Advanced Threat Protection Framework: What it is, why it s important and what to do with it
|
|
|
- Brett Baldwin
- 10 years ago
- Views:
Transcription
1 Advanced Threat Protection Framework: What it is, why it s important and what to do with it Doug Manger, Senior Security Engineer [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved.
2 Agenda Security Concepts Common elements of sophisticated attacks Key technologies and services recommended to address each element How they can all fit together as part of a cohesive security framework Additional learning resources Q&A 2
3 Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 3
4 Question 1: What is a Botnet and/or C&C? A botnet is network of computers that have been compromised with malware. Botnets are normally leveraged by command and control (C&C) servers to execute distributed attacks. Examples: Mariposa Conficker Zeus BredoLab 4
5 Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 5
6 Question 2: What is an Advanced Persistent Threat? An Advanced Persistent Threat is a sophisticated, sustained, longterm attack/breach that remains undetected. An ATP is regularly executed against businesses and or nations for financial or political reasons. ATPs are of paramount concern for all organizations due to the grave impact they present. Examples: Heartbleed Shellshock Stuxnet Poodle 6
7 Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 7
8 Question 3: What is Sandboxing? Sandboxing is the isolation and relegation of malware and/or other nefarious payloads in a virtualized operating system so as to limit/stop their propagation within an environment. Sandbox components: Isolated, Virtual Operating Systems Extensive threat detection engine Expedient, but thorough inspection Dedicated security services backend Cost-effective 8
9 Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 9
10 Question 4: What is a Next Generation Firewall (NGFW)? A Next Generation Firewall is a secure, multi-faceted network platform that adds a variety of filtering functions to the common firewall. This includes: Web Content Filtering Application Visibility/Control Intrusion Detection/Prevention Data Loss Prevention Anti-Virus/Spam Deep Inspection for SSL/SSH 10
11 Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 11
12 Question 5: What is a security framework? A security framework is a layered management tool that defines the practices that are required for an organization maintain its highest possible level of security. Components: Access Control Threat Detection/Prevention Incident Response Continuous Monitoring Continuous Learning 12
13 Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 13
14 Question 6: Do you have an active project in the next 6 months to increase security from advanced malware/sophisticated threats? Yes, I have a firewall upgrade project to move to NGFW Yes, I have a new project to deploy a stand-alone sandbox Yes, I have another type of project designed to increase security No, but I do have such a project later this year Not at this time/unsure 14
15 Advanced Malware/Sophisticate Threats a Top Concern 15
16 Microsoft Security Advisory IE Vulnerability Cybercriminal Step 1: links to malicious page page exploits vulnerability to run code Step 2: code reaches out to download URL file enters network and installs 16
17 Microsoft Advisory Security Recommendations Step 1: Cybercriminal links to malicious page page exploits vulnerability to run code Step 2: Don t use IE/Flash Turn on MSFT EMET Update IPS to prevent exploit Update web filter to block site Patch when available code reaches out to download URL file enters network and installs 17
18 Target Data Breach Cybercriminal Step 1: steal vendor credentials to access network Step 5: continue for weeks Step 2: access PoS to install code Step 4: stage and deliver to ftp Step 3: seek out other data, including guest db 18
19 Target Data Breach- Security Recommendations Cybercriminal Step 1: steal vendor credentials to access network Require 2FA Step 5: continue for weeks DLP C&C blocking Advisories Step 2: access PoS to install code Deeper inspection/ Advanced detection Step 4: stage and deliver to ftp Step 3: seek out other data, including guest db 19
20 At a fundamental level, there are key commonalities Step 1: Seek Entry Cybercriminal Step 5: Persist and Morph Step 2: Install & Communicate Step 4: Exfiltrate data Step 3: Move Laterally 20
21 Fortinet Recommends a Cohesive Approach Cybercriminal Access Control Threat Prevention Continuous Monitoring Threat Detection Incident Response 21
22 Applying the Framework- IE Vulnerability Continuous Monitoring Incident Response Threat Prevention Access Control Stay abreast of the threat landscape Don t use IE/Flash Turn on MSFT EMET Update IPS to prevent exploit Update web filter to block site Patch when available 22
23 Applying the Framework- Target Corporation Data Breach Access Control Threat Prevention Threat Detection Incident Response Continuous Monitoring Require 2FA Perform deeper inspection Block C&C Deploy DLP Perform advanced detection Be prepared to respond Monitor advisories/landscape 23
24 Fortinet s Advanced Threat Protection Framework Access Control -Firewall -2 Factor Authentication -Vulnerability Management Continuous Monitoring -Reporting -Threat research -SIEM/Log Mgt/Intelligence Service partners Threat Prevention -IPS, App Control - Deep Flow Antimalware - /Web Filter - Antibot Threat Detection -Sandbox -Network behavoral analysis -Client reputation -Botnet reporting Incident Response -Security Services - Device Quarantine - Security Updates 24
25 Which of the following technologies would you add first? Strong authentication to the network More threat prevention in more places New threat detection at key spots New incident response tools/services More monitoring/intelligence tools/services 25
26 Recap/Q&A Sophisticated attacks are beating traditional defenses While there are many effective new tools to help address these threats, Fortinet cautions there is no one silver bullet Rather, organizations are encouraged to establish a cohesive approach, combining technologies within an extensible framework 26
27 Q&A/Additional Resources IE Vulnerability Target Data Breach Fortinet Advanced Threat Protection Framework 27
28 A Global Leader in Network Security Global presence and customer base Customers: 210,000+ Units shipped: 1.7+ Million Offices: 30+ worldwide Revenue $615M Platform Advantage built on key innovations FortiGuard: industry-leading threat research FortiOS: tightly integrated network + security OS $13M FortiASIC: custom ASIC-based architecture Market-leading technology: 177 patents, 146 pending Founded 2000, 1 st product shipped 2002, IPO 2009 HQ: Sunnyvale, California Employees: worldwide Cash $843M Consistent growth, gaining market share Strong positive cash flow, profitable $16M
29 End-to-End Security Solutions FortiBalancer FortiADC Coyote Point FortiVoice FortiManager FortiAnalyzer FortiBridge FortiCamera High End FortiGate-5000 & 3000 Series Mid Range FortiGate-1000 to 100 Series Desktop FortiGate/FortiWiFi-90 to 20 Series FortiDNS FortiScan FortiAP FortiSandbox FortiCloud FortiSwitch FortiDDoS FortiClient FortiAuthenticator FortiToken FortiMail FortiCache 29 FortiWeb FortiDB
30 Thank you! Doug Manger, CISSP Senior Security Engineer 30
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Securing The Enterprise
Securing The Enterprise Fast. Secure. Global. January 2015 Copyright Fortinet Inc. All rights reserved. Cybercrime: Battling a Growth Economy Companies like J.P. Morgan Plan to Double Spending on Cybersecurity
Internal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
CLOUD & Managed Security Services
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
Last Order Date (LOD) End of Order (EOO) ASM-ET4 Module 06/19/2011 06/19/2015 06/19/2016 ASM-FB4 ASM-FB4-G
Fortinet Product Life Cycle Information Fortinet suggests that customers familiarize themselves with the Fortinet Product Life Cycle Policy. Particularly important to Fortinet customers are the three product
Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?
Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed
The Fortinet Advanced Threat Protection Framework
WHITE PAPER The Fortinet Advanced Threat Protection Framework A Cohesive Approach to Addressing Advanced Targeted Attacks The Fortinet Advanced Threat Protection Framework Table of Contents Introduction
Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.
Overview Fortinet pioneered an innovative, high performance network security solution that addresses the fundamental problems of an increasingly bandwidth-intensive network environment and a more sophisticated
FortiGuard Security Services
FortiGuard Security Services FORTIGUARD SECURITY SERVICES FortiGuard Labs: Securing Your Organization Extensive knowledge of the threat landscape combined with the ability to respond quickly at multiple
Fortinet Product Life Cycle Information Publication Date: August 26, 2015
Fortinet Life Cycle Information Publication Date: August 26, 2015 Fortinet suggests that customers familiarize themselves with the Fortinet Life Cycle Policy. Particularly important to Fortinet customers
The Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
Fortinet Advanced Threat Protection- Part 3
Fortinet Advanced Threat Protection- Part 3 Upgrading Your Endpoint Security to Meet Advanced Threats Copyright Fortinet Inc. All rights reserved. Agenda Brief Recap on Breaches and the Need for Advanced
How To Ensure Security In Pc Ds 3.0
Securing Distributed Enterprise Networks for PCI DSS 3.0 Compliance FORTINET White Paper 1 Secure Distributed Healthcare Networks for PCI DSS 3.0 and HIPAA Compliance Accelerating Compliance and Simplifying
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
MSSP Advanced Threat Protection Service
SOLUTION BRIEF SOLUTION BRIEF: MSSP ADVANCED THREAT PROTECTION SERVICE MSSP Advanced Threat Protection Service Fortinet Empowers MSSP Delivery of Complete ATP Managed Security Service The Need For ATP
WHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE
WHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE Accelerating Compliance and Simplifying Complex Networks Most attacks are focused at cardholder data: According to the 2014
Veranderende bedreigingen Security in het virtuele datacenter
Veranderende bedreigingen Security in het virtuele datacenter Dennis Hagens Copyright Fortinet Inc. All rights reserved. Veranderende bedreigingen Security in het virtuele datacenter Dennis Hagens Copyright
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper
Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER Introduction There have been a number of moments in the IT and network industry that can be considered as a Paradigm Shift.
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Fortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
Datencenterlösungen Neues aus dem Bereich Security
Datencenterlösungen Neues aus dem Bereich Security Markus Hirsch Copyright Fortinet Inc. All rights reserved. Quiz Was verbindet diese Unternehmen? Sie sind die Nr. 1 in ihrem Markt! 2 Fortinet - A Global
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
WHITE PAPER. Empowering the MSSP. Part 2: End To End Security Services Ecosystem
WHITE PAPER Empowering the MSSP Part 2: End To End Security Services Ecosystem Introduction Responding to Real World Customer Needs An increasing number of SMBs and enterprises plan to spend more of their
Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ
Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ FORTINET Network Intrusion Prevention Systems (IPS) PAGE 2 Introduction Deploying updates and patches to devices and servers in
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Next-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ
Next-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ FORTINET Next-Generation Firewalls: Fact and Fiction PAGE 2 Introduction Attackers are increasingly using web-based applications
BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
WHITEPAPER. Assessment Readiness for Payment Card Industry Data Security Standard (PCI DSS v1.2) Compliance
WHITEPAPER Assessment Readiness for Payment Card Industry Data Security Standard (PCI DSS v1.2) Compliance FORTINET PCI COMPLIANCE ASSESSMENT READINESS PAGE 2 Contents Introduction... 3 PCI DSS Requirements...
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE
Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE FORTINET Controlling Web 2.0 Applications in the Enterprise PAGE 2 Summary New technologies used in Web 2.0 applications have increased
Planning a Successful NGFW Migration
1 Introduction 1 3 8 Key Next Generation Firewall Requirements Research from Gartner: Framework for Migrating to a Next-Generation Firewall About Fortinet Planning a Successful NGFW Migration A Guide to
Reduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
An New Approach to Security. Chris Ellis McAfee Senior System Engineer [email protected]
An New Approach to Security Chris Ellis McAfee Senior System Engineer [email protected] Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
Fortinet Reports Strong Third Quarter 2015 Financial Results. Record billings growth of 41% year over year
Press Release Investor Contact: Media Contact: Michelle Spolver Sandra Wheatley Fortinet, Inc. Fortinet, Inc. 408-486-7837 408-391-9408 [email protected] [email protected] Fortinet Reports Strong
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment
Microsoft TMG Replacement How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment 1. Introduction This document gives an overview of FortiGate features
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
One Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
AppGuard. Defeats Malware
AppGuard Defeats Malware and phishing attacks, drive-by-downloads, zero-day attacks, watering hole attacks, weaponized documents, ransomware, and other undetectable advanced threats by preventing exploits
High performance security for low-latency networks
High performance security for low-latency networks Fortinet solutions for the financial services sector Financial Services Fortinet solutions protect your network and proprietary data without compromising
Audit Readiness for Payment Card Industry Data Security Standard (PCI DSS) Compliance
Audit Readiness for Payment Card Industry Data Security Standard (PCI DSS) Compliance White Paper Vertical Security Solutions Introduction Retailers that fail Payment Card Industry Data Security Standard
Keeping the Store Open: Fighting the Cyber Criminal in the Retail World
SOLUTION BRIEF Keeping the Store Open: Fighting the Cyber Criminal in the Retail World Pain Points of the Typical Retail Network CONNECTIVITY Introduction As the most recent wave of attacks have confirmed,
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
SECURITY 2.0 LUNCHEON
PROTECTING YOUR ORGANIZATION SECURITY 2.0 LUNCHEON AGAINST CYBER THREATS Tommy Montgomery, Principal Consultant Viral Dhimar, Consultant Adam Ferguson, VP October 22, 2014 #SWCEvents Security 2.0: Next
High Performance Network Security
High Performance Network Security Q1 / 2014 1 Fortinet was founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen. A strong and seasoned management team with deep experience
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
FortiManager Centralized Device Management
FortiManager Centralized Device Management FMGT-000-50003-SEP13 Course Overview & Through this 1-day instructor-led classroom or online virtual training course, partners and customers learn FortiManager
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Fortinet Product Quick Guide
Fortinet Product Quick Guide Ahmad Arafat Senior Security Engineer, Middle East 1 June 6, 2014 Content FortiGate/FortiWiFi FortiAP FortiSwitch FortiClient FortiToken FortiAnalyzer FortiManager FortiSandbox
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Network Control Meets Endpoint Security
Network Control Meets Endpoint Security Sandy Hawke, CISSP Sr. Director of Product Marketing, BigFix Jack Marsal Director of Marketing, ForeScout 1 Agenda Introductions Network and Endpoint Security Challenges
FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0
FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
