JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM



Similar documents
Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age

FIREWALL INTELLIGENCE. 1 Copyright 2014 Juniper Networks, Inc.

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Stop advanced targeted attacks, identify high risk users and control Insider Threats

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Fighting Advanced Threats

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

APPLICATION PROGRAMMING INTERFACE

Agenda , Palo Alto Networks. Confidential and Proprietary.

Combating the Next Generation of Advanced Malware

Content Security: Protect Your Network with Five Must-Haves

The Hillstone and Trend Micro Joint Solution

Advanced Persistent Threats

Next Generation IPS and Reputation Services

Advanced Threats: The New World Order

Cisco Advanced Malware Protection

McAfee Network Security Platform

Palo Alto Networks. October 6

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Advanced Threat Protection with Dell SecureWorks Security Services

Modular Network Security. Tyler Carter, McAfee Network Security

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

SECURITY 2.0 LUNCHEON

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Security strategies to stay off the Børsen front page

Moving Towards An Adaptive, Intelligent Firewall

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Unified Security, ATP and more

Reduce Your Network's Attack Surface

Practical Steps To Securing Process Control Networks

The Next Generation Security Operations Center

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security Strategy

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Countering Insider Threats Jeremy Ho

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Find the needle in the security haystack

I D C A N A L Y S T C O N N E C T I O N

Cisco Advanced Malware Protection for Endpoints

Breach Found. Did It Hurt?

Securing the endpoint and your data

WildFire. Preparing for Modern Network Attacks

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Analyzing HTTP/HTTPS Traffic Logs

Using SIEM for Real- Time Threat Detection

Cisco Advanced Malware Protection for Endpoints

End-user Security Analytics Strengthens Protection with ArcSight

Secure Cloud-Ready Data Centers Juniper Networks

Concierge SIEM Reporting Overview

QRadar SIEM and FireEye MPS Integration

RETHINK SECURITY FOR UNKNOWN ATTACKS

Whitepaper. Advanced Threat Hunting with Carbon Black

Defending Against Cyber Attacks with SessionLevel Network Security

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Carbon Black and Palo Alto Networks

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

McAfee Server Security

High End Information Security Services

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

AppGuard. Defeats Malware

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Bridging the gap between COTS tool alerting and raw data analysis

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Protection Against Advanced Persistent Threats

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

FROM PRODUCT TO PLATFORM

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Zscaler Internet Security Frequently Asked Questions

Defending Against Data Beaches: Internal Controls for Cybersecurity

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Security and Privacy

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

CyberArk Privileged Threat Analytics. Solution Brief

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

RSA Security Analytics

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Transcription:

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist

Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall Argon Secure: Emerging Threat Protection

Threat Actions Leading To Breaches Verizon Data Breach Investigations Report

The Malware Workflow Infection Wait for Commands Lateral Movement Data Exfiltration

Opportunistic Attacks Targeted Attacks Mind The Gap: Attack Sophistication Security Gap Current solutions fail to protect organizations from sophisticated, evasive attacks. Evasive Threats APT Solutions Persistent Threats Polymorphic Fluxing Packing C&C Plain Virus Antivirus Solutions Simple Threats Sophisticated Threats

Working Example

The Cockroach of Malware Source: US Federal Bureau of Investigations

The Cockroach of Malware Source: US Federal Bureau of Investigations

Zeus: A Modern Malware Case Study Infection Malicious Functions Persistence

Defense in Depth IPS Anti-Virus Sandboxing Application Visibility DDoS Compromised Host Detection Command & Control Web Security

Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall Argon Secure: Emerging Threat Protection

Spotlight Secure: Threat Intel Description Details Related SecIntel Feed Command & Control Disruption, Compromise Detection Block command & control connections Block botnet activity on network Identify and isolate internal infections Spotlight C&C Geo-based traffic shaping ID attackers with Precision ( Beyond the IP ) Rapid Incident Response & 3 rd Party Threat Intelligence Block traffic from specified countries Balance load by sending only specified traffic through additional security services Integrate web app protection with firewall Reduce FPs and stop roaming attackers by using non-ip identifier Utilize data in firewall policy that is licensed from 3 rd parties, consortia Enable rapid incident response Spotlight GeoIP Spotlight Fingerprints Custom Threat Feeds

Threat intelligence architecture Spotlight Secure Cloud Other threat intelligence GeoIP feed Command & Control Security Director Junos Space Spotlight Secure Connector Firewalls Open platform delivers more value Scalable to ensure full enterprise or service provider deployment Built for expansive data capacity Improved efficacy through threat scores and tuning Adaptive: from the data source, to data normalization, to enforcement at the firewall

Security Intelligence Architecture The Internet SRX Firewall Customer Infrastructure Internal Hosts Spotlight Secure Connector Security Director Security Intelligence lives inside the customer s network, leveraging existing infrastructure and adding the Connector component to access Juniper s Spotlight Secure data feeds and allow the customer to easily insert their own pertinent data.

Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall Argon Secure: Emerging Threat Protection

EMERGING THREAT PROTECTION Drive-by Attack SRX Command & Control Threat intelligence proactively delivered To Argon Secure Spotlight Cloud Scan traffic for (1) malicious content; (2) indicators of C&C and internal compromise Analyze objects (EXEs & DOCs) with highresolution analysis Inspection Deception 50+ techniques that tickle & deceive malware to reveal itself Correlation Aggregate/Correlate alerts & produce Actionable Intelligence ENFORCEMENT @ SRX Feedback for global threat intelligence

Intrusion Deception For Malware Deceive Malware, Disrupt the Kill Chain, Expose Suspicious Behavior Infection

Threat intelligence platform differentiators Open Consumes virtually any data feed Scalable Robust, scalable architecture supports thousands of of firewalls High capacity Adaptable Capacity for over 1m threats, including IP addresses, URLs, and domains Policy engine supports fine grain controls for prioritization and categorization of threats.

Thank you