Download presentation
Presentation is loading. Please wait.
Published byBriana Shelton Modified over 9 years ago
1
Threat Management Service October 2015
2
Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a- Service provider focused on real-time event analysis & management It developed MOREAL to proactively combat known and unknown threats to network security within an enterprise and give enterprises efficient access to security services via its cloud-based model
3
Managed Security Services from PCCW Global PCCW Global offers a suite of Managed Security Services that are designed to optimize and protect your network 3 Managed FirewallHosted Firewall Anti Distributed Denial of Service Threat Management Service PCCW Global offers a suite of Managed Security Services that are designed to optimize and protect your network
4
What is MOREAL? MOREAL is a solution for identifying network security threats in real-time and providing actionable information for combating attacks on an organisation. 4 Self-Learning Threat Database Proactive Real-Time Threat Identification Efficient non-intrusive deployment Scalable Cloud-Based Security MOREAL mines data from existing network elements to identify known and unknown threats and protect your organization from revenue loss and reputation damage
5
Security Operation Centers SOC: Athens, Herndon & Hong Kong DC: Amsterdam, London, Dallas, Los Angeles, Singapore & Hong Kong 5 7X24 Security Operation Centers Proactive monitoring Emergency Response & Incident Handling Teams Security Research Team Amsterdam London Athens Los AngelesDallas Herndon Hong Kong Singapore Hong Kong
6
Security Challenges 6
7
7 $171m $94m $66m $61m $14m $0.5 - $1.0m PlayStation 3 data breach (April 2011) 1.5 million credit card records stolen (April 2012) SecureID intellectual property breach (March 2011) 40 million credit and debit cards stolen (December 2013) 1.9 million Social Security numbers stolen (October 2012) 6 million passwords stolen (June 2012) $3 trillion $67 billion Cybercrime Cost Source: ISACA Annual Security Investments Source: Gartner The Cost of Cybercrime
8
An Increasingly Sophisticated Landscape 8 42.8M Security incidents increased by 48%, to 42.8 million, the equivalent of 120,000 attacks a day. The average cost of managing and mitigating data breaches rose to $2.7m per incident, over a third more than in 2013. Price Waterhouse Coopers Global State of Information Security Survey 2015 Attacks are more frequent, sophisticated, and damaging to an enterprise
9
The Need for a New Approach “Organisations must assume they are compromised, and, therefore, invest in detective capabilities that provide continuous monitoring for patterns and behaviours indicative of malicious intent”. ̶ Malware Is Already Inside Your Organisation; Deal With It – Gartner 2014 9 At Risk: RevenueReputationProfitabilityLong-Term Trust
10
10 Our Positioning - The Market Lacks Responsive Security Recovery Prevention Response Detection IT Tools Backup Virtualization Advanced Persistent Threat Security Information and Event Management Vulnerability Assessment Antivirus Intrusion Prevention Systems Firewalls AntiSpam Content Filtering Anti Denial of Service Threat Management Service Anti DDoS Managed Firewall Hosted Firewall
11
Our Solution 11
12
Network Threat Management Network threats may be categorized as: Threats you know about. Threats you don’t know about. Threats you only find out about after a compromise. 12 Most security services rely on recognizing known threats rather than new or constantly changing threats. Our Threat Management Service continuously scans for threats in real-time, self-learns, and provides actionable threat identification. It is designed to identify known, unknown and even threats that have compromised your security but have yet to do harm to your organization
13
Threat Management Service 13 PCCW Global‘s Threat Management Service provides a 7x24 threat monitoring and identification system together with an integrated security advisory service This threat management service is made up of two components Threat Intelligence Platform Proactively analyses collected CPE and Security device logs Automatic threat identification, monitoring, reporting and alerting Security Operation Centres (SOC) with security expertise Security Incident Investigation Security Advisory -Per-incident mitigation recommendation -Regular customer review meeting MOREALProfessional Security Service
14
Access advance analytics and actionable reports via a single intuitive dashboard View network health, utilization & security in real-time Leverage a global threat database that uses Big Data and crowd- sourcing to identify emerging threats Use an advance correlation engines for known & unknown threats identification, now penetrating and already existing in your network Deploy enhanced security simply and quickly via pure cloud solution with hybrid options available. Pay as you grow subscription with low total cost of ownership 14 MOREAL gives you a complete view of your network health and security to identify existing and emerging threats in real-time. It has been designed to self-learn and leverage a continually evolving global threat database What Does MOREAL Deliver?
15
The Intelligence MOREAL Provides 15 View in browser. Identified network threats on single screen Multi-vendor support. Alerts graded by severity. Includes recommended counter measures. Automatic counter measures possible using ACL, SNORT or YARA Customizable reports. Network forensics on retained log history. Log retention period specified by customer. Post compromise analysis.
16
A New Layer of Network Defense Unified Threat Management, Next Generation Firewalls, Secure Web Gateways, Intrusion Detection Systems, Intrusion Prevention Systems Web Application Firewall, Denial of Service, etc. 16 Risk & Compliance Tools Network & Application Security Vulnerability Assessment Security Information and Event Management, etc. Responsive security - Moving from Prevention to Detection A new layer of defence, complementing existing ones and maximizing value of logs already generated & collected Non-intrusive and an OS independent solution for rapid deployment Threat aggregation and behavioural analysis identifies threats in their infancy Real-time mitigation recommendations Expands the visibility of existing security systems and hardware Expands the lifespan of existing security solutions, driving cost efficiency
17
How It Works 17
18
5 Steps to Recognizing Cyber Attack Patterns 18 Customer 1 MOREAL continuously receives logs from customer Network Elements. 2 MOREAL correlates the logs between Network Elements to get a “big picture” of all network activity. 3 MOREAL checks network activity behavior with external threat intelligence and identifies threats. 4 MOREAL advises customer of threat and recommended remedial action. 5 MOREAL provides “SINGLE SCREEN” consolidated view of all network threats. All this happens in REAL TIME MOREAL All flows in real time Network Elements MOREAL Threat Intelligence Platform Logs Threat Alerts
19
Where Does the Data Come From? Network Elements Routers Firewalls Next Generation Firewalls Web Proxy Unified Threat Management Advance Persistent Threat Secure Web Gateways Intrusion Prevention System/ Intrusion Prevention Detection Distributed Denial Of Service 19 MOREAL is vendor agnostic and captures data from a variety of network elements to create a complete view of the network
20
MOREAL Threat Identification Engine 20 A continuously updated threat database known as ThreatDB is maintained. Baseline network flows per user, and other key metrics updated in real time are stored in the Behavioural Analytics engine. Together these are combined in the Threat Logic module to produce network security threat alerts. The technology is self-learning and is able to identify new threats even if they have never been seen before. MOREAL uses advanced big data analytics and machine learning. Threat DB All threats indexed, ready to be correlated Threat Logic Real-Time analysis threat evolution Behavioral Analytics Prediction of threat paths with high criticality & likelihood
21
Global Threat Intelligence Threat DB is a database of global cyber attacks, constantly updated from multiple sources 21 Threat DB: Threats normalized & indexed Customers CERTs Academia Industry Leaders Etc. Security Research Incident Handling Feeds Normalization
22
22 Threat DB 1.Network element logs are created and shared with MOREAL 2.Logs are correlated with the global threat database 3.Behavioural Analysis evaluates regular behaviour of that network and its users 4.Threat Logic scoring of the probability of threat 5.Real-Time analysis of threat and recommendations for mitigation 6.All steps are visible to the user via the dashboard 7.Threat alerts to customer via the dashboard, an email or SMS 8.Admin or PCCW Global SOC Takes Action Threat LogicBehavioural Analytics Network Element logs from Customer Dynamic external threat search & aggregation Dashboard Alert Admin
23
23 The MOREAL Difference Real-Time Intelligence MOREAL gives you the ability to identify threats to your organization based on its data mining capabilities and traffic pattern recognition Global Security MOREAL has been deployed on PCCW Global’s network and is capturing data on potential threats globally and on a daily basis Enhancing Security Solutions MOREAL extends the life of your existing security solutions and adds a layer of proactive and real-time threat intelligence Long-Term Learning MOREAL’s threat database is continually learning and evolving to protect your organization from present and future threats
24
24 Thank you! gbarlas@crypteianetworks.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.