What s Next for Network Security - Visibility is king! Gøran Tømte March 2013



Similar documents
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

PALO ALTO SAFE APPLICATION ENABLEMENT

Next Generation Enterprise Network Security Platform

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

FROM PRODUCT TO PLATFORM

Agenda , Palo Alto Networks. Confidential and Proprietary.

Securing the Virtualized Data Center With Next-Generation Firewalls

Palo Alto Networks. October 6

Content-ID. Content-ID URLS THREATS DATA

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

Advanced Security and Risk Management for Cloud and Premise environments

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

WildFire. Preparing for Modern Network Attacks

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Palo Alto Networks Overview

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

Next-Generation Firewall Overview

How Attackers are Targeting Your Mobile Devices. Wade Williamson

A Modern Framework for Network Security in the Federal Government

Using Palo Alto Networks to Protect the Datacenter

Moving Beyond Proxies

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Next-Generation Firewall Overview

Firewall Feature Overview

Breaking the Cyber Attack Lifecycle

Next-Generation Firewall Overview

APERTURE. Safely enable your SaaS applications.

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Palo Alto Networks - Next Generation Firewall. Contents

REPORT & ENFORCE POLICY

Critical application visibility and control with Palo Alto Networks

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

Networking for Caribbean Development

High Performance NGFW Extended

Next Generation Firewalls and Sandboxing

Things Your Next Firewall Must Do

Still Using Proxies for URL Filtering? There s a Better Way

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

The Hillstone and Trend Micro Joint Solution

Palo Alto Networks In The Data Center: Eliminating Compromise. May 2011

Palo Alto Networks Next-Generation Firewall Overview

Streamline PCI Compliance With Next-generation Security

SourceFireNext-Generation IPS

Deployment Guide for Citrix XenDesktop

Modern Malware: Tactics & Countermeasures

On and off premises technologies Which is best for you?

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Enterprise Security Platform for Government

Next-Generation Firewalls: Critical to SMB Network Security

Network Security Solution. Arktos Lam

Firewall Testing Methodology W H I T E P A P E R

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Network protection and UTM Buyers Guide

FIREWALL BUYERS GUIDE

NGFWs will be most effective when working in conjunction with other layers of security controls.

Build a cloud network leveraging best-in-class security and application delivery

Guideline on Firewall

Carbon Black and Palo Alto Networks

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

June Palo Alto Networks 3300 Olcott Street Santa Clara, CA

Achieve Deeper Network Security and Application Control

A Modern Framework for Network Security in Government

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Palo Alto Networks Next-generation Firewall Overview

Next-Generation Firewalls: CEO, Miercom

Protecting the Infrastructure: Symantec Web Gateway

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The Application Usage and Threat Report

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

ENABLING FAST RESPONSES THREAT MONITORING

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Defending Against Cyber Attacks with SessionLevel Network Security

Monitor Network Activity

Palo Alto Networks. Re-Inventing Network Security. It s Time To Fix The Firewall?! Christian Etzold Senior System Engineer

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

How To Bring In Palo Alonnetworks

Monitor Network Activity

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Data Center security trends

Achieve Deeper Network Security

Transcription:

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesn t address applications UTM Internet IPS DLP IM AV URL Proxy Enterprise Network 2 2012, Palo Alto Networks. Confidential and Proprietary.

Applications Have Changed, Firewalls Haven t Network security policy is enforced at the firewall Sees all traffic Defines boundary Enables access Traditional firewalls don t work any more 4 2012, Palo Alto Networks. Confidential and Proprietary.

Core functions of a next-generation firewall 1. Identify applications regardless of port, protocol, evasive tactic or SSL 2. Identify and control users regardless of IP address, location, or device 3. Protect against known and unknown application-borne threats 4. Fine-grained visibility and policy control over application access / functionality 5. Multi-gigabit, low latency, in-line deployment 5 2012, Palo Alto Networks. Confidential and Proprietary.

Making the firewall a business enablement tool Applications: Enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats, both known and unknown, with Content-ID and WildFire. 6 2012, Palo Alto Networks. Confidential and Proprietary.

All Apps, All ports, All users, All the time Signature, protocol and evasive tactic based App-ID Skype Bittorrent, p2p SSL Etc 9 2012, Palo Alto Networks. Confidential and Proprietary.

The unknown! Scary hah? Unknown applications Control them Unknown users Control them Unknown threats Control them 10 2012, Palo Alto Networks. Confidential and Proprietary.

Addressing Modern Malware

Malware Sample Count Daily Coverage of Top AV Vendors 100% 90% Daily AV Coverage Rates for Newly Released Malware (50 Samples) 80% 70% 60% 50% 40% 30% 5 vendors 4 vendors 3 vendors 2 vendors 1 vendor 0 vendors 20% 10% 0% Day-0 Day-1 Day-2 Day-3 Day-4 Day-5 Day-6 New Malware Coverage Rate by Top 5 AV Vendors 12 2012, Palo Alto Networks. Confidential and Proprietary.

The lifecycle of network attacks 1 2 3 4 5 Bait the end-user End-user lured to a dangerous application or website containing malicious content Exploit Infected content exploits the end-user, often without their knowledge Download Backdoor Secondary payload is downloaded in the background. Malware installed Establish Back-Channel Malware establishes an outbound connection to the attacker for ongoing control Explore & Steal Remote attacker has control inside the network and escalates the attack 13 2012, Palo Alto Networks. Confidential and Proprietary.

Coordinated Threat Prevention An integrated approach to threat prevention Bait the end-user Exploit Download Backdoor Establish Back-Channel Explore & Steal App-ID Block high-risk apps Block C&C on nonstandard ports URL Block known malware sites Block malware, fastflux domains IPS Spyware AV Block the exploit Block malware Block spyware, C&C traffic Coordinated intelligence to detect and block active attacks based on signatures, sources and behaviors Files Prevent drive-bydownloads WildFire Detect unknown malware Block new C&C traffic 14 2012, Palo Alto Networks. Confidential and Proprietary.

Attempted Malware Infections Real-World Spread of 0-Day Malware 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 15 2012, Palo Alto Networks. Confidential and Proprietary. Hours Analysis of 50 0-Day malware samples Captured by WildFire in live customer networks Tracked the spread and number of infections by hour following the initial infection

Attempted Malware Infections Real-World Spread of 0-Day Malware 10000 9000 8000 WildFire Subscription 7000 6000 5000 4000 3000 2000 1000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 16 2012, Palo Alto Networks. Confidential and Proprietary. Hours In the 1 st two days malware is released, 95% of infections occur in the first 24 hours

WildFire Architecture 10 Gbps Threat Prevention and file scanning All traffic, all ports Web, email, FTP and SMB Running in the cloud lets Malware the malware signatures do things that developed you wouldn t and allow tested in your based network. on malware payload. Updates to sandbox logic without impacting the Stream-based customer malware engine to perform true inline enforcement. 17 2012, Palo Alto Networks. Confidential and Proprietary.

Malware Visibility and Logging 18 2012, Palo Alto Networks. Confidential and Proprietary.

1,300+ 417,448 COMPANIES USING WILDFIRE UNIQUE FILES SCANNED IN JAN WILDFIRE 28,612 13,233 (46%) NEW MALWARE FILES FOUND IN JANUARY USING WILDFIRE 2013 Palo Alto Networks. Proprietary and Confidential. MALWARE NOT INITIALLY DETECTED BY TOP HOST AV PRODUCTS

33 2012, Palo Alto Networks. Confidential and Proprietary. Palo Alto Networks in the DataCenter

Enabling Applications, Users and Content Applications: Safe enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting Page 35 2012 Palo Alto Networks. Proprietary and Confidential.

Data Center Evolution Page 36 2012 Palo Alto Networks. Proprietary and Confidential.

Many Third Parties Reach Same Conclusion Gartner Enterprise Network Firewall Magic Quadrant Palo Alto Networks leading the market Forrester IPS Market Overview Strong IPS solution; demonstrates effective consolidation NetworkWorld Test Most stringent NGFW test to date; validated sustained performance NSS Tests IPS: Palo Alto Networks NGFW tested against competitors standalone IPS devices; NSS Recommended Firewall: Traditional port-based firewall test; Palo Alto Networks most efficient by a wide margin; NSS Recommended NGFW: Palo Alto Networks provides the best combination of protection, performance, and value; NSS Recommended (1 of only 3 NGFW recommended) 44 2012, Palo Alto Networks. Confidential and Proprietary.

Say no more!!! Leaders quadrant in the leaders quadrant A crisp focus on enterprise NGFW features and messaging is viewed positively by firewall operators in enterprises. Most firewall vendor road maps are following the Palo Alto Networks NGFW road map, placing these vendors at a competitive disadvantage. 45 2012, Palo Alto Networks. Confidential and Proprietary.

Next Generation Customer meeting, Ultimate Test Drive Ultimate Test Drive En halv dags «hands-on» En PA-200 trekkes blant deltagerne Audi driving school trekkes en gang hvert kvartal 47 2012, Palo Alto Networks. Confidential and Proprietary.

Thank You Page 48 2010 Palo Alto Networks. Proprietary and Confidential.