Cisco RSA Announcement Update

Similar documents
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

IT Sicherheit im Web 2.0 Zeitalter

Cisco Security Intelligence Operations

The Hillstone and Trend Micro Joint Solution

Networking for Caribbean Development

Cisco & Big Data Security

Introducing IBM s Advanced Threat Protection Platform

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco Remote Management Services for Security

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Requirements When Considering a Next- Generation Firewall

Concierge SIEM Reporting Overview

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

SANS Top 20 Critical Controls for Effective Cyber Defense

Next Generation IPS and Reputation Services

Cisco Reputation Filtering: Providing New Levels of Network Security. Solution Overview

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Deploying Firewalls Throughout Your Organization

Architecture Overview

Cisco IPS Tuning Overview

Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices

Cisco Advanced Malware Protection

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

How Attackers are Targeting Your Mobile Devices. Wade Williamson

The Cisco ASA 5500 as a Superior Firewall Solution

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Cisco Cloud Web Security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Cisco Threat Defense for Borderless Networks

10 Things Every Web Application Firewall Should Provide Share this ebook

Protecting the Infrastructure: Symantec Web Gateway

IBM Security IBM Corporation IBM Corporation

Cisco Advanced Malware Protection for Endpoints

Extreme Networks Security Analytics G2 Vulnerability Manager

Cisco Small Business ISA500 Series Integrated Security Appliances

Q1 Labs Corporate Overview

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Cisco Advanced Malware Protection for Endpoints

What is Security Intelligence?

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

QRadar SIEM and FireEye MPS Integration

ENABLING FAST RESPONSES THREAT MONITORING

Modular Network Security. Tyler Carter, McAfee Network Security

Braindumps QA

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Advanced Threats: The New World Order

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Analyzing HTTP/HTTPS Traffic Logs

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

SourceFireNext-Generation IPS

Unified Security, ATP and more

IBM Security QRadar Vulnerability Manager

Endpoint Security: Moving Beyond AV

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Advantages of Managed Security Services

Symantec Endpoint Protection

ThreatSTOP Technology Overview

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

IndusGuard Web Application Firewall Test Drive User Registration

IBM Security Strategy

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

RSA Security Anatomy of an Attack Lessons learned

CCNA Security 2.0 Scope and Sequence

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Next-Generation Firewalls: Critical to SMB Network Security

Chapter 1 The Principles of Auditing 1

How To Prevent Hacker Attacks With Network Behavior Analysis

NASCIO 2015 State IT Recognition Awards

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

How To Create An Insight Analysis For Cyber Security

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Cisco ISR Web Security with Cisco ScanSafe

Symantec Endpoint Protection

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Unified Threat Management, Managed Security, and the Cloud Services Model

INFORMATION PROTECTED

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Intrusion Detection in AlienVault

How Cisco IT Protects Against Distributed Denial of Service Attacks

Internet Content Provider Safeguards Customer Networks and Services

Transcription:

Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco

Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of New Product Announcements ASA 8.2 with Botnet Traffic Filters IPS 7.0 and Global Correlation SAFE Architecture Best Practices Q&A

Current Situation The network perimeter and enterprise boundary are disintegrating Mobility and Web 2.0 are challenging security norms New security strategies are needed 3

A Seismic Shift 2000-2008: IT security products look deeper 2009: Cisco Security products look around and respond faster

Today s Threats Sophisticated, Constantly Mutating Each Attack Instance can be slightly different Domains are rotated in days, even hours Content mutates and mimics legitimate traffic and content

Command and Control Networked, Persistent 50% of attacks are by serial offenders 80% of spam is from infected clients 70% of bots use dynamic IP addresses

Collaborate with Confidence Securely Connect, Communicate, and Conduct Business Balance protection and enablement for secure collaboration Deploy pervasive security that uses the network as the platform Enable the safe delivery of services and content over a secure network to protected devices

Cisco Collaborate with Confidence Three Distinct Advantages Comprehensive Threat Intelligence End-to-End Security Business-Enabling Services Provide a Rich, Highly Secure Collaborative Experience Using the Network as the Platform

Cisco Collaborate with Confidence Unique Advantages and What s New? Comprehensive Threat Intelligence New! Global correlation for sophisticated analysis with Cisco IPS and the Cisco ASA with Botnet Traffic Filtering End-to-End Security Business-Enabling Services

Cisco Collaborate with Confidence Unique Advantages and What s New? Comprehensive Threat Intelligence End-to-End Security New! ASA 5505 with IPS for SMB and Branch offices New! AnyConnect Essentials VPN for secure mobile access Business-Enabling Services 10

Cisco Collaborate with Confidence Unique Advantages and What s New? Comprehensive Threat Intelligence End-to-End Security Business-Enabling Services New! SAFE reference security architecture with validated implementation designs

Cisco Security Intelligence Operations Cisco SensorBase Threat Operations Center Analytics and Algorithms Security Infrastructure That Dynamically Protect Against the Latest Threats Through: Cisco SensorBase The Most Comprehensive Vulnerability and Sender Reputation Database Threat Operations Center A Global Team of Security Researchers and Analysts Analytics and Algorithms Automatic Updates and Best Practices Powered by Global Correlation

Cisco Global Correlation SensorBase: World s Largest Traffic Monitoring Network LARGEST FOOTPRINT GREATEST BREADTH FULL CONTEXT ANALYSIS Cisco SensorBase

Cisco Global Correlation Unmatched Breadth LARGEST FOOTPRINT GREATEST BREADTH FULL CONTEXT ANALYSIS Email Security IPS Web Security Firewall Identifying a global botnet requires complete visibility across all threat vectors

Global Correlation Full Context Analysis: Seeing the Whole Picture LARGEST FOOTPRINT GREATEST BREADTH FULL CONTEXT ANALYSIS What? Content Who? Reputation of Counterparty How? Propagation & Mutation Methods Where? Geographic & Vertical Trends

Cisco IPS 7.0 Network IPS to Global IPS Coverage Twice the effectiveness of signature-only IPS Accuracy Reputation analysis decreases false positives Timeliness 100x faster than traditional signature-only methods IPS Reputation Filtering powered by Global Correlation

Defeating SQL Injection The Challenge of Traditional Signature-Based IPS What SIGNATURES Find Verdict: UNKNOWN What? SQL Command Fragments in Web Traffic

IPS Reputation Enables Protection Powered By Global Correlation What CISCO IPS Finds Verdict: BLOCK What? How? SQL Command Fragments in Web Traffic First HTTP connection Who? Where? Dynamic IP Address Dynamic DNS History of Web Attacks Within Heavily Compromised.Asia Network History of Botnet Activity Clean Sources Only

Global Correlation for Cisco IPS Dramatic Changes in Protection and Accuracy Deployed in networks around the world Hosting environments Large businesses Research labs Average Results Over Two Week Period Global Correlation is a huge step forward for IPS. Director of security, Top three Public Insurance Co.

Cisco IPS with Global Correlation Benefits Leveraging Comprehensive Threat Intelligence Decrease organizational risk of data theft stop attacks with increasing accuracy Lower operational cost increase security team productivity by automating threat response Optimize your existing IPS and/or ASA investments

Detecting Client Infections Botnet Traffic Filter on ASA 5500 Series Monitors malware traffic Scans all traffic, ports & protocols Detects infected clients by tracking rogue phone home traffic Highly accurate Identifies100,000s of malware connections per week Automatic DNS lookups of addresses Dynamic database integrated into Cisco Security Intelligence Operations Command and Control Cisco ASA Infected Clients

Botnet Stages of Attack Botnet Command and Control Execution Step 1: Infection Clients are infected by spyware, malware, and targeted attacks Step 2: Control Infected clients communicate with botnet command and control Step 3: Execution Attacks are launched: data harvesting, ID theft, DDoS, spam, and click fraud

Cisco Anti-Botnet Solution Defense in Depth BotNet Command and Control Execution Step 1: Protection Cisco Firewall, Intrusion Prevention Systems, Web Security Appliances, Email Security Appliances Step 2: Detection ASA BotNet Traffic Filter WSA Layer 4 Traffic Monitor Step 3: Remediation Cisco NAC

Cisco Botnet Traffic Filter Reports Top Botnet Sites, Ports and Infected Endpoints Live Dashboard Monitoring Integrated Reporting

Botnet Traffic Filter for Cisco ASA Customer Case Study Customer Network Healthcare provider in Illinois and Indiana Hospitals, long-term care and senior residential facilities, clinics, home health agencies Observed Destinations (1.6M connections in a month) vove.3322.org Ad Network Sites Pornography Sites (xxxvogue.net ) Ieplugin.com Found command and control and sites distributing adware, known malware Vove.3322.org Host associated with command and control for trojan Port 6010 Trojan masquerades as a Microsoft.NET Framework service Financial information sent back to command and control

Flexible VPN Licensing Shared VPN License VPN Flex License Affordable, flexible solution for short-term bursts of VPN users Emergency and pandemic usage Planned surges of concurrent users Two month tiered licenses Shared licenses among ASAs No wasted capacity Available for Active and load balanced configurations

Cisco SAFE Validated Security Designs and Technical Implementation Guides Fully tested architectures based on security best practices speed transition from concept to design and implementation Aligns security blueprints to key business initiatives (i.e. compliance and securing mobile users) Modules include: Data Center, Campus, Branch Office, Unified Communications, Secured Mobility and E-Commerce http://www.cisco.com/go/safe Empowered Branch 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27

SPECIAL OFFER Free 30-Day ASA Botnet Traffic Filter license to all event attendees BONUS First 5 customers to respond immediately following this webinar will get complimentary consultation from WWT to upgrade to ASA 8.2* Please submit your email request to: ashish.upadhyay@wwt.com or call 800-432-7008 x 2623 * Limited to 5 devices on a single network environment

Q&A

Helpful Links Cisco ASA: http://www.cisco.com/go/asa Cisco Botnet Filer http://www.cisco.com/en/us/prod/vpndevc/ps6032/ps6094/ ps6120/botnet_index.html Cisco IPS Solution: http://www.cisco.com/go/ips Senderbase: http://www.senderbase.org Collaborate with Confidence: http://www.cisco.com/en/us/solutions/ns170/cwc.html

Thank you for attending this Webinar!!