Zero-Day Attack Finding Advanced Threats in ALL of Your Data. C F Chui, Arbor Networks
|
|
|
- Rachel Hardy
- 9 years ago
- Views:
Transcription
1 Zero-Day Attack Finding Advanced Threats in ALL of Your Data C F Chui, Arbor Networks
2 Arbor Networks Overview 90% Percentage of world s Tier 1 service providers who are Arbor customers 107 Number of countries with Arbor products deployed 90 Tbps Amount of global traffic monitored by the ATLAS security intelligence initiative right now! 14 Number of years Arbor has been delivering innovative security and network visibility technologies & products #1 Arbor market position in Carrier, Enterprise and Mobile DDoS equipment market segments 49% of total market [Infonetics Research Q1 2014] $19B 2013 GAAP revenues [USD] of Danaher Arbor s parent company providing deep financial backing
3 ATLAS Intelligence ATLAS Portal Models: Free, Participant Up-to-date threat dashboard showing what Arbor is tracking around the globe Details, network specific visibility for Provider partners with sensors deployed ATLAS Intelligence Feeds Models: Basic, Advanced Threat updates going to Arbor Products to detect: Geography, Web Crawler ID, Malware, C&C, Mobile, Targeted Campaign s & other threats Fingerprint Sharing Enable ISP s to coordinate response to DDoS attacks 300 service providers around the globe share data Monitors 90TB/sec of Internet traffic Over 100,000 malware samples seen every day Unique and timely threat data used to update Arbor Products with intelligence, alert customers and the market to new threats and partner with third-parties
4 ASERT Research Unmatched Security Research and Community Leadership Over a hundred national CERT teams Large cross-section of the security industry, through various sharing groups Founding member of the Red Sky Alliance ATLAS portal has 711 unique users, registering 6,006 ASNs for reporting We share up to 5GB of samples per day, which have no re-use restrictions ASERT s Malware Corral has seen 9.1M unique IPv4 addresses over 90 days ASERT has data for 44,570 of 45,369 ASNs ASERT has monitored 2.63B unique IPv4 addresses ASERT actively monitors 1.76M dark IPv4 addresses
5 Threat Landscape Era s Network Protocol Content & Botnets Advanced Threats Today Synflood (Trinoo/TFN) Code Red Slammer Zotob Conficker (2008) Web Browser Web Applications Doc/PDF/etc. Flash/Shockwave Java Aurora Operation Payback Stuxnet/Flame/Duqu Red October Cyber Warfare
6 Targeted Attacks In The Headlines Business Disruption Loss of Customer Trust Financial Costs Legal Issues
7 What are Advanced Threats? Target specific victims for data exfiltration Well organized criminal or government entities Multi-vector: implants advanced malware in or other means, triggered via spear-phishing, connects to C&C Goal: long-term control of compromised systems Make use of Advanced Malware
8 Cyber Intrusion Kill Chain Reconnaissance Harvesting addresses, conference information, etc Weaponization Coupling exploit with backdoor into deliverable payload Delivery Delivering weaponized bundle to the victim via , web, USB, etc Exploitation Exploiting a vulnerability to execute code on victim system Installation Installing malware on the asset C2 Command channel for remote maniipulation of victim Actions With hands on keyboard access, intruders accomplish their original goal
9 Malware Is An Ecosystem, Not Just A Sample Malware Attack Vector Malicious Site / Exploit Kit Command & Control / RAT Actions on Goals: Ransomware, DDoS, Data Exfiltration, Espionage, Click Fraud, etc. If redirected Updates, Assessment, Connectivity Check Updates, status, commands, connectivity check The Internet , Compromised Site URLs, IRC, etc. Crimeware Your PC Your User Exploit Dropper/Downloader Worm/Regeneration Config Actions Within Network Installs malware Bot Agent (Zeus, etc.) Malware Package (Trojan)
10 Who is ASERT: Large-Scale Analysis ATLAS Honeypots & SPAM Traps Security Community Sandbox of Virtual Machines run malware (look for Botnet C&C, Files, Network Behavior) Millions of Samples Cluster Families Security Content Report and PCAP stored in database Tracker DDoS Attack Auto-classification and analysis every 24 hrs.
11 Who is ASERT: Reverse Engineering Goals of Data Collection Broad coverage required to focus on specific use-cases, such as DDoS Multiple infection vectors, CnC mechanisms, backscatter analysis, etc. Generate unique indicators: honeypots, CnCs themselves, harvesting, etc. Goals of Reverse Engineering Reverse engineering of botnet CnC protocol Emulation of full CnC protocol for direct CnC and peer (zombie) analysis Unique approach to static and dynamic analysis techniques Goals of Large-Scale Analysis Understand both latest capabilities and attacker resources Internet-scale correlation, i.e. relate a.eml to originating executable End-to-end threat lifecycle, i.e. observe actor ordering an attack through a infiltrated CnC then verify the attack from flow data
12 Historical, Campaign-Focused Approach
13 ATLAS Data Darknet Honeypot Output [ start - UTC timestamp { sid - Snort signature ID src - IP address string proto - IP protocol number dport - destination port number (or type for ICMP) attacks - number of attacks cc - country code asn - AS number } ] "asn": "4725", "attacks": "1", "cc": "JP", "dport": "447", "proto": "17", "sid": " , "src":" ", "start": " sid > ET CURRENT_EVENTS Possible Bobax/Kraken/Oderoor UDP 447 CnC Channel Outbound
14 ATLAS Data Botnet Botnet Data now ip port cc asn -- C&C Timestamp when added -- C&C IP address string -- C&C Port -- C&C Country Code -- C&C AS number { } "cc": "DE", "ip": " ", "now": " ", "port": "6667", "asn": "24961"
15 ATLAS Data Botnet Botnet Infiltration Data Data used for threat intel and special event engagements { "added": " T15:55:00", "family": "dirtjumper", "hostname": " cc", "ips": [ { "cc": "JP", "ip": " " } ], "last_success": null, "md5": [], "targets": [], "uri": "/panel/diwar.php", "urls": [] },
16 ATLAS Data Botnet Botnet Infiltration Data { "added": " T19:22:51", "family": "drive", "hostname": "beanonymouse.biz", "ips": [ { "cc": "UA", "ip": " " }, "last_success": " T03:55:04", "md5": [" fa489e75ac64e69a60104a36f ], "targets": [ { "attack_type": "post2", "target_asn": 16509, "target_cc": "jp", "target_host": "aossms.com" } ], "uri": "/forum/",
17 ATLAS Data Bot emulation ASERT methodically tracks and monitors wide range of botnet activity
18 Threat-Centric Approach What is the malware designed to do? Not necessarily where it s been, but where is it going? Don t look at just active behavior, but potential behavior
19 Historical, Campaign-Focused Approach
20 Network-Based Indicators of Compromise Network-Observables IP/Port/CIDR/AS Domain URL File Hash Social Networking Geo Location Credentials Certificates
21 Arbor Networks Zero-day Threat Solution
22 Advanced Threat: What we know today. Organizations face an ever growing and sophisticated level of threats There are not enough skilled security analysts to interpret and act on these threats Its not getting any easier
23 Five Styles of Advanced Threat Defense Source: 2013 Gartner, Inc and/or its affiliates. All rights reserved
24 Arbor Solution View Threats Global Network Enterprise Perimeter Internal Network Act Understand Enterprise Assets Identify
25 SIEM Rows and Columns of Threats
26 Finding a Zero-day Attack the hard way 12 Simple steps to find Heartbleed
27 Enterprise-Wide Visibility The Enterprise Visibility Needed To Secure the Network You Simply Can t Secure It if You Can t See It Detect who is accessing your network, when and what they are doing. Analyze where your risks are and how to stop them. Address problems, armed with context and security intelligence
28 Attack Timelines is Critical
29 Zoom from months and years to seconds
30 IP Address and Port Details aren t enough
31 Need to know Attacks details
32 Packet Capture or it didn t happen.. Full Packet Capture is the richest source of data but it isn t BIG DATA Contains ALL of the network data, and can be taken from ANYWHERE in the network via TAP or SPAN Can be processed whenever you like years later or as a real time stream Security analytics content derived from each capture is cumulative, building a long running history of searchable and comparable attack data this is BIG DATA Like CCTV for your network Play, Pause and Rewind your data Enables base lining of metrics between data sets and trend comparison of different periods
33 Learning from the Past Find out if an attacker used a zero day attack previously Find out what systems were compromised Find out what happened next? What other systems were compromised laterally What data was accessed What data was exfiltrated Find out if the attacker is still active, still in your network Understand the effectiveness of existing controls Understand what new controls are required
34 Were you affected by Heartbleed? So you have patched all your OpenSSL based systems. Is that it? Heartbleed could have been used against you before you applied the necessary updates, or even before the vulnerability became known to the public There are no application layer logs that would allow you to check if you were attacked or what data was stolen Any sensitive data stored in server memory could be disclosed to attacker Private SSL keys Unencrypted passwords Business critical documents
35 Looping for Zero Day Attacks such as Heartbleed Detection capability update but without signature for the Heartbleed attack Detection capability update INCLUDING signature for the Heartbleed attack Heartbleed attack here Detection capability updates occur at different times. ALL traffic stored is replayed through latest detection capability automatically Week 1 Traffic Week 2 Traffic Week 3 Traffic All Traffic Looped Heartbleed not found All Traffic Looped Heartbleed FOUND Total Analytics data after 1 week Now that Heartbleed attack has been identified, the attack timeline can be established Total Analytics data after 2 weeks Total Analytics data after 3 weeks
36 Problem: Response-Driven Operations Security operations remains a passive, response-driven process Never enough resources to investigate & close every alert Average enterprise SOC sees ~10,000 alerts per day Splunk Enterprise Security app: 12,000 events per 1 Gbps of traffic Avg. dwell time of targeted, advanced threatr continues to grow as teams chase too many events Despite false positives, teams remain focused on these events as opposed to FINDING THREATS
37 Problem: Slow Response & Decision Paralysis Once real incident identified, IR teams struggle to quickly get a clear view of the threat Disparate data logs: SIEM, packet archives, event logs Slow SIEM query response time that requires the analyst to specify exact data they want Too many pie charts and event logs as opposed to visually presenting data as trends and timelines Kill chain often delayed as teams seek information with little context to what happened pre/post event
38 Enterprises are adapting to these Challenges Today s enterprise security leaders: No longer rely on firewall, AV & IPS Create hunter teams of their best security analysts Apply big data analytics Recognize that perimeter-dominated security no longer effective, so apply solutions that focus on network & host activity
39 Arbor Networks Assumptions There will never be enough budget Technology should be scalable Defense in depth, best practices, & compliance aren t getting it done If you aren t doing more than this bad things are already happening You have a skilled headcount problem, not just a CapX problem There are more networking people in the world than threat experts
40 Arbor Networks Product Strategy Leverage netflow, packet capture, & inline capability for broad visibility Prevent, Detect, Respond Put the power back in the hands of the analysts Network & Threat Visibility Incident Response Workflow Technology should enable personnel & process investment Regardless of how many you have Or skillset
41 Thank You
Security Solutions for the New Threads
Security Solutions for the New Threads We see things others can t Pablo Grande Sales Director, SOLA [email protected] What a CISO Is Looking For Show Progress on Response Time Measurably improve our incident
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
One Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 [email protected]
How Lastline Has Better Breach Detection Capabilities By David Strom December 2014 [email protected] The Internet is a nasty place, and getting nastier. Current breach detection products using traditional
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Under the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
After the Attack: RSA's Security Operations Transformed
After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper
Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper Table of Contents Abstract...3 Understanding Online Business
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats
RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats Grzegorz Mucha [email protected] Advanced Threats Threat Landscape Criminals Petty criminals
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.
Distributed Denial of Service (DDoS) attacks Imminent danger for financial systems Presented by Tata Communications Arbor Networks 1 Agenda Importance of DDoS for BFSI DDoS Industry Trends DDoS Technology
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Hillstone Intelligent Next Generation Firewall
Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel IPS * Agenda! Review of the current Network Security
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Traffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
