Advanced Threat Protection Framework: What it is, why it s important and what to do with it



Similar documents
High Performance NGFW Extended

Securing The Enterprise

Internal Network Firewall (INFW) Protecting your network from the inside out

CLOUD & Managed Security Services

Last Order Date (LOD) End of Order (EOO) ASM-ET4 Module 06/19/ /19/ /19/2016 ASM-FB4 ASM-FB4-G

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

The Fortinet Advanced Threat Protection Framework

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

FortiGuard Security Services

Fortinet Product Life Cycle Information Publication Date: August 26, 2015

The Evolution of the Enterprise And Enterprise Security

Fortinet Advanced Threat Protection- Part 3

How To Ensure Security In Pc Ds 3.0

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Data Center security trends

MSSP Advanced Threat Protection Service

WHITE PAPER SECURING DISTRIBUTED ENTERPRISE NETWORKS FOR PCI DSS 3.0 COMPLIANCE

Veranderende bedreigingen Security in het virtuele datacenter

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Fighting Advanced Threats

Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper

Agenda , Palo Alto Networks. Confidential and Proprietary.

Fortigate Features & Demo

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Datencenterlösungen Neues aus dem Bereich Security

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture

The Hillstone and Trend Micro Joint Solution

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

WHITE PAPER. Empowering the MSSP. Part 2: End To End Security Services Ecosystem

Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Networking for Caribbean Development

WHITE PAPER. Understanding How File Size Affects Malware Detection

Unified Threat Management, Managed Security, and the Cloud Services Model

Next-Generation Firewalls: Fact and Fiction Frequently Asked Questions FAQ

BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15

WHITEPAPER. Assessment Readiness for Payment Card Industry Data Security Standard (PCI DSS v1.2) Compliance

Anti-exploit tools: The next wave of enterprise security

How To Secure Your Store Data With Fortinet

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Planning a Successful NGFW Migration

Reduce Your Network's Attack Surface

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

SANS Top 20 Critical Controls for Effective Cyber Defense

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Fortinet Reports Strong Third Quarter 2015 Financial Results. Record billings growth of 41% year over year

Achieve Deeper Network Security

Advanced Threats: The New World Order

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

Defending Against Cyber Attacks with SessionLevel Network Security

Achieve Deeper Network Security and Application Control

Modular Network Security. Tyler Carter, McAfee Network Security

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Protecting Your Organisation from Targeted Cyber Intrusion

One Minute in Cyber Security

Cisco Advanced Malware Protection

AppGuard. Defeats Malware

High performance security for low-latency networks

Audit Readiness for Payment Card Industry Data Security Standard (PCI DSS) Compliance

Keeping the Store Open: Fighting the Cyber Criminal in the Retail World

Windows Server 2003 End of Support. What does it mean? What are my options?

SECURITY 2.0 LUNCHEON

High Performance Network Security

The Protection Mission a constant endeavor

Building A Secure Microsoft Exchange Continuity Appliance

FortiManager Centralized Device Management

IBM Security re-defines enterprise endpoint protection against advanced malware

Fortinet Product Quick Guide

Stop advanced targeted attacks, identify high risk users and control Insider Threats

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Sygate Secure Enterprise and Alcatel

Deep Security Vulnerability Protection Summary

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Unknown threats in Sweden. Study publication August 27, 2014

Network Control Meets Endpoint Security

FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0

Transcription:

Advanced Threat Protection Framework: What it is, why it s important and what to do with it Doug Manger, Senior Security Engineer dmanger@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved.

Agenda Security Concepts Common elements of sophisticated attacks Key technologies and services recommended to address each element How they can all fit together as part of a cohesive security framework Additional learning resources Q&A 2

Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 3

Question 1: What is a Botnet and/or C&C? A botnet is network of computers that have been compromised with malware. Botnets are normally leveraged by command and control (C&C) servers to execute distributed attacks. Examples: Mariposa Conficker Zeus BredoLab 4

Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 5

Question 2: What is an Advanced Persistent Threat? An Advanced Persistent Threat is a sophisticated, sustained, longterm attack/breach that remains undetected. An ATP is regularly executed against businesses and or nations for financial or political reasons. ATPs are of paramount concern for all organizations due to the grave impact they present. Examples: Heartbleed Shellshock Stuxnet Poodle 6

Security Concepts 1. What is a Botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 7

Question 3: What is Sandboxing? Sandboxing is the isolation and relegation of malware and/or other nefarious payloads in a virtualized operating system so as to limit/stop their propagation within an environment. Sandbox components: Isolated, Virtual Operating Systems Extensive threat detection engine Expedient, but thorough inspection Dedicated security services backend Cost-effective 8

Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 9

Question 4: What is a Next Generation Firewall (NGFW)? A Next Generation Firewall is a secure, multi-faceted network platform that adds a variety of filtering functions to the common firewall. This includes: Web Content Filtering Application Visibility/Control Intrusion Detection/Prevention Data Loss Prevention Anti-Virus/Spam Deep Inspection for SSL/SSH 10

Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 11

Question 5: What is a security framework? A security framework is a layered management tool that defines the practices that are required for an organization maintain its highest possible level of security. Components: Access Control Threat Detection/Prevention Incident Response Continuous Monitoring Continuous Learning 12

Security Concepts 1. What is a botnet and/or C&C? 2. What is an Advanced Persistent Threat? 3. What is Sandboxing? 4. What is a Next Generation Firewall (NGFW)? 5. What is a security framework? 6. What are your security plans? 13

Question 6: Do you have an active project in the next 6 months to increase security from advanced malware/sophisticated threats? Yes, I have a firewall upgrade project to move to NGFW Yes, I have a new project to deploy a stand-alone sandbox Yes, I have another type of project designed to increase security No, but I do have such a project later this year Not at this time/unsure 14

Advanced Malware/Sophisticate Threats a Top Concern 15

Microsoft Security Advisory 2963983- IE Vulnerability Cybercriminal Step 1: email links to malicious page page exploits vulnerability to run code Step 2: code reaches out to download URL file enters network and installs 16

Microsoft Advisory 2963983- Security Recommendations Step 1: Cybercriminal email links to malicious page page exploits vulnerability to run code Step 2: Don t use IE/Flash Turn on MSFT EMET Update IPS to prevent exploit Update web filter to block site Patch when available code reaches out to download URL file enters network and installs 17

Target Data Breach Cybercriminal Step 1: steal vendor credentials to access network Step 5: continue for weeks Step 2: access PoS to install code Step 4: stage and deliver to ftp Step 3: seek out other data, including guest db 18

Target Data Breach- Security Recommendations Cybercriminal Step 1: steal vendor credentials to access network Require 2FA Step 5: continue for weeks DLP C&C blocking Advisories Step 2: access PoS to install code Deeper inspection/ Advanced detection Step 4: stage and deliver to ftp Step 3: seek out other data, including guest db 19

At a fundamental level, there are key commonalities Step 1: Seek Entry Cybercriminal Step 5: Persist and Morph Step 2: Install & Communicate Step 4: Exfiltrate data Step 3: Move Laterally 20

Fortinet Recommends a Cohesive Approach Cybercriminal Access Control Threat Prevention Continuous Monitoring Threat Detection Incident Response 21

Applying the Framework- IE Vulnerability Continuous Monitoring Incident Response Threat Prevention Access Control Stay abreast of the threat landscape Don t use IE/Flash Turn on MSFT EMET Update IPS to prevent exploit Update web filter to block site Patch when available 22

Applying the Framework- Target Corporation Data Breach Access Control Threat Prevention Threat Detection Incident Response Continuous Monitoring Require 2FA Perform deeper inspection Block C&C Deploy DLP Perform advanced detection Be prepared to respond Monitor advisories/landscape 23

Fortinet s Advanced Threat Protection Framework Access Control -Firewall -2 Factor Authentication -Vulnerability Management Continuous Monitoring -Reporting -Threat research -SIEM/Log Mgt/Intelligence Service partners Threat Prevention -IPS, App Control - Deep Flow Antimalware -Email/Web Filter - Antibot Threat Detection -Sandbox -Network behavoral analysis -Client reputation -Botnet reporting Incident Response -Security Services - Device Quarantine - Security Updates 24

Which of the following technologies would you add first? Strong authentication to the network More threat prevention in more places New threat detection at key spots New incident response tools/services More monitoring/intelligence tools/services 25

Recap/Q&A Sophisticated attacks are beating traditional defenses While there are many effective new tools to help address these threats, Fortinet cautions there is no one silver bullet Rather, organizations are encouraged to establish a cohesive approach, combining technologies within an extensible framework 26

Q&A/Additional Resources IE Vulnerability http://blog.fortinet.com/post/first-end-of-support-windows-xp-internet-explorer-vulnerabilitydiscovered Target Data Breach http://www.fortinet.com/webinars/target-data-breach-what-we-can-all-learn-it.html Fortinet Advanced Threat Protection Framework http://www.fortinet.com/solutions/advanced-threat-protection.html 27

A Global Leader in Network Security Global presence and customer base Customers: 210,000+ Units shipped: 1.7+ Million Offices: 30+ worldwide Revenue $615M Platform Advantage built on key innovations FortiGuard: industry-leading threat research FortiOS: tightly integrated network + security OS $13M 2003 2013 FortiASIC: custom ASIC-based architecture Market-leading technology: 177 patents, 146 pending Founded 2000, 1 st product shipped 2002, IPO 2009 HQ: Sunnyvale, California Employees: 2700+ worldwide Cash $843M Consistent growth, gaining market share Strong positive cash flow, profitable $16M 2003 2013 28

End-to-End Security Solutions FortiBalancer FortiADC Coyote Point FortiVoice FortiManager FortiAnalyzer FortiBridge FortiCamera High End FortiGate-5000 & 3000 Series Mid Range FortiGate-1000 to 100 Series Desktop FortiGate/FortiWiFi-90 to 20 Series FortiDNS FortiScan FortiAP FortiSandbox FortiCloud FortiSwitch FortiDDoS FortiClient FortiAuthenticator FortiToken FortiMail FortiCache 29 FortiWeb FortiDB

Thank you! Doug Manger, CISSP Senior Security Engineer dmanger@fortinet.com 30