2015 A10 Security Predictions WHITE PAPER
|
|
- Bruno Holland
- 7 years ago
- Views:
Transcription
1 2015 A10 Security Predictions WHITE PAPER
2 Table of Contents Executive Summary... 3 Introduction... 3 Prediction 1: Malvertisers will dole out trouble as they infiltrate ad networks... 3 Prediction 2: A new DDoS amplification attack will emerge... 3 Prediction 3: Traditionally secure infrastructure such as VDI will be compromised... 4 Prediction 4: The Internet of Things (IoT) will expose new security risks... 4 Prediction 5: POS systems will continue to be under fire, but smart cards will come to the rescue... 5 Conclusion... 5 About A10 Networks... 5 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its products or services, including but not limited to fitness for a particular use and noninfringement. A10 Networks has made reasonable efforts to verify that the information contained herein is accurate, but A10 Networks assumes no responsibility for its use. All information is provided as-is. The product specifications and features described in this publication are based on the latest information available; however, specifications are subject to change without notice, and certain features may not be available upon initial product release. Contact A10 Networks for current information regarding its products or services. A10 Networks products and services are subject to A10 Networks standard terms and conditions. 2
3 Executive Summary In 2014, large-scale retail breaches and vulnerabilities in widely used software libraries were the two major themes dominating security headlines. Retail breaches overshadowed virtually every other attack vector in late 2013 and 2014, when a continuous parade of breach disclosures hit headlines and affected many of the world s most wellknown retail brands. As an IT and security professional, you are continually faced with this critical question: how do you protect your systems and company assets from future threats? Although it is difficult to predict exactly which cybersecurity threats will wreak the most havoc in the future, we believe that threats like malvertising, Distributed Denial of Service (DDOS) attacks, malware-based point-of-sale (POS) infections, the Internet of Things (IoT) and attacks to remote desktop infrastructure will all make headlines in In this white paper, A10 Networks provides valuable insights into possible new attack vectors and vulnerabilities, as well as the sources from which these are most likely to come. Through a set of five carefully considered security predictions, you will learn what areas you should be monitoring most closely, and how best to protect your organization as you mitigate the risk of future attacks. Introduction Major retailers like Home Depot, Goodwill, Staples and many more suffered massive credit card breaches last year. What was the number one culprit behind these breaches? Malware infections on point-of-sale devices. And these breaches did not show any signs of slowing down as the year came to a close. And then, of course, there were the security vulnerabilities. Heartbleed started the procession of high-profile vulnerabilities discovered in Disclosed in April, Heartbleed, a flaw in the OpenSSL cryptographic library, affected roughly 17% of all SSL-enabled web servers at the time of the discovery. i As soon as website owners had patched their SSL software to mitigate Heartbleed, a new set of OpenSSL vulnerabilities were disclosed, including the ChangCipherSpec injection flaw. The Shellshock Bash bug, revealed in September, and the POODLE SSL flaw, disclosed in October, rounded out the list of widespread vulnerabilities in While researchers and financially-motivated hackers will undoubtedly uncover more vulnerabilities this year, we don t expect them to eclipse the number of software flaws identified last year. So, what cybersecurity bombshells are in store for us next year? Prediction 1: Malvertisers will dole out trouble as they infiltrate ad networks Malware distributors have zeroed in on a fast and effective way to infect millions of users: malvertising. With malvertising, cybercriminals distribute malicious code through online advertising networks. Because the malware-laden advertisements are hosted by legitimate websites and the ads constantly change, traditional security tools that blacklist malicious sites cannot easily block malvertisers ads. And malware-laden ads often silently infect machines without users knowledge. In 2015, we predict that malvertisers will take advantage of known exploits like Dynamic DNS, and signature and sandbox evasion techniques to further propagate their malware across advertising networks. To prevent malware infections, organizations should install anti-malware software on client machines and enforce security controls on clients browsers. Advanced threat protection platforms can also help detect malware in web traffic. Since many webbased advertisements are now delivered over SSL, organizations should decrypt and inspect encrypted traffic. Prediction 2: A new DDoS amplification attack will emerge Over the past two years, cybercriminals and other mischief-makers have exploited DNS and Network Time Protocol (NTP) servers to amplify the size of their DDoS attacks. With DNS and NTP amplification attacks, an attacker spoofs, or impersonates, the attack target and sends a small request to a reflector, which is a server that replies with a much larger response to the victim, flooding the victim s network. 3
4 DNS amplification attacks can increase the size of DDoS attacks by up to 54 times, while NTP amplification attacks can magnify DDoS onslaughts by a factor of 556 times 1. But DNS and NTP are not the only culprits of amplification attacks. Attackers can also leverage SNMP, NetBIOS and other protocols to launch amplification attacks. Attackers have even exploited WordPress applications to carry out large-scale DDoS assaults. Amplification has contributed to the escalating size of DDoS attacks. We predict that in 2015, a new type of DDoS amplification attack will make headlines. While DNS and NTP amplification took the security world by storm in 2013 and 2014, attackers will uncover and exploit a yet unknown attack next year. Attackers continually investigate new attack vectors, as witnessed by the recent discovery of DVMRPbased reflection attacks. Disclosed by Team Cymru 2, Distance Vector Multicast Routing Protocol (DVMRP) reflection attacks have already been observed by service providers. To protect against amplification attacks in 2015, organizations should deploy security equipment that can mitigate large-scale DDoS attacks. Prediction 3: Traditionally secure infrastructure such as VDI will be compromised Virtual Desktop Infrastructure (VDI) allows organizations to host desktop environments on servers and enables users to access these desktops from any location. Compared to traditional desktop infrastructures, VDI provides a host of advantages; organizations can lower hardware and operating costs, support Bring Your Own Device (BYOD) initiatives, and bolster security. Since all data is stored in a central location rather than on endpoint devices, VDI reduces physical data theft risks. However, desktop virtualization also exposes new security challenges. Organizations often host multiple desktops with the same operating systems and the same set of applications on a single physical server. Without proper isolation, an attacker can install a rootkit and compromise multiple desktops. With limited system diversity, attackers might uncover a vulnerability, allowing them to quickly exploit thousands of desktops at one time. We predict that in 2015, attackers will execute more brute force attacks and conduct new and creative attacks on virtual desktops. To protect VDI environments, organizations should implement operating system or application isolation especially if virtual desktops are hosted in the cloud. Organizations should also control how data can be transferred to and from VDI environments, install anti-malware software and monitor for intrusions. Prediction 4: The Internet of Things will expose new security risks More knowledge and convenience is not always a good thing. The Internet of Things promises to make our lives easier, but without proper safeguards, it also opens us up to an array of new security threats. Even though IoT is still in its early stages, the number of devices connected to the Internet is growing, thereby increasing the potential for attacks at any time. Three potential IoT risks include: Attackers using brute force or knowledge of default credentials to gain access to IoT devices or to the cloud infrastructure that stores IoT data Malware infiltrating high-end IoT devices, such as SmartTVs, that have full Android (News 3 - Alert 4 ) operating systems and access to app stores Malware infecting PCs and tablets that manage IoT devices, such as home security systems or cameras To reduce risks associated with IoT devices, consumers and businesses alike should investigate how devices are accessed and whether they store sensitive data. They should avoid installing unknown software and, whenever possible, configure strong passwords on devices. Not convinced? A recent hack 5 of more than 73,000 webcams underscores the importance of using strong passwords on IoT devices
5 Prediction 5: POS systems will continue to be under fire, but smart cards will come to the rescue Retail breaches overshadowed virtually every other attack vector in late 2013 and A continuous parade of breach disclosures hit headlines and affected many of the world s most well-known retail brands. The culprit behind these breaches: malware infections on POS devices. Using a variety of techniques, including brute force and compromising management or software update tools, hackers are able to install malware on POS systems. The malware scrapes credit card numbers and CVVs from system memory. The most advanced malware strains can actually capture data from inter-process communications, quickly zeroing in on payment card data. While we predict that these attacks will continue, the migration to chip-and-pin smartcards towards the end of 2015 will make it harder for hackers to monetize the data stolen from POS systems. They won t be able to use fake magnetic cards and will primarily be relegated to online payment fraud. What should organizations do to prevent POS-based breaches? They can protect POS systems from malware using whitelisting, code signing and behavioral techniques; harden systems against compromise by controlling who and what can access POS terminals; and monitor for infiltrations with advanced threat prevention platforms. And since malware can communicate to command and control servers over SSL and over normally harmless protocols like DNS, organizations should inspect all traffic, including encrypted traffic. Conclusion Although it is difficult to predict which cybersecurity threats will wreak the most havoc in the future, we believe that threats like malvertising, DDoS attacks, malware-based POS infections, the Internet of Things, and attacks to remote desktop infrastructure will all make headlines in We also believe with a high degree of certainty that cybercriminals, hacktivists, and state-sponsored attackers will continue to seek out new attack vectors and new vulnerabilities to exploit. To prepare for the next generation of threats, organizations should implement a multi-layered defense that encompasses security technologies that can protect all elements in the network, including data center servers and endpoints. Organizations should also invest in training to prevent social engineering threats, and implement security procedures to ensure that security defenses are continuously updated and monitored. While it is difficult to predict never-before-seen threats, security and IT professionals can make an educated guess, which in turn will help them be better prepared with the appropriate security controls and processes in place. About A10 Networks A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide. For more information, visit: i Corporate Headquarters A10 Networks, Inc 3 West Plumeria Ave. San Jose, CA USA Tel: Fax: Part Number: A10-WP EN-01 Feb 2015 Worldwide Offices North America sales@a10networks.com Europe emea_sales@a10networks.com South America latam_sales@a10networks.com Japan jinfo@a10networks.com China china_sales@a10networks.com Taiwan taiwan@a10networks.com Korea korea@a10networks.com Hong Kong HongKong@a10networks.com South Asia SouthAsia@a10networks.com Australia/New Zealand anz_sales@a10networks.com 2015 A10 Networks, Inc. All rights reserved. The A10 logo, A10 Lightning, A10 Networks, A10 Thunder, acloud, ACOS, ACOS Policy Engine, ACOS Synergy, Affinity, aflex, aflow, agalaxy, avcs, AX, axapi, IDaccess, IDsentrie, IP-to-ID, SoftAX, SSL Insight, Thunder, Thunder TPS, UASG, VirtualN, and vthunder are trademarks or registered trademarks of A10 Networks, Inc. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. To learn more about the A10 Thunder Application Service Gateways and how it can enhance your business, contact A10 Networks at: or call to talk to an A10 sales representative. 5
PCI DSS and the A10 Solution
WHITE PAPER PCI DSS and the A10 Solution How Cloud Service Providers Can Achieve PCI Compliance with A10 Thunder ADC and vthunder Table of Contents The Challenge of PCI Compliance... 3 Overview of PCI
More informationSSL Insight Certificate Installation Guide
SSL Insight Certificate Installation Guide For A10 Thunder Application Delivery Controllers DEPLOYMENT GUIDE Table of Contents Introduction...3 Generating a CA Certificate...3 Exporting a Certificate from
More informationSharePoint SAML-based Claims Authentication with A10 Thunder ADC
DEPLOYMENT GUIDE SharePoint SAML-based Claims Authentication with A10 Thunder ADC How to integrate SharePoint SAML-based claims authentication with Microsoft Active Directory Federation Services (AD FS)
More informationDEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity
DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step
More informationLoad Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
More informationMicrosoft Exchange 2016 DEPLOYMENT GUIDE
Microsoft Exchange 2016 DEPLOYMENT GUIDE Table of Contents Introduction...3 Deployment Prerequisites...3 Accessing the Thunder ADC Device...3 Architecture Overview...3 Validating Exchange 2016 Configuration...4
More informationHealthcare Security and HIPAA Compliance with A10
WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308
More informationSetting Up a Kerberos Relay for the Microsoft Exchange 2013 Server DEPLOYMENT GUIDE
Setting Up a Kerberos Relay for the Microsoft Exchange 2013 Server DEPLOYMENT GUIDE Disclaimer This document does not create any express or implied warranty about A10 Networks or about its products or
More informationAAM Kerberos Relay Integration with SharePoint
DEPLOYMENT GUIDE AAM Kerberos Relay Integration with SharePoint How to Deploy A10 Thunder ADC s AAM Feature in a SharePoint Environment Using Kerberos Relay Authentication Table of Contents Overview...3
More informationVALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
More informationUncover Threats in SSL Traffic: The Ultimate Guide to SSL Inspection WHITE PAPER
Uncover Threats in SSL Traffic: The Ultimate Guide to SSL Inspection WHITE PAPER Table of Contents Executive Summary... 3 The Current State of Insecurity... 3 Existing Security Solutions Can t Hack It...
More informationA10 ADC Return On Investment
WHITE PAPER A10 ADC Return On Investment Table of Contents Introduction...3 Streamline Operations to Maximize Efficiencies...3 Server Offload Is the Key...3 SSL Acceleration...4 TCP Optimization...5 RAM
More informationVMware View 5.0 and Horizon View 6.0 DEPLOYMENT GUIDE
VMware View 5.0 and Horizon View 6.0 DEPLOYMENT GUIDE Table of Contents 1 Introduction... 2 2 ACOS Deployment for VMware View... 2 3 Lab Presentation... 2 4 Configuration... 3 4.1 VMware View Administration
More informationAdvanced Core Operating System (ACOS): Experience the Performance
WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3
More informationWhite Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
More informationA10 Device Package for Cisco Application Centric Infrastructure (ACI)
DEPLOYMENT GUIDE A10 Device Package for Cisco Application Centric Infrastructure (ACI) Step by Step Instructions for Deploying Rich Application Delivery and Security Capabilities in a Shared Infrastructure
More informationPCI DSS and the A10 Solution
White Paper A10 Thunder Series PCI DSS and the A10 Solution For cloud service providers, A10 s Thunder Series & AX Series appliances and SoftAX are the first step towards PCI compliance, allowing you to
More informationHow Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
More informationA Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
More informationAPPLICATION ACCESS MANAGEMENT (AAM) Augment, Offload and Consolidate Access Control
SOLUTION BRIEF APPLICATION ACCESS MANAGEMENT (AAM) Augment, Offload and Consolidate Access Control Challenge: Organizations must allow external clients access to web portals, sensitive internal resources
More informationProtecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
More informationA10 Networks LBaaS Driver for Thunder and AX Series Appliances
DEPLOYMENT GUIDE A10 Networks LBaaS Driver for Thunder and AX Series Appliances Table of Contents Introduction... 2 Implementation... 2 Network Architecture... 3 SNATED... 3 VLAN... 3 Installation steps...
More informationDDoS Attack Tools. A Survey of the Toolkits, Apps and Services Used Today to Launch DDoS Attacks WHITE PAPER
DDoS Attack Tools A Survey of the Toolkits, Apps and Services Used Today to Launch DDoS Attacks WHITE PAPER Table of Contents Introduction... 3 Overview... 3 DoS and DDoS Attacks... 3 DDoS Attack Types...
More informationWhy a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
More informationImperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers
How to Protect Your from Hackers Web attacks are the greatest threat facing organizations today. In the last year, Web attacks have brought down businesses of all sizes and resulted in massive-scale data
More information24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
More informationLeveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More informationAchieve Single Sign-on (SSO) for Microsoft ADFS
DEPLOYMENT GUIDE Achieve Single Sign-on (SSO) for Microsoft ADFS Leverage A10 Thunder ADC Application Access Manager (AAM) Table of Contents Overview...3 SAML Overview...3 Integration Topology...4 Deployment
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSTOP Cybercriminals and. security attacks ControlNow TM Whitepaper
STOP Cybercriminals and security attacks ControlNow TM Whitepaper Table of Contents Introduction 3 What the headlines don t tell you 4 The malware (r)evolution 5 Spear phishing scams 5 Poisoned searches
More informationSecuring OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
More informationFighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
More informationA10 Thunder and AX Series
WHITE PAPER A10 Thunder and AX Series Evolution of ADCs: The A10 Advantage over Legacy Load Balancers Table of Contents A10 Thunder ADC: Application Delivery Evolved... 3 Business Challenges Solved by
More informationCOORDINATED THREAT CONTROL
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
More informationSSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES
SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection
More informationSophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationCloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
More informationPerspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
More informationWHITE PAPER. Data Centers in the Crosshairs: Today s Most Dangerous Security Threats
WHITE PAPER Data Centers in the Crosshairs: Today s Most Dangerous Security Threats Table of Contents Introduction... 3 1) DDoS Attacks... 3 FFIEC and MAS Guidelines for DDoS Protection... 4 2) Web Application
More informationINDUSTRY OVERVIEW: HEALTHCARE
ii IBM MSS INDUSTRY OVERVIEW: HEALTHCARE RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: OCTOBER 7, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW/KEY FINDINGS...
More informationKaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
More informationDEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
More informationAnti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
More informationof firms with remote users say Web-borne attacks impacted company financials.
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
More informationProtecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
More informationMOBILE SECURITY: DON T FENCE ME IN
MOBILE SECURITY: DON T FENCE ME IN Apart from the known and the unknown, what else is there? 18 Harold Pinter, Nobel Prize-winning playwright, screenwriter, director, actor 32 INTRODUCTION AND METHODOLOGY
More informationSecuring Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
More informationEnd to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
More informationdefending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
More informationV ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationPresented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
More informationWEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSecure Payment Transactions and Consumer Information from Point-of-Sale to the Server
Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime.
More informationSAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationSECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
More informationStaying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
More informationDefending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
More information10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationSECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
More informationINDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
More informationINDUSTRY OVERVIEW: RETAIL
ii IBM MSS INDUSTRY OVERVIEW: RETAIL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: JANUARY 5, 215 BY: DAVID MCMILLEN, SENIOR THREAT RESEARCHER Copyright IBM Corporation 214. All rights reserved. IBM and
More informationCisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationMicrosoft Windows XP Vulnerabilities and Prevention
Managing Your Legacy Systems: What Will Life Be Like After Windows Server 2003? After Microsoft ended support for Windows XP last April 8, 2014, users and organizations alike that continued to use the
More informationProtecting Point-of-Sale Environments Against Multi-Stage Attacks
SOLUTION BRIEF: PROTECTING POS DEVICES & BROADER ENVIRONMENT........................................ Protecting Point-of-Sale Environments Against Multi-Stage Attacks Who should read this paper Point-of-Sale
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More information10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
More information2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationWEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
More informationHow NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
More informationA Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:
A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More information10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationSecuring Virtual Desktop Infrastructures with Strong Authentication
Securing Virtual Desktop Infrastructures with Strong Authentication whitepaper Contents VDI Access Security Loopholes... 2 Secure Access to Virtual Desktop Infrastructures... 3 Assessing Strong Authentication
More informationThat Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
More informationEndpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationIBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
More informationWindows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationCyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
More informationMitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
More informationDATA CENTERS IN THE CROSSHAIRS:
DATA CENTERS IN THE CROSSHAIRS: Today s Most Dangerous Security Threats WHITE PAPER Introduction Every day, attackers conspire to take down applications and steal data, leaving your data center infrastructure
More informationJort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
More informationWireless Security Strategies for 802.11ac and the Internet of Things
339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2014 AirTight Networks, Inc. All rights reserved. The Internet of Things is a double-edged sword. While it confers many
More informationCyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationThe Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
More informationReducing the Cost and Complexity of Web Vulnerability Management
WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this
More informationSymantec Managed Security Services The Power To Protect
Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1 Expanding
More informationCyber and Mobile Landscape, Challenges, & Best Practices
Cyber and Mobile Landscape, Challenges, & Best Practices while increasing efficiencies through automation Cheri McGuire VP, Global Govt. Affairs & Cybersecurity Policy Cyber and Mobility Challenges and
More information