REVOLUTIONIZING ADVANCED THREAT PROTECTION
|
|
|
- Clare Lang
- 10 years ago
- Views:
Transcription
1 REVOLUTIONIZING ADVANCED THREAT PROTECTION HOW TO BEAT ADVANCED THREATS WITH AN INTEGRATED APPROACH TO SECURITY VISIBILITY, ANALYTICS, THREAT INTELLIGENCE, AND ENFORCEMENT
2 INTRODUCTION Today s threat protection paradigm is broken. Most organizations rely on signature-based tools to block attacks at the network perimeter, and security information and event management (SIEM) products to provide incident resolution. But today s attackers have found too many ways to evade signature-based products, and SIEM products cannot pin-point successful attacks until after they have inflicted considerable damage. As a result, it seems that every week another major company sees its reputation destroyed by a major data breach. This paper presents a new framework for defeating advanced cyberthreats. It discusses: The problems with relying on signature-based security tools and conventional security information and event management products. A framework that integrates security visibility, security analytics, detection of zero-day threats, and blocking and enforcement solutions for combatting advanced threats. A three-stage model of an advanced threat protection lifecycle defense, implemented with products and services from Blue Coat. Weaknesses of Today s Information Defenses News outlets are filled with stories about massive thefts of personally identifiable information, stealth attacks on intellectual property, and disabled web sites. The costs for victimized enterprises range from damaged brand reputation, to loss of competitive position, to millions of dollars in regulatory fines and data breach notification expenses. Often it appears that the bad guys are winning an arms race by continuously introducing new ways to overcome traditional information security defenses. These defenses are vulnerable because they rely on a signature-based, prevention-only picket fence security model. Blasting out unknown and next-generation malware in zero-day attacks that penetrate networks before signatures can be created and distributed. Targeting individual organizations with customized malware for which no signatures exist. Using social engineering and spear phishing techniques that fool employees into helping the attacker circumvent defenses. Concealing attacks in SSL-encrypted traffic (which now makes up 30%-40% of all Internet traffic) that can t be deciphered by IPS and web gateway defenses. Attacks evade signature-based tools Most enterprises employ a variety of signature-based security tools like next-generation firewalls (NGFWs), intrusion prevention systems (IPSs), data loss prevention (DLP) tools, and host antivirus packages to identify known threats in network traffic. But attackers have developed many techniques to evade signaturebased tools, including: Using encryption, compression and morphing tools to hide malware from antivirus programs. Embedding malware in otherwise useful apps and games. Broadening the attack surface; that is, finding vulnerabilities in additional types of endpoints such as mobile devices and industrial control systems. 2
3 The vast majority of information security experts now agree that signature-based defenses alone are unable to stop today s most serious advanced threats. [Signature-based detection is] still an integral part [of malware defense], but it s not going to be the only thing. We need to move away from trying to build Maginot lines that look bulletproof but are actually easy to get around. Nicolas Cristin, Carnegie Mellon University, quoted in The Antivirus Era is Over Slow Responses Increase Risks and Breach Costs Fast detection and response can stop advanced attacks before they cause damage, or minimize the amount of intellectual property and protected personal information attackers are able to extricate from the organization. Unfortunately, according to the Verizon 2014 Breach Investigation Report, 68% of web app attacks take weeks, months or years to discover, even though in 69% of the cases stolen data was extricated in minutes, hours or days. Of financially motivated web app attacks, 88% were discovered by outside parties (such as customers, fraud agencies and law enforcement) rather than the organization that was attacked. SIEM Products Don t Provide Enough Context Most enterprises have recognized that some attackers will break through the network perimeter, and have implemented security information and event management products to identify breaches and their causes. Unfortunately, SIEM products have severe limitations. Many SIEM products cannot process the massive volume of security events created by today s networking and security systems and end user devices. To compensate, they work with only samples or summaries of log data. This means that security analysts and incident responders have incomplete visibility into the sequence of actions that make up advanced attacks, making them much harder to identify. In addition, SIEM products also have a limited ability to reconstruct the complete context of attacks. They can evaluate event and log data from security and network devices, but they cannot correlate it with s, malicious files and web sites that are involved in advanced attacks, or help analysts connect events that are spread out over long periods of time. Point Tools are Not Integrated In many enterprises, a lack of integration between point tools prevents security organizations from detecting and analyzing ongoing attacks. New malware types uncovered by an analysis product may not be visible to blocking tools without time-consuming manual steps. Clues to multistage attacks collected by various security systems are not shared, so security analysts have no place to make correlations and detect patterns that would reveal the actions of attackers. intelligence is not shared efficiently among enterprises, leaving them exposed to zero-day malware and new threat types. This is strong evidence that today s methods are failing to detect and contain attacks in an acceptable timeframe. We cannot assume we can stop the attackers, so we have to plan for compromise. The difference between success and failure breaks down to how quickly you can isolate the attack, contain the damage, and then remediate the issue. Mike Rothman, President of Securosis, in Applied Network Analysis: Moving from to Information A Framework for Advanced Protection But the arms race is not lost. Several advances in security technology give enterprises and government agencies hope for staying ahead of attackers. These include: Tools that give enterprises complete real-time visibility into ongoing attacks and extensive contextual data for incident response and postbreach analysis. New security analytics products that allow enterprises to expedite the discovery of security breaches and remediate even the most sophisticated attacks. technologies that use behavioral analysis and dynamic analysis ( next-generation sandboxing ) to detect advanced malware for which no signatures exist. Cloud-based threat intelligence networks and knowledgebases that speed up the dissemination of real-time threat data so enterprises can inoculate themselves as soon as new attacks appear. 3
4 of these components with existing blocking and analysis tools to create a security ecosystem that offers comprehensive security against advanced threats. These advanced capabilities can be integrated into an advanced threat protection framework (Figure 1). This framework allows organizations to detect and block more attacks and respond more quickly to breaches. record of network traffic and all related security data so they can perform comprehensive real-time and back-in-time analysis. To prevent blind spots, a successful advanced threat protection solution must be able to: Decrypt encrypted network traffic, particularly SSL. & SSL Visibility & SSL Visibility Capture all network traffic, across all major protocols, without any loss of data through sampling or summarization. & SSL Visibility Recognize everything that crosses the network, both as network packets and as higher-level elements such as files, and instant messages, application traffic and security events. Capture and store weeks, months or more of historical data. Extract, index and classify metadata efficiently so that historical analysis can be performed quickly on massive volumes of data. Unless all of these capabilities are available, downstream threat protection technologies and incident response professionals will not have the data they need to do an effective job of blocking known threats, analyzing unknown ones, and fully investigating breaches. Figure 1: A framework for advanced threat protection and SSL Visibility visibility is a critical requirement for Advanced Protection. -blocking tools such as NGFWs, IPSs and host antivirus solutions are only effective when they can inspect all of the network traffic entering and exiting the enterprise. Also, security analytics, impact analysis and incident resolution require a complete Big analytics helps organizations derive actionable intelligence from massive volumes of security and network data. Heuristic detection and correlation can identify files and events that Big & resemble known malware and attack SSL Visibility patterns. This helps defend against polymorphic malware that can t be detected by straight signature matching. Statistical analysis can detect suspicious variations in behavior, particularly network flows. 4
5 analytics also plays a major role in incident response, helping analysts identify indicators of compromise (IOCs) and understand the tactics, techniques and procedures of attackers. A security analytics solution can reconstruct attack activity in chronological order, including s, chat, web, VoIP and other user sessions, with related text, images and associated files. Reconstructing timelines this way gives security analysts invaluable tools to detect attacks as they are occurring and answer specific questions such as: Who is responsible and how did they do it? What systems were affected and what data was compromised? Is the attack continuing, and if so, how can we stop it immediately? Is the attack over, and if so, how can we prevent a recurrence? A security analytics solution can also help analysts answer broad questions like: What attacks are most common, and which have been most successful? What systems are most vulnerable? Signatures can be developed for files identified as malicious or suspicious. These signatures can be used to block any additional instances attempting to enter the network, and can also be shared with other enterprises through a global threat intelligence service. In addition, the behavior of malicious files offers many clues about the methods, intentions and targets of the attacker. This information can be used by a security analytics solution to help reconstruct and reverse engineer advanced, multi-stage attacks. Most organizations have invested heavily in blocking and enforcement products, including firewalls, secure web gateways, NGFWs, IPSs, unified threat management (UTM) appliances, DLP systems, and network antivirus packages. These products become more effective as part of an advanced threat protection environment, because: & SSL Visibility Where are our security processes strong, and where are they weak? Detection and Many zero-day and advanced attacks use targeted or polymorphic malware that won t be detected by signaturebased security tools. To detect malware in files for which no signature exists, many enterprises are deploying dynamic analysis technology that employs next-generation sandboxing. With sandboxing, files that have not & SSL Visibility Detection & been previously identified as good or bad are sent to execute in a protected environment. The solution records and analyzes malicious and potentially malicious behaviors, for example attempts to change registry keys, access security-related files, disable anti-virus packages, or phone home to a command-and-control (CnC) server on the Internet. The security and SSL visibility products ensure that the blocking tools have no blind spots in network traffic. The security analytics tools help identify polymorphic malware and new attack patterns, so these can be blocked in the future. Detection and threat intelligence technology detects previously unknown types of malware, so signatures can be developed to block that malware. and In an advanced threat protection framework an integration layer provides an extensive set of connectors and integration tools so security information can be shared quickly and reliably among security & SSL Visibility 5
6 products. This ensures that once new malware and attack patterns have been recognized, signatures are immediately available to blocking and enforcement products, including, secure web gateways, NGFWs, and DLP systems. It also means that alerts from those systems can be sent to a security analytics solution, so analysts can pivot on an alert and reconstruct the sequence of events occurring during and after the attack, to determine its source and full scope. Information sharing becomes even more powerful when the enterprise can access a cloud-based global threat database. This allows organizations to share threat signatures and URL reputation data so they can block malware and traffic to and from web sites used by cybercriminals, botnets, spammers, and state-controlled attackers. Tapping security data from thousands of organizations and millions of users creates a network effect that is critical for allowing enterprises to inoculate themselves against zero-day attacks and targeted attacks as soon as these are identified in the wild. An Advanced Protection Lifecycle Defense The advanced threat protection framework discussed so far gives enterprises the tools to implement a complete, smooth-flowing advanced threat protection lifecycle defense. The next four sections of this white paper discuss the stages of a lifecycle defense and how each of them can be implemented with products and services from Blue Coat. The stages of the lifecycle defense, together with selected Blue Coat products, are shown in Figure 2. Fortify & Incident Resolution Platform Figure 2: An Advanced Protection Lifecycle defense, with selected Blue Coat products Incident Resolution Investigate & Remediate Breach Profiling & Eradication Escalation Retrospective Operationalize GLOBAL INTELLIGENCE NETWORK Incident Containment Analyze & Mitigate Novel Interpretation Incident Containment Ongoing Operations Detect & Protect Block All Known s Unknown Event Escalation Ongoing Operations ProxySG SWG Content Analysis System SSL Visibility Appliance Platform with BLADES Malware Analysis Appliance 6
7 Ongoing Operations Ongoing Operations, the first stage of the advanced threat protection lifecycle defense, focuses on the detection and blocking of known threats. Most of the activities in this phase are carried out by technologies that belong in the and SSL Visibility, and Blocking and sections of the advanced threat protection framework discussed earlier. One key activity in this stage is decrypting and managing encrypted network traffic so all of it can be inspected. This is followed by inspecting traffic for known malicious networks, malware and other known threats, and then blocking unwanted traffic and files. A further set of actions can involve escalating unknown files for dynamic analysis and alerting security operations center (SOC) and incident response staffs of suspicious activities. The Blue Coat products and services that are most important in the Ongoing Operations stage of the lifecycle defense include; Blue Coat SSL Visibility Appliance: This is a highly efficient device for decrypting and managing SSL traffic so its contents can be scanned by multiple security tools, including NGFWs, secure web gateways, IPSs and security analytics tools. It can perform policy-based decryption on inbound and outbound SSL traffic arriving and leaving via any port and any protocol, not just HTTPS on port 443, and can be deployed inline or out of band. It also allows administrators to specify what traffic should not be decrypted, so they can comply with data privacy regulations. Analysis Appliance and third party sandbox products. It can reduce files sent to the sandbox by 37% by filtering out known good and bad files, decreasing the number of sandbox appliances needed. Incident Containment Incident Containment, the second stage of the advanced threat protection lifecycle defense, focuses on the automated analysis of zero-day threats and prevention of additional damage. Most of the activities in this phase are carried out by technologies that fit in the, and Detection and sections of the advanced threat protection framework. One key activity in this stage is detonating unknown files in an isolated environment (a sandbox) and monitoring their actions. This stage not only identifies previously unknown malware, it also produces a detailed record of malicious actions, so analysts can understand the behavior of the attack and the intensions of the attacker. Sources of potentially unknown files can include web, and file transport protocols, so it s important that all sources are scanned for advanced, zero-day malware. A second activity involves reconstructing the attack in order to identify the systems that have been compromised and the data that has been accessed. Analysts and administrators are then able to patch vulnerable systems, update configurations, and take other actions to prevent reinfection and block new instances of the same and similar attacks. Blue Coat ProxySG appliance and Secure Web Gateway Virtual Appliance: These are recognized as the world s leading secure web gateways. Besides providing critical web security features, such as user authentication, web filtering, data loss prevention and bandwidth management, they can be used to detect known malware networks (malnets) and enforce web acceptable use policies. Blue Coat Content Analysis System: This appliance integrates with the ProxySG appliance to orchestrate malware scanning and application whitelisting. It uses single or dual anti-malware engines to block known threats, based on a database of over 1 billion records. It includes a broker feature to send unknown suspicious content to analysis and sandbox tools for deeper study, including the Blue Coat Malware The Blue Coat products and services that are most important in the Incident Containment stage of the lifecycle defense are: Blue Coat Malware Analysis Appliance: This next-generation sandboxing device can rapidly assess large numbers of unknown files and URLs for indications of malicious activity. It detonates files in a secure, virtualized environment and records malicious and suspicious activities. Unlike other sandboxing tools, it uses multiple techniques to detect VM evasive malware, including kernel-level event detection and the ability to emulate user actions like mouse clicks. It provides the unique ability to replicate actual customer desktop golden images, including custom applications, to detect application-specific attacks. 7
8 The Malware Analysis Appliance also provides risk scoring to separate high risk from low risk files, and alerting to warn security administrators and end users. Information from the malware analysis is automatically shared with ProxySG appliances so future instances of the identified malware can be blocked at the gateway, allowing all ProxySG customers to benefit from this intelligence. Blue Coat BLADES: These software blades run directly on the Blue Coat Platform (which is discussed in depth below). Each BLADE is optimized to scan specific protocols, detect and extract files, URLs and IP addresses, inspect and categorize those files, URLs and IP addresses as known good, known bad (malicious), or unknown. Key activities in this phase include attack reconstruction and root cause analysis. These allow analysts and incident responders to determine the full source and scope of attacks and to identity the compromised systems and the exact intentions of the attackers. To combat complex, long-lasting attacks, analysts must be provided with a complete set of data not just packets, but also session flows, files, s, and other artifacts and the results of sandboxing analysis. This data needs to be available for extended time periods, weeks or months. Also, the analysts need security analytics tools that can identify and extract information related to a specific indicator of compromise, for example, all s, attachments and prior and subsequent traffic related to a piece of malicious malware. The BLADES alert analysts and administrators to the presence of known threats, and can send unknown files and URLs to the Malware Analysis Appliance for detonation and behavioral analysis. The Web BLADE provides comprehensive protection against web-based threats. It detects and reports suspicious web sites in more than 100 different categories, and uses reputation data on URLs and IP addresses to identify network traffic originating from known bots, spammers, phishing sites, malware sources and compromised websites. The Mail BLADE provides in-depth protection against based threats. It extracts attached files delivered over all standard protocols, and uses hashes to identify known good and known bad files. The File BLADE extracts and analyzes key file types, including Microsoft Office documents, Adobe Flash and PDFs, Java, EXE files, attachments, Android APK files and web objects. It uses realtime analysis to detect malicious files, and reputation intelligence to identify recent file-based attacks and threats delivered over standard file transport protocols like FTP and SMB. Incident Resolution Incident Resolution, the third stage of the advanced threat protection lifecycle defense, involves the in-depth investigation of attacks and remediation of damage caused. The key tools in this phase fit in the Big section of the advanced threat protection framework. The results are used to assess and quantify the damage caused by attacks, to clean up compromised systems, to update signatures and threat intelligence, to validate compliance to information security regulations, and to improve IT processes in order to prevent future attacks. The Blue Coat product that is critical to the Incident Resolution stage of the lifecycle defense is: Platform: This system records and classifies every packet that enters the network, even on today s fastest networks. Deep Packet Inspection (DPI) provides visibility into all information in the captured packets from 2 through 7, and classifies over 1,800 applications and thousands of metadata details. Session and application reconstruction convert traffic from raw packets to meaningful artifacts like files, s, instant messages, VoIP conversations and application traffic. These artifacts can be scanned and analyzed by IPSs, anti-virus products and malware analysis tools, and can provide context to security analytics tools. The Platform can even identify and reconstruct complex PHP, Ajax and JavaScript files. The Platform not only collects and stores complete security data, it also provides critical big data security analytics tools to correlate and process massive volumes of data in order to detect ongoing attacks and answer critical post-breach questions. Using data and tools provided by the Platform, analysts can apply what Blue Coat calls the CRIME Methodology and determine: 8
9 The Context of a threat or breach What happened before, during and after the attack? The Root Cause Where did the attack originate and who was responsible? The Impact What systems were affected, what data was compromised, what networks and users were affected, and what dangerous artifacts might still be on the network? Mitigation What steps need to be taken to fix problems caused by the attack and prevent it from resuming? Eradication What needs to be done to clean up remaining effects of the breach and prevent similar attacks in the future? The Platform delivers enterprise performance and scalability, with full packet capture at up to 10Gbps. It can provide context to alerts received from NGFW, IPS, SIEM, DLP and malware analysis products. Deployment options include software, dedicated appliances and virtual appliances. The Blue Coat Network At the center of the advanced threat protection lifecycle defense is the Network, which shares threat data from thousands of enterprises. By rapidly disseminating information on newly discovered malware, suspicious URLs and IP addresses, attack patterns and other threat data, a Network can: Help block zero-day and targeted attacks at the gateway as soon as they appear in the wild. Provide analysts and incident responders with intelligence to analyze new threats faster and more accurately. Build up real-time white lists and black lists so there are fewer unknown files that need to be analyzed by anti-malware and sandboxing systems. The Network, powered by Blue Coat WebPulse collaborative defense, creates an ecosystem for collecting and sharing data from 75 million users at over 15,000 companies, together with leading technology providers and independent threat intelligence sources. It features threat labs staffed by seasoned security professionals, who detect advanced threats using multiple best-of-breed threat engines, sandboxing and behavioral analysis, correlation rules, machine learning, and other sophisticated techniques. Summary and Implications To stop cybercriminals, hacktivists and state-supported hackers, enterprises must go beyond traditional signature-based security defenses and SIEM products. These technologies are still critical in a modern defense-in-depth strategy, but attackers have found too many ways to evade the former, and the latter provides too limited a set of data and tools to reliably detect ongoing attacks and to find patterns in historical information. The solution is to move toward a more complete approach to advanced threat protection. In this approach, a and SSL Visibility component provides data for more effective blocking and better analysis of the unknown. A Big component identifies unknown threats and provides data and tools so security analysts can perform comprehensive historical analysis and get at the root causes of vulnerabilities and attacks. A Detection and component provides additional tools like sandboxing to identify unknown malware, and helps acquire realtime security information from thousands of outside sources. become more effective, because blocking tools are provided with up-do-date information on known and unknown threats. When these technologies are deployed to create an Advanced Protection Lifecycle Defense, enterprises maximize their ability to detect and block known attacks, analyze and contain zero-day threats, and reconstruct and remediate even the most sophisticated assaults. The results will include better defense against known threats, shortening the duration attacks that are successful, as well as dramatic reductions in lost revenue, lost productivity, lost customer loyalty, breach notification fees, and clean-up costs. For more information on the concepts and products discussed in this white paper, and to determine how these solutions can help in your environment, please visit Blue Coat at 9
10 Blue Coat Systems Inc. Corporate Headquarters Sunnyvale, CA Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, Center, CacheEOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, Mach5, Packetwise, Policycenter, ProxyAV, ProxyClient, SGOS, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, See Everything. Know Everything.,, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. v.wp-revolutionizing-advanced-threat-protection-env1b-0714 EMEA Headquarters Hampshire, UK APAC Headquarters Singapore
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM
NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM SECURITY ANALYTICS: MUCH MORE THAN NETWORK FORENSICS Prior generations of
NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE
: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE A CLOSER LOOK REVEALS WHY PROXY-BASED ARCHITECTURE IS UNIQUELY EFFECTIVE IN DEFENDING AGAINST WEB-BASED THREATS. The web is central to the way we work, live,
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Decrypt Inbound SSL Traffic for Passive Security Device (D-H)
Decrypt Inbound SSL Traffic for Passive Security Device (D-H) SSL Visibility Appliance First Steps Guide Third Party Copyright Notices 2015 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG,
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
EXPLORING ADVANCED THREATS
Whitepaper Blue Coat Advanced Threat Protection Series Security Empowers Business EXPLORING ADVANCED THREATS Advanced Threat Protection (ATP) Essentials, Part 1 SECURITY ISN T ONLY ABOUT PREPARING FOR
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Threat Containment for Facebook
Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Blue Coat Security First Steps. Solution for HTTP Object Caching
Solution for HTTP Object Caching Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE, CROSSBEAM,
VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION
WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Security Report. Security Empowers Business DO NOT ENTER. Blue Coat Research Maps the Web s Shadiest Neighborhoods. September 2015
Security Report Security Empowers Business DO NOT ENTER Blue Coat Research Maps the Web s Shadiest Neighborhoods September 2015 The Web s Shadiest Neighborhoods KEY FINDINGS There has been an explosion
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
The Fortinet Advanced Threat Protection Framework
WHITE PAPER The Fortinet Advanced Threat Protection Framework A Cohesive Approach to Addressing Advanced Targeted Attacks The Fortinet Advanced Threat Protection Framework Table of Contents Introduction
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Blue Coat ICS PROTECTION Scanner Station Version
Blue Coat ICS PROTECTION Scanner Station Version USB Malware Defense for Industrial Computers User Guide, version 5.3.1 Contents Contents 1. ABOUT... 3 1.1. About this Guide... 3 1.2. System Requirements...
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
SECURITY ANALYTICS FOR SECURITY OPERATION CENTER 2.0 A TECHNICAL OVERVIEW
A TECHNICAL OVERVIEW BLUE COAT: SECURITY EMPOWERS BUSINESS Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has
CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY
CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY MATTHIAS YEO Chief Technology Officer - APAC CISSP, CISA, CISM, PMP 1 OVER REACTING VS UNDER REACTING Reason for the world today
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
Blue Coat Security First Steps Transparent Proxy Deployments
Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1
ATP 1 LES QUESTIONS QUI DEMANDENT RÉPONSE Qui s est introduit dans notre réseau? Comment s y est-on pris? Quelles données ont été compromises? Est-ce terminé? Cela peut-il se reproduire? 2 ADVANCED THREAT
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Cutting the Cost of Application Security
WHITE PAPER Cutting the Cost of Application Security Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage,
The Business Justification for Cyber Threat Intelligence. How advanced intelligence improves security, operational efficiency and strategic planning
The Business Justification for Cyber Threat Intelligence How advanced intelligence improves security, operational efficiency and strategic planning What Executives Need to Know about Cyber Threat Intelligence
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services
MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
Comprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Palo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Blue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
