Download presentation
Presentation is loading. Please wait.
Published byCora Taylor Modified over 9 years ago
1
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Security Intelligence and Analytics See everything. Know everything.™ Steve Shillingford, President and CEO
2
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. The Threat Landscape Has Evolved… HACKTIVISTS STATE- SPONSORED ATTACKERS CYBERCRIMINALS 2 FINANCIALLY MOTIVATED NATIONALISTICALLY MOTIVATED POLITICALLY MOTIVATED ATA/APT GRADE DDOS Ransom & fraud Gov’t, enterprise & infrastructure targets Public data leakage Defacement DATA THEFT MALWARE BAD STUFF IN GOOD STUFF OUT
3
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. The Malware Problem – Overwhelming Odds 1/3 of malware is customized (no signature available at time of exploit) 85% of breaches took weeks or more to discover (+6%) (VzB, 2012) (Ponemon) 91% of organizations believe exploits bypassing their IDS and AV systems 3
4
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Finding Answers to Dreaded Post-breach Questions 4 ? Who did this to us? How did they do it? What systems and data were affected? Can we be sure it is over? Can it happen again?
5
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Records, classifies and indexes all packets, flows, and files from L2–L7 On the wire, file-level visibility of data exfiltration and malware infiltration Unmatched multi-dimensional flow enrichment and Big Data warehousing Actionable intelligence, forensics and situational awareness Flexible, open and easy-to-use platform-Hardware, Software, and VM Providing real-time analysis and full visibility of everything going in and out of your network Solera Networks is the Security Camera for your Enterprise Network 5
6
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. NGFW DPI IDS/IPS NGFW DPI IDS/IPS ACLs Flow Analysis Stateful Firewalls Solera is Solving the Visibility Gap in Today’s Tools 6 Time 1997 2012 1999 2002 2006 PREVENTION PREVENTION 2 3 4 5 6 7 CONTENT CONTEXT VISIBILITY BIG DATA SECURITY Security Intelligence and Analytics TODAY’S SECURITY GAP Coverage Real-Time File Extraction Real-Time Analytics Deep Packet Inspection Log Analysis & Aggregation Malware Analysis Application-Based Blocking Signature-Based Blocking L2-L7 Indexing Storage Full Packet Capture TCP/IP Model
7
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Advanced Persistent Security ™ that easily tells users what to look for—and at 7
8
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Solera DeepSee ™ The Most Scalable and Flexible Big Data Security Solution 8
9
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Big Data Security Intelligence and Analytics for Visibility of Today’s Advanced Threats Goes beyond traditional approaches to deliver 20/20 visibility of advanced malware, APTs and ATAs—for every packet, flow and file Automatically and accurately tells enterprises and organizations what zero-day threats and attacks to look for—instead of the other way around Seamlessly integrates with best-of-breed 3rd party security tools to provide a single, correlated event view 9
10
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Security Intelligence & Analytics Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years. —Neil MacDonald, Distinguished VP GARTNER “ ” INTRUSION PREVENTION SYSTEMS NEXT-GEN FIREWALLS LOG MANAGEMENT SECURITY INFORMATION EVENT MANAGEMENT CONTENT FILTERING DATA LEAKAGE PREVENTION 10
11
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. What We Do Matters We help protect companies and government agencies from those who want to do them harm. And, by doing that, we are helping to protect our way of life…
12
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.