CISO Guide to Next Generation Threats
|
|
|
- Opal Collins
- 10 years ago
- Views:
Transcription
1 White Paper CISO Guide to Next Generation Threats Combating Advanced Malware, Zero-Day and Targeted APT Attacks
2 White Paper Table of Contents Introduction The Moving Target: From PII to IP to Credentials From Big Business to Every Business The Price of the Problem How Next-Generation Threats Bypass Traditional Security Separate Acts vs. the Entire Show Plugging The Security Hole Next Generation Security for Next Generation Threats CISO Guide to Next Generation Threats
3 White Paper Introduction Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. 1 This situation the new status quo results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move low and slow and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data. Defending against next-generation threats requires a strategy that moves beyond signatures and behavioral heuristics. Signatures and heuristics remain valuable against known threats: criminals never throw away an exploit toolkit or other penetration technique, they just add new capabilities and concoct new evasion tactics. But against unknown threats, traditional defenses like firewalls, IPS, antivirus and Web gateways collapse, leaving a wide-open hole for cybercriminals. Today s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. These attacks do not trigger heuristics because of techniques like camouflage, multi-stage packaging, targeting and other advanced persistent threat (APT) tactics. Next-generation firewalls add next-generation policy options around users and applications and consolidate traditional signature-based protections. They may consolidate traditional AV and IPS protections. But they are not adding new levels or innovations to these protections, so they do nothing to thwart next-generation threats. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Through constant testing of any suspicious code and blocking of communications with malicious hosts, next-generation protections combat advanced malware, zero-day and targeted APT attacks that bypass defenses like next-generation firewalls, IPS, antivirus, and Web gateways. The Moving Target: From PII to IP Credentials In the 2011 CyberSecurity Watch Survey, 28% of respondents reported an increase in the number of cybersecurity events. 2 Understanding the criminal s motivation helps us understand his determination and deep pocket investment in malware development and infrastructure such as bot networks. For the last decade or so, regulations have forced IT teams to wrap controls around financial and personally identifiable information (PII). Combined with more sophisticated fraud detection, the street price of basic credit card and identity data has fallen to unprofitable levels. Margins have also evaporated on generic phishing of bank In early 2011, that included malware spiked to 30% of all received, while phishers flocked to Website categories including games, health and medicine and portals. 3 CISO Guide to Next Generation Threats - 1
4 Websites and ebay. In search of profits, ever-resilient criminals have adapted their attack techniques from generic and indiscriminate to personalized and targeted. Attackers continue to pursue personally identifiable information, as demonstrated by the theft of addresses at Epsilon marketing, but now this information is used in targeted personalized s that lure businesses and consumers to click and download malware. Spam and spear phishing are the first salvo in a coordinated series of steps that result in successful network compromises and data theft. It s a spammer s fantasy come true. The criminal gets client addresses along with the names of companies those people do business with all you need for a targeted spear phishing attack They take over their corporate accounts and then use them to send spam often fake Skype or Adobe reader updates that actually contain malicious software. 4 The big cybercrime market opportunity today is for intellectual property (IP) and bank and enterprise credentials. The March 2011 theft of two-factor authentication data from RSA (a division of EMC) shows the strategic nature of these attacks: the intellectual property they stole from RSA could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack, 5 allowing criminals to break in at enterprises around the world Phishing and Zero Day Attack Back Door Lateral Movement Data Gathering Exfiltrate A handful of users are targeted by two phishing attacks; one user opens Zero day payload (CVE ) The user machine is accessed remotely by Poison Ivy tool Attacker elevates access to important user, service and admin accounts, and specific systems Data is acquired from target servers and staged for exfiltration Data is exfiltrated via encrypted files over ftp to external, compromised machine at a hosting provider Next-generation threats like the RSA attack use successive inbound and outbound stages RSA was hacked some time in the first half of March when an employee was successfully spear phished and opened an infected spreadsheet. As soon as the spreadsheet was opened, an advanced persistent threat (APT) a backdoor Trojan called Poison Ivy was installed. From there, the attackers basically had free reign of RSA s internal network, which led to the eventual dissemination of data pertaining to RSA s two-factor authenticators. 6 CISO Guide to Next Generation Threats - 2
5 These attacks, like the Operation Aurora source code thefts at Symantec, Google, Adobe, Intel and Morgan Stanley, have gone after IP. They used multiple stages and avenues to enter the network and navigate to the data that had value. Many of them incorporated personal data gleaned from social media, as well as zero-day vulnerabilities. The first item of value stolen was often access credentials. Stolen credentials can open the doors to administration of the database, Web or server. 7 If it is the CFO s credential, it can be the authentication required to take over and withdraw funds from the corporate bank account. An attacker who has compromised an account holder s PC can control every aspect of what the victim sees or does not see, because that bad guy can then intercept, delete, modify or re-route all communications to and from the infected PC. 8 From Big Business to Every Business Today s versatile, drag-and-drop toolkits allow criminals endless permutations of attack options, pursuing smaller businesses as the larger organizations improve their defenses. Every business has a bank account, a customer database, a product design, or some other asset of value. Even if no data is stolen, every compromised system can add free compute cycles to a spam botnet. 9 Criminals reuse successful techniques wherever they can turn a profit. Often, it s the same tactic, just a different avenue of attack. A Sophos survey of 2010 cybercrime showed social networking users started receiving more malware and spam. Two-thirds of respondents had experienced spam via social networks, and four out of 10 had received malware from these sites. Phishing attacks rose steeply from 30% to 43%, and new malware appears about once a second. 10 The Price of The Problem Enterprises pay a high operational price. Malware detection and analysis and incident response take up more than half of IT Security professionals time. 11 Malicious attacks were the root cause of 31 percent of the data breaches studied. This is up from 24 percent in 2009 and 12 percent in 2008, according to the 2011 Ponemon Cost of a Data Breach survey. What s more, these data breaches are the most expensive. Malicious attacks create more costs because they are harder to detect, the investigation is more involved, and they are more difficult to contain and remediate Malicious attacks are the root cause of an increasing percentage of data breaches. Source: Ponemon CISO Guide to Next Generation Threats - 3
6 How Next-Generation Threats Bypass Traditional Security Today s firewalls, IPS, antivirus, and Web gateways have little chance to stop attackers using zero-day, one-time-use malware and multi-stage, multi-application payloads. Traditional tools do a good job screening out the noise of known malware, legacy attacks and blacklisted URLs. They also enforce regulatory and governance policies for appropriate use of applications and resources, including the Internet. However, these tools primarily detect known threats. They must be augmented with dynamic, real-time analysis that detects breaking, unknown threats. Many zero-day and targeted threats penetrate systems by hiding newly minted, polymorphic dropper malware on innocent Web pages and in downloadable files like JPEG pictures and PDF documents. Or personalized phishing s send a carefully selected target a carefully researched, plausible-looking message and malicious attachment. Or tweets and social media posts include a shortened URL. Each time a victim visits the URL or opens the attachment, a rich payload installs on his computer. This code often includes exploits for multiple unknown plug-in, browser, application and OS vulnerabilities to ensure it gains a foothold on the system. Internet Explorer 6 on Windows XP? I have an exploit for that. How does advanced malware get past traditional barriers? Firewalls: Firewalls allow generic http Web traffic. Next-generation firewalls (NGFW) add layers of policy rules based on users and applications. NGFW consolidate traditional protections such as antivirus and IPS but do not add dynamic protection that can detect next-generation threat content or behavior. IPS: Signatures, packet inspection, DNS analysis and heuristics will not detect anything unusual in a zero-day exploit, especially if the code is heavily disguised or delivered in stages. Antivirus & Web malware filtering: Since the malware and the vulnerability it exploits are unknown (zero-day), and the Website has a clean reputation, traditional antivirus and Web filters will let it pass. The volume of vulnerabilities in browser plug-ins like Adobe and the exponential combinations of these browsers with operating systems make it hard for antivirus vendors to keep up. spam filtering: Spoofed phishing sites use dynamic domains and URLs, so blacklisting lags behind criminal activities. It takes more than two days to shut down the average phishing site. 13 Malicious code can also be carried in on laptops or USB devices, infecting a machine and spreading within the network. It is common for mobile systems to miss updates to DAT files and patches, so they are vulnerable to both known and unknown exploits. In general, even up-to-date machines can be infected using zero-day exploits and social engineering techniques, especially when the system is off the corporate network. Once in place, malware may replicate itself with subtle changes to make each instance look unique and disguise itself to avoid scans. Some will turn off antivirus scanners, reinstall after a cleaning, or lie dormant for days or weeks. Eventually, the code will phone home to the criminal for further instructions, a new payload or to deliver login credentials, financial data and other valuables. Many compromised hosts provide a privileged base so the criminal can explore further or expand his botnet with new victims. Most companies don t analyze outbound traffic for these malicious transmissions and destinations. Those organizations that do monitor outbound transmissions use tools that look for known bad actor addresses and regulated data. FireEye, CISO Inc. Guide to Next Generation Threats CISO Guide to Next Generation Threats - 4
7 Web Filtering: Most outbound filtering blocks adult content or time-wasting entertainment sites. Less than a quarter of enterprises restrict social networking sites. 14 In addition, dynamic URLs, hacks of legitimate Websites and addresses that are active for brief periods make static URL blacklisting obsolete. Data Loss Prevention (DLP): DLP tools were primarily designed for PII strings like social security numbers, license numbers, or health data and these tools are only as good as their rules. Most are too coarse-grained and cumbersome to detect exfiltration of credentials or intellectual property. Encryption of callback channels allows data to escape unseen. Their static approach does not match the dynamic nature of next-generation threats. Separate Acts vs. The Entire Show While these solutions improve every year, they share a fundamental problem. They witness separate acts in the cybercrime performance. One scans , one inspects exploits, another does file scanning for malware, another looks at URL blacklists. No single tool pulls it all together to watch the whole show: inspect multiple activities, find the common thread and understand the complete series of inbound and outbound communications that represents the entire attack. Plugging The Security Hole These shortcomings explain the success of a new category of threat prevention tools adapted to the resilient, evasive and complex nature of next-generation threats. This new generation of security systems complements traditional defenses by detecting and blocking the advanced malware, zero-day and targeted APT attacks that firewalls, IPS, antivirus and Web gateways cannot stop. By combining signatures to rule out the known, dynamic code execution to detect the unknown and real-time inbound and outbound protections, the next generation of security plugs the network hole left wide open in virtually every organization today. The world leader in fighting next-generation threats is FireEye. Companies around the world in virtually every industry have turned to FireEye to see the full picture of Internet activities, block callbacks that exfiltrate data and derail the communications of advanced persistent threats. Operating inline or out of band, FireEye malware prevention appliances perform automated, real-time analysis of software behavior. Anything that looks suspicious is executed in an instrumented enviroment where the system monitors activities from active memory up the stack to browser plug-ins. This full-fledged testing can confirm irrefutably the intention and activities of the attacker, zeroing in on real threats and avoiding false positives and false negatives. Once misbehaving code is flagged, its communication ports, IP addresses and protocols are blocked to shut down outbound transmissions. Analysts can use the fingerprint of the malicious code surgically, to identify and remediate compromised systems and prevent the infection spreading. Forensics researchers can run files individually through automated offline tests to confirm and dissect malicious code. Shared cloud-based threat intelligence keeps everyone up to date on the cybercrime innovations and callback destinations being identified at FireEye Labs and other customer sites. These turnkey Web and appliances deploy in under 30 minutes, with no rules to write or tune. And the purchase price starts at a tiny fraction of the cost of a data breach. 15 CISO Guide to Next Generation Threats - 5
8 Next Generation Security for Next Generation Threats Well-funded cyber criminals have adjusted their techniques from generic, opportunistic and scattershot to targeted, resilient and evasive. Enterprises of all sizes must reinforce their traditional defenses with next-generation threat prevention that understands the nature and intent of these malicious, zero-day and targeted attacks, especially those bearing the hallmark of the advanced persistent threat. Use FireEye s evaluation program to see the threats your current protections are missing. About FireEye is the leading provider of next-generation threat protection focused on combating advanced malware, zero-day and targeted APT attacks. FireEye s solutions supplement security defenses such as next generation and traditional Firewalls, IPS, AV and Web gateways, which can t stop advanced malware. These technologies leave significant security holes in the majority of corporate networks. FireEye s Malware Protection Systems feature both inbound and outbound protection and a signature-less analysis engine that utilizes the most sophisticated virtual execution engine in the world to stop advanced threats that attack over Web and . Our customers include enterprises and mid-sized companies across every industry as well as Federal agencies. Based in Milpitas, California, FireEye is backed by premier financial partners. 1 Over 95% of companies evaluating FireEye uncovered compromised hosts in their networks CyberSecurity Watch Survey, US Secret Service, CSO Magazine, Carnegie Mellon, Deloitte: CyberSecuritySurvey2011.pdf 3 Source: The hackers break in on a non-important system, which is very common in hacking situations, and leveraged (sic) lateral movement to get onto systems of interest over time. Greg Hoglund, shows increase from 25,000 bots to 180,000 bots in 12 months InformationWeek s 2010 Strategic Survey Source: Symantec, The Sophos survey stated, More than half of the companies surveyed imposed no limitations on accessing Facebook, Twitter and LinkedIn and less than a quarter of firms completely block these sites. sophos-security-threat-report-2011-wpna.pdf 15 In 2010, the cost of a data breach averaged $7.2 million; Learn more at The widening gap between hacker capabilities and security defenses has security organizations struggling 2011 All rights reserved. and all products are either trademarks or registered trademarks of to keep up with the changing nature, complexity, and scale of attacks. Other product and company names mentioned herein may be the trademarks of their respective owners. -- WP.CISO Forrester, McCarthy Blvd. Milpitas, CA FIREEYE ( ) [email protected]
Advanced Targeted Attacks
White Paper Advanced Targeted Attacks How to Protect Against the Next Generation of Cyber Attacks White Paper Contents Executive Summary 3 Nature of Next-Generation Threats 4 The Price of The Problem 6
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED CONTENTS Executive Summary...3 Nature of the New Generation of Threats...4 The Five
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
5 Design Principles for Advanced Malware Protection
White Paper 5 Design Principles for Advanced Malware Protection Winning the war against next-generation threats White Paper Table of Contents Executive Summary 1 Advanced Malware Defined 1 Understanding
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
SPEAR-PHISHING ATTACKS
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
The Custom Defense Against Targeted Attacks. A Trend Micro White Paper
The Custom Defense Against Targeted Attacks A Trend Micro White Paper Contents Executive Summary...3 The Anatomy of a Targeted Attack...4 The Reality and Costs of Targeted Attacks...5 Strategic Choices
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity 1 Contents Introduction 3 Threats Stealthy, Sophisticated & Successful 4 Operation Beebus 5 G20 Brisbane 2014 6 Redefining the Debate
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
Today s New Breed of Email-based Cyber Attacks and What it Takes to Defend Against Them
2 3 4 9 Spear Phishing: A Common Launch Point of Advanced Attacks Combatting the New Breed of Cyber Attacks: The Key Requirements Email Security Focus Shifts to Address the Risks of Targeted Attacks and
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
SECURITY REIMAGINED. FireEye Network Threat Prevention Platform. Threat Prevention Platform that Combats Web-based Cyber Attacks
SECURITY REIMAGINED FireEye Network Threat Prevention Platform Threat Prevention Platform that Combats Web-based Cyber Attacks D A T A S H E E T SECURITY REIMAGINED HIGHLIGHTS Deploys in-line (block/monitor
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management
A Websense Brief By Patrick Murray, Senior Director of Product Management Advanced Persistent Threats: From FUD to Facts With Websense, you can stay a step ahead of the threats. From our roots in web filtering,
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled
Understanding the Advanced Threat Landscape an MSPs Guide IT Security: Enabled 1.0 Cutting through the APT hype to help your clients prevent, detect and mitigate advanced threats Sophisticated cyber-espionage
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
TRITON APX. Websense TRITON APX
TRITON APX Unified protection and intelligence against Advanced Threats and data theft Your organization is faced with an increasing number of Advanced Threats that lead to data theft, denial of service
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time
Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Table of Contents Executive Overview 3 Relying on Prevention is Not Enough 4 Four Reasons
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Big Threats for Small Businesses
White Paper Big Threats for Small Businesses Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals White Paper Contents Introduction 3 Today s Attacks Target Small and Midsize
