Symantec Managed Security Services The Power To Protect



Similar documents
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Integrating MSS, SEP and NGFW to catch targeted APTs

Countering Insider Threats Jeremy Ho

Unified Security, ATP and more

Risk and threats everywhere, all the time

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Cyber Security Services: Data Loss Prevention Monitoring Overview

#ITtrends #ITTRENDS SYMANTEC VISION

Cybercrime Security Risks and Challenges Facing Business

Better Together: Microsoft Office 365 & Symantec Office 365

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Payment Card Industry Data Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Dealing with Big Data in Cyber Intelligence

Symantec Cyber Security Services: DeepSight Intelligence

Securing the endpoint and your data

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

The webinar will begin shortly

Security Business Intelligence Big Data for Faster Detection/Response

Symantec Security Information Manager 4.8 Release Notes

The Onslaught of Cyber Security Threats and What that Means to You

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Protection Center Enterprise 3.0. Release Notes

Teradata and Protegrity High-Value Protection for High-Value Data

Best Practices for a BYOD World

Find the needle in the security haystack

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

A Case for Managed Security

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Gregg Gerber. Strategic Engagement, Emerging Markets

RETHINKING CYBER SECURITY Changing the Business Conversation

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

UP L13: Leveraging the full protection of SEP 12.1.x

CKAHU Symposium Cyber-Security

ORGANIZADOR: APOIANTE PRINCIPAL:

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

ALERT LOGIC FOR HIPAA COMPLIANCE

Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s

1 Introduction Product Description Strengths and Challenges Copyright... 5

Identifying Cyber Risks and How they Impact Your Business

Protecting the Infrastructure: Symantec Web Gateway

I ve been breached! Now what?

INDUSTRY OVERVIEW: FINANCIAL

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

CyberArk Privileged Threat Analytics. Solution Brief

Perspectives on Cybersecurity in Healthcare June 2015

Secure Your Mobile Workplace

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

The Symantec Approach to Defeating Advanced Threats

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How To Get A Cloud Service For A Small Business

Protecting against cyber threats and security breaches

2015 TRUSTWAVE GLOBAL SECURITY REPORT

SentinelOne Labs. Advanced Threat Intelligence Report Predictions

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

IBM Security Strategy

The Impact of HIPAA and HITECH

Does your Citrix or Terminal Server environment have an Achilles heel?

IBM QRadar Security Intelligence April 2013

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Zak Khan Director, Advanced Cyber Defence

Securing and protecting the organization s most sensitive data

Web Protection for Your Business, Customers and Data

Facing Up to the Threats of Cyber A6acks in a 5G World

Caretower s SIEM Managed Security Services

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Internet threats: steps to security for your small business

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Cyber and Mobile Landscape, Challenges, & Best Practices

How to Choose the Right Security Information and Event Management (SIEM) Solution

Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)

KEY STEPS FOLLOWING A DATA BREACH

EY Cyber Security Hacktics Center of Excellence

McAfee Security Architectures for the Public Sector

The Oracle Mobile Security Suite: Secure Adoption of BYOD

On and off premises technologies Which is best for you?

24/7 Visibility into Advanced Malware on Networks and Endpoints

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Transcription:

Symantec Managed Security Services The Power To Protect Peter Sparkes Senior Director, Cyber Security Services Asia Pacific & Japan Symantec Managed Security Services Cyber Security Services 1

Expanding Boundaries Create Risk Everywhere Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance Advanced Persistent Attacks Symantec Managed Security Services Cyber Security Services 2

Requirements For Security Bank CEO Thwarts Breach Campaign A record number of security breaches is costing UK firms billions of pounds, according to a new survey. An average security breach costs a large UK firm in the range of 280,000 and 690,000, according to a biennial survey.. This is a massive jump from between 90,000 to 170,000 in 2008, when the survey was last conducted. Protect against Targeted Attacks, Advanced Threats and Campaigns Respond Quickly and Effectively to Credible Security Threats & Incidents Demonstrate Value of Security Spend and Improved Risk Posture Track Key Trends & Events and Analyze for Actionable Intelligence Symantec Managed Security Services Cyber Security Services

Managed Security Services Expert Security on a Global Scale Big Data Security Analytics 10 Trillion Log Lines (per year) Over 21K new events identified (per day) 13 million behavioral patterns analyzed to identify new emerging threats Security Intelligence 69M attack sensors 5M decoy accounts 8B+ email messages (Per day) 1B web requests (per day) World-Class Expertise 5 SOCs globally Over 1000 security experts on a global scale 100% GIAC certified SOC analysts Symantec Managed Security Services Cyber Security Services 7

Symantec BIG DATA Platform Tracks more than 13.8 Billion files Tracks more than 21.3 billion URLs FILES + MACHINES + URLs are viewed as a huge graph comprising of 152 billion nodes that expresses relations between them that drives our unique hygiene based ability to rate files and URLs Advanced machine learned predictive models (using this data) rates files and URLs We respond to more than 1 terabyte of queries per day to protect users from security risks Billions of metadata Tracked or Analyzed in real time We aggregate malware metadata information on our analytics platform from various internal and external sources that helps us accurately rate files and URLs. This is currently 150 Terabyte loaded into our DB. We have loaded a total of 2.1 trillion rows, growing monthly at the rate of 100+ billion rows Symantec Managed Security Services Cyber Security Services 5

Collection & Analysis Architecture DeepSight Global Threat Intelligence Security Analysts Customer Premise Log Collection Agent Data Warehouse Correlation Symantec SOC Customer Portal Symantec Managed Security Services Cyber Security Services 6

What did the SOC see in 2014 From major vulnerabilities to cyber espionage, Symantec MSS looks at what the past year has brought and what it means for the future. From large-scale data breaches to vulnerabilities in the very core foundation of the web, which threats are remnants from the past and which are indicators for what the future holds? - Discovery of Heartbleed and ShellShock Bash Vulnerabilities. - Co-ordinated Cyber Espionage and Potential Cyber Sabotage. - The lucrative business of stolen Credit or Debit cards, high profile POS attacks. - Ransomware & Cryptolocker Symantec Managed Security Services Cyber Security Services

SOC Statistics: Heartbleed Detection Spike First Heartbleed Detection was released on 8 th April 2014, by SNORT. Heartbleed CVE was classified on 7 th of April Snort Relea se on 8th From this point on, detections for Heartbleed started on the 4 th and spiked on the 12 th. This continued on for the next several months Copyright 2014 Symantec Corporation 8

First Heartbleed attacks recorded within 4-hours of disclosure 9

SOC Statistics - Attack on Media Industry 200 Threat Landscape -Attacks Against Media Industry 190 180 160 140 120 100 101 116 101 Symantec MSS noticed a sudden spike on attacks against the Media industry just before the G20 Summit. 80 60 40 20 25 71 39 56 81 G20 ( 15-16 Media outlets suggested that this was carried out by a state-sponsored group in China. 0 June July August September October November December January February 2014 2015 Total 25 71 39 56 81 190 101 116 101 Copyright 2014 Symantec Corporation 10

11% of incidents resulted in 59% of identities exposed (Retail) 37% of incidents resulted in 2% of identities exposed (Healthcare) 11

Ransomware / Cryptowall Current Variants CBT Locker Cryptowall 3.0 Delivered via E-mail campaigns as: Fake Postal Office Package Notification Fake Speeding Fine Fake Notice Upatre/Ponik Difference in C2 Methods CBT: Utilizes TOR Cryptowall 3.0: Hard-coded and obfuscated URLs Copyright 2014 Symantec Corporation Copyright 2014 Symantec 12 Co

SOC Statistics: Ransomware / Cryptowall MSS SOC have observed Ransomware campaigns frequently run between Monday to Wednesday of the week. Copyright 2014 Symantec Co 13

Thank you! Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Managed Security Services Cyber Security Services 14