Advanced Security and Risk Management for Cloud and Premise environments
|
|
|
- Emerald Blair
- 10 years ago
- Views:
Transcription
1 Advanced Security and Risk Management for Cloud and Premise environments Owen Cheng Practice Lead SIEM/SOC/MSS 2014 NTT Com Security
2 NTT Com Security Global Information Security & Risk Management Provider 2014 NTT Com Security 2
3 NTT Group Security global footprint SOCs and R&D Centres 2014 NTT Com Security
4 NTT Com Security Services Pillars: Consulting & Managed Services Technology Services Security Architecture Design Product Selection Global Procurement Global Deployment Global Staging Deployment Project Management Consulting Services Vulnerability Assessment Penetration Testing Code Review Secure Coding Data Loss Prevention SIEM Advisory Regulatory Standards Advisory Compliance Risk Assessment & Audits Security Strategy & Policy Development Security Awareness Managed Security Services Technicalsecurity phone support Remote Monitoring Service Remote Management Service (MSaaS) 2014 NTT Com Security 4
5 NTT s Global Threat Intelligence Report During 2013 * NTT researched the threats and published the Global Threat Information Report 2014 (GTIR) * We analyzed more than 3 Billion attacks on our customers, over the course of 2013 (that s 97 separate attacks per second) Findings * 95% of losses could be reduced by focused investment * 43% of incident response engagements were the result of malware * 34% of events were the result of botnet activity * The report also details specific case studies, Malware, Zero node, SQL injection RESULTS: On average a typical organization is targeted once every minute of every day including weekends, evenings, and holidays. During this presentation, your internet connected device will be attacked probably a half a dozen times and your organization will be attacked between times NTT Com Security 5
6 Managed Security Services Trend 2014 NTT Com Security
7 Market Trends: MSS Worldwide Market Drivers Security Risks to Information Systems Are Expanding at a Rapid Rate, Often Overcoming Organization Resources and Talent Compliance Mandates Continue to Provide Support for MSS Growth Buyers Trends Enterprise Buyers Prefer MSSPs With Strong Security Controls and Audit Transparency MSS Buyers Shift Away From the Stand-Alone IT Security Buyer and Expand to the Network Infrastructure Teams and the Busines Technology Trends MSSs Add Reputation Feeds and Blacklists to Enhance Customer Event Data With External Security Context Advanced Threat Protection Appliances Enter the MSSP Market Source: Gartner 2014 NTT Com Security 7
8 WideAngle Managed Security Services Architecture 2014 NTT Com Security
9 POD Concept Modular and easy to deploy infrastructure and the foundation for the GROC to deliver MSSP Services. PODs are interconnected over the GIN effectively making up a global platform embedded into multiple layers of the NTT Com Infrastructure NTT Com Security
10 WideAngle Advantages 2014 NTT Com Security
11 NTT WideAngle Managed Security Services 2014 NTT Com Security 11
12 Unique NTT threat feeds 30,000+ Websites scanned across the world each day to identify global threat trends Malware files identified & downloaded by our honeypots every day + =Ability to create uniquerules to combat threats Uniquehoney pot & sandbox environments to capture malicious activity 2014 NTT Com Security
13 Turns Data into Knowledge Data Information Knowledge Log/event data Proprietary signatures Security expert analysis 3 rd Party signatures Business context Global threat feeds Signature creation Custom threat trends Refined, actionable info Automated security analysis Security enrichment (human validation) 2014 NTT Com Security
14 Thank you Owen Cheng 2014 NTT Com Security
15 Next Generation Enterprise Security Platform Enhancing your Security Framework Charles Woo 18 June 2014
16 A Long Time Ago Securing the Data Center was Simple On Premise Data Center wired Apps in one place Users in one place Data in one place Employee , Palo Alto Networks. Confidential and Proprietary.
17 Now.Network Security Pressures in the Data Center Private Cloud SAAS Modern threats targeted, multi-vector, persistent Wired Wireless VPN VDI Employees, Guests, Partners, Contractors, and Temporary Workers , Palo Alto Networks. Confidential and Proprietary.
18 Applications Have Grown More Complex , , 443, 135, 137, , 3300, 8000, 3600, 8100, 50013, 50014, , 3478, 5223, 50,000-59, , 53, 42, 8, 13, 15, 17, 137, 138, 139, 445, 1025, 123, 507, 750, , 389, 636, 3268, 445, 161, 162, 42424, 691,
19 The Emergence of the User Kingdom , Palo Alto Networks. Confidential and Proprietary.
20 Exploits Using Business Critical Applications 10 out of 1,395 applications = 97% of the exploit logs; 9 of them are business critical 2,016 unique exploits, ~60M exploit logs Palo Alto Networks. Confidential and Proprietary. Source: Palo Alto Networks, Application Usage and Threat Report. Jan
21 Internet changes the Network Boundary Need to restore visibility and control in the firewall Ports Applica ons IP Addresses Users Packets Content Page Palo Alto Networks. Proprietary and Confidential.
22 Does it help? Questions: 1. Can you find out who is using what app in 30mins? 2. Full visibility of traffic and threat? 3. How long do you take to react on an incidence? 4. How can you enforce per user app control? 5. More devices = higher management effort and more error prone? 6. Can you really safely enable who can use what? Page Palo Alto Networks. Proprietary and Confidential
23 What about UTM? Questions: 1. How many features do you think you can turn on? 2. Is it a well integrated enterprise solution? Or just a all-in-one SMB solution? 3. Can it really integrate app control for app safe enablement? Or is just an app blocking solution by IPS engine? 4. Reports? Page Palo Alto Networks. Proprietary and Confidential
24 The Answer? Make the Firewall Do Its Job 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment , Palo Alto Networks. Confidential and Proprietary.
25 Palo Alto Networks Next-Generation Firewalls Enabling Applications, Users and Content Applications: Safe enablement begins with application classification by App-ID. Custom applications and unknowns in the data center can be classified Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect Differentiate data center access based on user, device and endpoint profile Content: Scanning content and protecting against all threats both known and unknown; with Content-ID and WildFire Protect against all threats including targeted attacks , Palo Alto Networks. Confidential and Proprietary.
26 Single-Pass Parallel Processing (SP3) Architecture Up to 20Gbps, Low Latency Single Pass Operations once per packet - Traffic classification (app identification) - User/group mapping - Content scanning threats, URLs, confidential data One policy Parallel Processing Function-specific parallel processing hardware engines Separate data/control planes Page Palo Alto Networks. Proprietary and Confidential.
27 Palo Alto Networks approach Single Pass Architecture Policy Engine Content-ID Data Filtering URL Filtering Real-Time Threat Prevention Application Protocol Decoding App-ID Application Protocol Detection and Decryption Application Signatures Heuristics User-ID L2/L3 Networking, HA, Config Management, Reporting Page Palo Alto Networks. Proprietary and Confidential.
28 Incumbents Bolt-on approach with Traditional Stateful inspection IPS Policy AV Policy URL Filtering Policy IPS Signatures AV Signatures Firewall Policy HTTP Decoder IPS Decoder AV Decoder & Proxy Port/Protocol-based ID Port/Protocol-based ID Port/Protocol-based ID Port/Protocol-based ID L2/L3 Networking, HA, Config Management, Reporting L2/L3 Networking, HA, Config Management, Reporting L2/L3 Networking, HA, Config Management, Reporting L2/L3 Networking, HA, Config Management, Reporting Page Palo Alto Networks. Proprietary and Confidential.
29 Our Research Team Discover Threat Our Research Team is active - Many of the IPS vendors have big research team for writing signatures - Our research team also discover vulnerabilities for zero day protection Palo Alto Networks McAfee Tipping Point Check Point Sourcefire Juniper Cisco Palo Alto Networks Discovering Microsoft Vulnerabilities in the past 4 years McAfee Tipping Point Check Point Source: OSVDB; as of June 15th 2011 Discovering Adobe Vulnerabilities in the past 4 years Sourcefire Juniper Cisco Source: OSVDB; as of August 15th 2011 Page Palo Alto Networks. Proprietary and Confidential.
30 Palo Alto Networks as an IPS Palo Alto Networks Tipping Point Mcafee Sourcefire Cisco [ref: osvdb.org] , Palo Alto Networks. Confidential and Proprietary.
31 Is your heart still bleeding? We provide unique protection from exploitation of the Heartbleed vulnerability, including: Innovative approach to identifying threats Unlike other security products, the next-generation design of our enterprise security platform, and the automated protections we released, prevented exploitation of Heartbleed. Automated vulnerability protection Starting April 9 th, 2014, multiple content updates were automatically sent that protected, detected, and immediately blocked attempted exploitation of the vulnerability (content updates 429 and 430, which include IPS vulnerability signature IDs 36416, 36417, 36418, and 40039). Inherent PAN-OS features Our core operating system (PAN-OS), is not impacted by CVE because it does not use a vulnerable version of the OpenSSL library. Page Palo Alto Networks. Proprietary and Confidential.
32 Reducing the Scope of Attack Only allow the apps you need Clean the allowed traffic of all threats in a single pass»the ever-expanding universe of applications, services and threats»traffic limited to approved business use cases based on App and User»Attack surface reduced by orders of magnitude»port, Protocol Agnostic»Complete threat library with no blind spots Bi-directional inspection Scans inside of SSL Scans inside compressed files Scans inside proxies and tunnels Scans unknown files , Palo Alto Networks. Confidential and Proprietary.
33 BUT when Everyone is talking about NGFW
34 Application Control Belongs in the Firewall Application Control as an Add-on Traffic Firewall Port Policy Decision Port IPS Applications App Ctrl Policy Decision Port-based decision first, apps second Applications treated as threats; only block what you expressly look for Key Points Two policies/log databases, no reconciliation Unable to effectively manage unknowns Application Control in the Firewall Firewall determines application identity; across all ports, for all traffic, all the time Traffic Application All policy decisions made based on application Key Points Firewall Applications IPS Single policy/log database all context is shared Policy decisions made based on shared context App Ctrl Policy Decision Scan Application for Threats Unknowns systematically managed
35 What NGFW should do: Safely enable application! User Safely enable Prohibited use Financial advisor Post info to a prospect s wall Chatting Clicking on infected links Sales rep Sharing opportunities with channel partner Sharing customer lists externally Marketing specialist Exchange of Photoshop files with agencies Downloading malware HR recruiter Communication with candidates Exposing lists of employees and their salaries
36 Vendor1 Do all policy turn on application control? How many policy you need to maintain? How to allow application effectively? Page 36
37 Vendor2 Two Separate Policy, No relationship between Two Separate Log Database Page 37
38 How we do: Unified Policy on Application basis Specify user Select application Single Policy, Single Log Database Do all policy turn on application? How many policy you need maintain? Page Palo Alto Networks. Proprietary and Confidential.
39 What we do: consolidated log details Every log is integrated with application Traffic Log Log Details URL Log Page Palo Alto Networks. Proprietary and Confidential.
40 What we do: consolidated log details React to incident quickly! Page Palo Alto Networks. Proprietary and Confidential.
41 Page Palo Alto Networks. Proprietary and Confidential. Performance
42 Traditionally, More Security = Poor Performance Best Case Performance Traditional Security Each security box or blade robs the network of performance Threat prevention technologies are often the worst offenders Firewall Leads to the classic friction between network and security IPS Anti-Malware , Palo Alto Networks. Confidential and Proprietary.
43 Vendor 1 Captured from official web site 13.64% 7.73% How about: -Firewall + IPS + AV throughput? -Firewall + IPS + AV + Application Control throughput? Page Palo Alto Networks. Proprietary and Confidential.
44 Vendor 2 Captured from official web site 3.6% 5.0% How about: -Firewall + IPS + AV throughput? -Firewall + IPS + AV + Application Control throughput? * Sophos AV is an in-the-cloudanti-virus solution, which requires less system resources and provides better scaling and performance, as compared to other anti-virus engines Page Palo Alto Networks. Proprietary and Confidential.
45 Guaranteed throughput with everything turn on! Layer 7 throughput, all policies turn on application with logging Threat throughput: ALL (AV, Antispyware, IDP, URL AND Wildfire) turn-on ALL Signature (not default, not recommended) turn-on ALL with logging Page Palo Alto Networks. Proprietary and Confidential.
46 Validated in 3 rd Party Testing Threat Preven on Performance (Mbps) Regardless of which UTM features we enabled - intrusion prevention, antispyware, antivirus, or any combination of these - results were essentially the same as if we'd turned on just one such feature. Simply put, there's no extra performance cost -NetworkWorld, Firewall + IPS Firewall + IPS +AV Firewall + IPS + AV + Spyware , Palo Alto Networks. Confidential and Proprietary.
47 And for Datacenter
48 Traditional Datacenter Segmentation Data Center A Port 1521 > 100 ports Port 80/443 Confidential Server Webex SSH SSL RDP / / /24 Partners and Contractors Page Palo Alto Networks. Proprietary and Confidential.
49 With Palo Alto Networks Solution: Data Center A Oracle Microsoft Servers Web Servers Confidential Server DB Zone App Zone Web Zone Mgmt Zone App-ID User-ID Webex- no file sharing SSH- no tunneling SSL- with decryption RDP-not port 3389 Content-ID CFO Finance VP of Sales Sales IT Partners and Contractors Page Palo Alto Networks. Proprietary and Confidential.
50 Our systematic approach for better security Provide global visibility & intelligence correlation 1 Apply positive controls 2 3 Prevent known threats Discover unknown threats Inspect all traffic across ports, protocols & encryption Copyright 2014, Palo Alto Networks, Inc. All Rights Reserved
51 Positive security controls Reduced attack surface with granular control High-risk applications & protocols Files from suspicious Domains and URLs Encryption and custom traffic 368 Applications can deliver files 34% Applications use SSL 17% Applications port-hop , Palo Alto Networks. Confidential and Proprietary.
52 Known threats Block known-bad content with evolving signatures Vulnerability exploits Known Malware & variants Malicious Domains, URL & DNS Command & Control (C2) 6,200 Signatures delivered per day 1,800 Variants of the threat blocked by 1 signature , Palo Alto Networks. Confidential and Proprietary.
53 Unknown threats WildFire Automated Visibility into threat unknown Visibility into unknown prevention traffic Purpose-built sandbox traffic In-line environment See unknown enforcement Running from applications next-generation full versions & of common firewall protocols applications & WildFire Near OSs Suspicious real-time domains & Full signature URLs Internet updates access for Disrupts C2, New domains, malicious threat URLs content delivery & Automated threat additional & (malware callbacks & payload (Anti- exploits) prevention Elastic malware, scale DNS, in the URL, cloud C2) or local appliance Global intelligence sharing & threat research Copyright 2014, Palo Alto Networks, Inc. All Rights Reserved. Palo Alto Networks Proprietary and/or Confidential. For Palo Alto Networks internal use only and as permitted by Palo Alto Networks for its authorized partners.
54 Building a complete platform for advanced threats Non-standard Attack surface ports Port-hopping SSL & SSH Vulnerability exploits (IPS) Malware Bad web sites Bad domains C&C Sandbox Unknown applications Suspicious file types / web sites MSS Malware intelligence Forensics Apply positive controls Prevent known threats Detect unknown threats Validate attack Remediate Copyright 2014, Palo Alto Networks, Inc. All Rights Reserved. Palo Alto Networks Proprietary and/or Confidential. For Palo Alto Networks internal use only and as permitted by Palo Alto Networks for its authorized partners.
55 A Three Time Gartner Magic Quadrant Leader Palo Alto Networks is assessed as a Leader, mostly because of its NGFW focus, because it set the direction of the market along the NGFW path, and because of its consistent visibility in shortlists, increasing revenue and market share, and its proven ability to disrupt the market. Gartner clients consistently rate the Palo Alto Networks App-ID and IPS higher than competitors offerings for ease of use and quality. The firewall and IPS are closely integrated, with App-ID implemented within the firewall and throughout the inspection stream. This "single pass" is a design advantage, as opposed to the unnecessary inspection that can occur in competing products that process traffic in serial order. --Gartner Magic Quadrant for Enterprise Network Firewalls
56 Get to know more about your network now! , Palo Alto Networks. Confidential and Proprietary.
57 Talk to us about the AVR report , Palo Alto Networks. Confidential and Proprietary.
58 Thank You!
59 Managed Security Service: From Device Management to Security Enrichment Owen Cheng 26 June NTT Com Security
60 Enriched Security Intelligences Next-Gen Challenges 2014 NTT Com Security Nick Williams -Public -Draft-v02 15 May
61 Firewall & perimeter challenges Do The Basics #1Counter measure to the changing THREATS 71% of new malware goes undetected when analysed in a sandbox 43% of incident response engagements were the result of Malware costing one business $109,000 Performing regular vulnerability scans significantly reduces your risk 77% of the organisations involved had no incident response team, policies or procedures in place Over 50%of vulnerabilities were already known some dating back to 2004 Risk is shaped dynamically. Security threats are increasingly complex Applications are the new internet. They are the bearer of corporate risk. We work and live in an agile global world 2014 NTT Com Security Nick Williams -Public -Draft -v02 15 May
62 Management & visibility Organisational challenges Effective security management Organisations require an effective solution to manage firewalls & perimeter assets Secure, consistent & scalable solution suitable for Next Generation security These assets need to be secured to minimise organisational risk and for compliance Security must change as business evolves Analysis of data needed for Risk & Security decision making Flexibility with expert deployment to meet compliance & organisational requirements Security controls tightly aligned to risks Enriched data analysis for rapid, accurate decision making 2014 NTT Com Security Nick Williams -Public -Draft-v02 15 May
63 WideAngleMSS Analysis Engine addresses the challenges 2014 NTT Com Security Nick Williams -Public -Draft-v02 15 May
64 Management & visibility making sense of the information Analyse and correlate huge amounts of data All event flows need to be analysed in order to identify potentially malicious behaviour. Often requires complex correlation rules to produce alerts of interest Filter and enrich Apply context, asset information, previous knowledge to reduce the number of false positives 00 s Millions of raw events Thousands of alerts Hundreds of alerts Enriched alerts 000 s 000,000 s Granular, enriched reports. Additional human validation for further business context 2014 NTT Com Security Nick Williams -Public -Draft-v02 15 May
65 Analysis Platform - Architecture Analysis Platform Components Inspector META Support Modules BDAE (Batch Engine) RTCE (CEP Engine) Drilldown and verification Alert enrichment Medium- to longterm detection focus Short- to mediumterm detection focus Alert grouping, filtering and drilldown UI Provides instant access to verification data (PCAP, sandbox details) Module based verdict system Able to perform crosscustomer correlation of alerts Splunk based engine Query based processing approach Able to identify weekly/ monthly patterns CEP based engine Correlates and processes all logs as event feeds Near-realtime response capabilities ALERT PROCESSING RAW LOG PROCESSING Example: PCAP shows that the exploit is target specific Example: This alert has been seen in confirmed incidents for two other customers Example: Regular network transfer peaks every Sunday evening by single user account Example: Executable download (proxy) followed by outbound firewall session within 10 minutes Internal - Confidential 2014 NTT Com Security
66 WideAngleMSS Services 2014 NTT Com Security Nick Williams -Public -Draft-v02 15 May
67 What WideAngle MSS provides 1Device Management 2Automatic Log Analysis 3Human enriched Analysis Customer can choose one of three function or combine them 1, 1+2,etc 2014 NTT Com Security
68 Package A Network Basic Firewall Network Basic Firewall only 1Device Management 2014 NTT Com Security
69 Package B Network Security Firewall + IPS/IDS Network Security Firewall + IPS/IDS 1Device Management 2Automatic Log Analysis 2014 NTT Com Security
70 Package C -Content Security Next Gen + Firewall + IPS/IDS + Web and Antivirus + URL Filtering + Application Filter Firewall IPS/IDS Web and Antivirus URL Filtering Application Filter 1Device Management 2Automatic Log Analysis Content Security Next Gen + 3Human enriched Analysis 2014 NTT Com Security
71 Portal Main navigation Status of services and devices, can be expanded to show service level and service type Bulletin board, holding important service messages from the Global Risk Operations Centers Tickets for changes, inquiries and problems, can be sorted per column for fast access as well as filtered on ticket types Health and availability incidents listing open incident, can be sorted by column and filtered using the dropdown Security incidents, defaults to open incidents and can be sorted based on columns or filtered by using the dropdown Event processing status showing the total of logs, events, incidents and validated incidents since service start Status on monitored VPN-tunnels 2014 NTT Com Security WideAngle Customer Portal Presentation-Public-Approved_V1 00
72 Human enriched Incident Report - Example 2014 NTT Com Security
73 Human enriched Incident Report - Example 2014 NTT Com Security
74 Human enriched Incident Report - Example 2014 NTT Com Security
75 Human enriched Incident Report - Example 2014 NTT Com Security
76 Human enriched Incident Report - Example 2014 NTT Com Security
77 Human enriched Incident Report - Example 2014 NTT Com Security
78 Human enriched Incident Report - Example 2014 NTT Com Security
79 Human enriched Incident Report - Example 2014 NTT Com Security
80 Thank you 2014 NTT Com Security
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
FROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
PALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Moving Beyond Proxies
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
Palo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
Next-Generation Firewall Overview
Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,
A Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
Next-Generation Firewall Overview
Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
Next-Generation Firewall Overview
Next-Generation Firewall Overview Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional port-based firewalls
May 2010. Palo Alto Networks 232 E. Java Drive Sunnyvale, CA 94089 408-738-7700 www.paloaltonetworks.com
Application Visibility and Control: In the Firewall vs. Next to the Firewall How Next-Generation Firewalls are Different From UTM and IPS-based Products May 2010 Palo Alto Networks 232 E. Java Drive Sunnyvale,
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network December 2008 Palo Alto Networks 232 E. Java Dr. Sunnyvale,
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager
Stallion SIA Seminar 2.12.2015 PREVENTION FIRST Introducing the Enterprise Security Platform Sami Walle Regional Sales Manager CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Palo Alto Networks Next-Generation Firewall Overview
Palo Alto Networks Next-Generation Firewall Overview The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Palo Alto Networks Overview
Palo Alto Networks Overview campu[s]³ Christian Etzold Sr. System Engineer About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and networking
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks
_Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Palo Alto Networks - Next Generation Firewall. Contents
Palo Alto Networks - Next Generation Firewall Contents Palo Alto Networks - Next Generation Firewall... 1 Enterprises Need Application Visibility and Control... 2 Key Next- Generation Firewall Requirements:...
Network Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
How to Dramatically Reduce the Cost and Complexity of PCI Compliance
How to Dramatically Reduce the Cost and Complexity of PCI Compliance Using Network Segmentation and Policy-Based Control Over Applications, Users And Content to Protect Cardholder Data December 2008 Palo
Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies
How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies Table of Contents Introduction 3 Executive Summary 3 A Systematic Approach to Network Application Whitelisting 4 Positive
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Palo Alto Networks Next-generation Firewall Overview
PALO PALO ALTO ALTO NETWORKS: NETWORKS: Next-Generation Firewall Firewall Feature Feature Overview Overview Palo Alto Networks Next-generation Firewall Overview Fundamental shifts in application usage,
Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
Detect & Investigate Threats. OVERVIEW
Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Next Generation Firewalls and Sandboxing
Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
A Modern Framework for Network Security in Government
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
McAfee - Overview. Anthony Albisser
McAfee - Overview Anthony Albisser Channel Account Manager About McAfee Founded in 1987, McAfee is now the world s largest dedicated security company (acquired by Intel in 2011) Global research for real-time
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Simplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Discover & Investigate Advanced Threats. OVERVIEW
Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
Providing Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.
Guest Speaker Michael Sutton Chief Information Security Officer Zscaler, Inc. Michael Sutton has dedicated his career to conducting leadingedge security research, building world-class security teams and
Top 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
