Pelak 1.
Microsoft Ignite /16/2017 4:54 PM
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
The Most Analytical and Comprehensive Defense Network in a Box.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Honeypot and Intrusion Detection System
Security Planning and Administrative Delegation Lesson 6.
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Marin Frankovic Datacenter TSP
Threat Management Service October Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-
Synchronized Security Revolutionizing Advanced Threat Protection
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Manage and secure identities in a cloud and mobile world
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Life on the Edge Alex Weinert 2016 Redmond Summit | Identity Without Boundaries 5/26/2016 Group Program Manager
Nuts and Bolts of ATA Chris Lloyd 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Senior Architect
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Microsoft Advanced Threat Analytics
Identity-driven security
Proactive Incident Response
Protect your Digital Enterprise
Network security Vlasov Illia
Microsoft Advanced Threat Analytics
The time to address enterprise mobility is now
Deployment Planning Services
Deploy and get started with Microsoft Advanced Threat Analytics
“Introduction to Azure Security Center”
Emanuele Bianchi | EMEA Security GBB
Real-time protection for web sites and web apps against ATTACKS
Plan and deploy Microsoft Advanced Threat Analytics the right way
Building an effective ATA solution
Microsoft Advanced Threat Analytics
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
SAM GDPR Assessment <Insert partner logo here>
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
12/1/ :04 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

$3.5M The average cost of a data breach to a company 243 The average number of days that attackers reside within a victim’s network before detection 76% of all network intrusions are due to compromised user credentials $500B The total potential cost of cybercrime to the global economy

Costing significant financial loss, impact to brand reputation, loss of confidential data, and executive jobs Compromising user credentials in the vast majority of attacks Using legitimate IT tools rather than malware – harder to detect Staying in the network an average of eight months before detection Today’s cyber attackers are:

Using legitimate IT tools rather than malware – harder to detect Costing significant financial loss, impact to brand reputation, loss of confidential data, and executive jobs Compromising user credentials in the vast majority of attacks Staying in the network an average of eight months before detection Today’s cyber attackers are:

Using legitimate IT tools rather than malware – harder to detect Staying in the network an average of eight months before detection Costing significant financial loss, impact to brand reputation, loss of confidential data, and executive jobs Compromising user credentials in the vast majority of attacks Today’s cyber attackers are:

Compromising user credentials in the vast majority of attacks Using legitimate IT tools rather than malware – harder to detect Staying in the network an average of eight months before detection Costing significant financial loss, impact to brand reputation, loss of confidential data, and executive jobs Today’s cyber attackers are:

Traditional IT security tools are typically: Designed to protect the perimeter ComplexProne to false positives When user credentials are stolen and attackers are in the network, your current defenses provide limited protection. Initial setup, fine-tuning, creating rules and thresholds/baselines can take a long time. You receive too many reports in a day with several false positives that require valuable time you don’t have.

An on-premises platform to identify advanced security attacks before they cause damage  Credit card companies monitor cardholders’ behavior.  If there is any abnormal activity, they will notify the cardholder to verify charge. Microsoft Advanced Threat Analytics brings this concept to IT and users of a particular organization Comparison :

Behavior al Analytics Detection for known attacks and issues Advanced Threat Detection An on-premises platform to identify advanced security attacks before they cause damage

Detect threats fast with Behavioral Analytics Adapt as fast as your enemies Focus on what is important fast using the simple attack timeline Reduce the fatigue of false positives Prioritize and plan for next steps No need for creating rules, fine-tuning or monitoring a flood of security reports, the intelligence needed is ready to analyze and self-learning. ATA continuously learns from the organizational entity behavior (users, devices, and resources) and adjusts itself to reflect the changes in your rapidly-evolving enterprise. The attack timeline is a clear, efficient, and convenient feed that surfaces the right things on a timeline, giving you the power of perspective on the “who-what-when-and how” of your enterprise. Alerts only happen once suspicious activities are contextually aggregated, not only comparing the entity’s behavior to its own behavior, but also to the profiles of other entities in its interaction path. For each suspicious activity or known attack identified, ATA provides recommendations for the investigation and remediation.

Analyze 1 After installation: Simple non-intrusive port mirroring configuration copies all AD-related traffic Remains invisible to the attackers Analyzes all Active Directory traffic Collects relevant events from SIEM and other sources

ATA: Automatically starts learning and profiling entity behavior Identifies normal behavior for entities Learns continuously to update the activities of the users, devices, and resources Learn 2 What is entity? Entity represents users, devices, or resources

Detect 3 Microsoft Advanced Threat Analytics: Looks for abnormal behavior and identifies suspicious activities Only raises red flags if abnormal activities are contextually aggregated Leverages world-class security research to detect known attacks and security issues (regional or global) ATA not only compares the entity’s behavior to its own, but also to the behavior of entities in its interaction path.

Alert 4 ATA reports all suspicious activities on a simple, functional, actionable attack timeline ATA identifies Who? What? When? How? For each suspicious activity, ATA provides recommendations for the investigation and remediation. ?

Abnormal Behavior  Anomalous logins  Remote execution  Suspicious activity Security issues and risks  Broken trust  Weak protocols  Known protocol vulnerabilities Malicious attacks  Pass-the-Ticket (PtT)  Pass-the-Hash (PtH)  Overpass-the-Hash  Forged PAC (MS )  Golden Ticket  Skeleton key malware  Reconnaissance  BruteForce  Unknown threats  Password sharing  Lateral movement

 Witnesses all authentication and authorization to the organizational resources within the corporate perimeter or on mobile devices Mobility supportIntegration to SIEMSeamless deployment  Works seamlessly with SIEM  Provides options to forward security alerts to your SIEM or to send s to specific people  Functions as an appliance hardware or virtual  Utilizes port mirroring to allow seamless deployment alongside AD  Does not affect existing network topology Key features

Topology

Captures and analyzes DC network traffic via port mirroring Listens to multiple DCs from a single Gateway Receives events from SIEM Retrieves data about entities from the domain Performs resolution of network entities Transfers relevant data to the ATA Center

Manages ATA Gateway configuration settings Receives data from ATA Gateways and stores in the database Detects suspicious activity and abnormal behavior (machine learning) Provides Web Management Interface Supports multiple Gateways

Configure port mirroring Create domain read only user Identify VPN / DA networks Optional – Create ATA honeytoken user Optional – Deploy certificates

 After Aug 1, 2015, existing ECAL customers with active SA, will automatically get license rights to ATA.  After Aug 1, 2015, all existing EMS/ECS customers will automatically get rights to ATA through their subscription term, including true-ups, at current agreement price.  Customers making new EMS/ECS purchases after Aug 1, 2015, should be quoted new EMS/ECS pricing taking effect after Aug 1.  Standalone ATA option is for customers who can not purchase ECALs or EMS/ECS, or need to mix & match licenses based on user-type.  Sample price: Open NL L&SA 2yr ERP ~$160/user. Included in ECAL Suite ATA license included in both per-user and per-device ECAL Suites starting Aug 1, 2015 Included in EMS & ECS ATA per-user license included with EMS and ECS subscriptions, starting Aug 1, 2015 Available as standalone SKU Per-user or per-OSE Client Management License  ATA is licensed, standalone, as a Client Management License, with per-user and per-OSE options.  Best way to get ATA is via one of 3 Microsoft license suites: Enterprise CAL, EMS, or ECS  Server software is free (no server license required)  ATA will be available in nearly all Microsoft Volume Licensing channels and programs

How many licenses does my customer need to buy to use ATA? Customer configures ATA to monitor domain controllers. # of licenses needed = # of users or end-user devices contained in the forests or domains being managed by those domain controllers. ATA is not configurable at a user-level, by design. What RSD does ATA revenue fall in? As part of ECAL CnE CAL Suites – ECAL As part EMS/ECS Enterprise Mobility Services Standalone ATA Identity and Access Is there any relation between ATA & Systems Center client products, since they share a licensing model? No, ATA is a completely separate, unrelated software product. Customer is buying EMS for some users, but wants ATA for entire org. Do they need to buy EMS for everyone? No, ATA can be licensed through one of three license suites (ECAL, EMS, ECS), or via standalone user licenses. Customer can mix & match as needed.