Palo Alto Networks. October 6

Similar documents
How Attackers are Targeting Your Mobile Devices. Wade Williamson

Agenda , Palo Alto Networks. Confidential and Proprietary.

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

WildFire. Preparing for Modern Network Attacks

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

FROM PRODUCT TO PLATFORM

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Enterprise Security Platform for Government

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Next Generation Enterprise Network Security Platform

Unified Security, ATP and more

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Securing the Virtualized Data Center With Next-Generation Firewalls

Breaking the Cyber Attack Lifecycle

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Content-ID. Content-ID URLS THREATS DATA

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Networking for Caribbean Development

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

Integrating MSS, SEP and NGFW to catch targeted APTs

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Moving Beyond Proxies

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Next-Generation Firewall Overview

Analyzing HTTP/HTTPS Traffic Logs

Zak Khan Director, Advanced Cyber Defence

Advanced Security and Risk Management for Cloud and Premise environments

Palo Alto Networks Next-Generation Firewall Overview

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Carbon Black and Palo Alto Networks

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

A Modern Framework for Network Security in the Federal Government

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network

Next-Generation Firewalls: Critical to SMB Network Security

Using Palo Alto Networks to Protect the Datacenter

Palo Alto Networks Next-generation Firewall Overview

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Cisco Advanced Malware Protection for Endpoints

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Advanced Endpoint Protection

A Modern Framework for Network Security in Government

Protection Against Advanced Persistent Threats

BeyondInsight Version 5.6 New and Updated Features

Cisco Advanced Malware Protection

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

You ll learn about our roadmap across the Symantec and gateway security offerings.

Next-Generation Firewall Overview

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Firewall Testing Methodology W H I T E P A P E R

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH

Defending Against Cyber Attacks with SessionLevel Network Security

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cisco Advanced Malware Protection for Endpoints

AppGuard. Defeats Malware

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Palo Alto Networks Users Group. February 2014

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Getting Ahead of Malware

Content Security: Protect Your Network with Five Must-Haves

Deep Discovery. Technical details

APPLICATION PROGRAMMING INTERFACE

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Firewall Feature Overview

Cloud App Security. Tiberio Molino Sales Engineer

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Streamline PCI Compliance With Next-generation Security

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Content Inspection Features

SPEAR PHISHING AN ENTRY POINT FOR APTS

McAfee Network Security Platform

High Performance NGFW Extended

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

THREAT INTELLIGENCE CLOUD

Next-Generation Firewall Overview

The session is about to commence. Please switch your phone to silent!

Transcription:

Palo Alto Networks October 6

Agenda Malware Trends by the numbers Protect Locally Share Globally

Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2% 7.5% i.e. SharePoint IAN..15 APR..15 IUL..15

Decryption ~ 40% OF WEB MALWARE HAS BEEN DELIVERED OVER SSL DAY-TO-DAY IN 2015 50% 46.5% 43.5% 24% i.e. Webmail File hosting Social media IAN..15 APR..15 IUL..15

File Types EXE files are known to be toxic/malicious for years DLL files became more toxic last year APK files became more toxic last year Office documents with Macro s Office with embedded executable

AV is dead? OF MALWARE IS NOT DETECTED BY ANY ANTI-VIRUS VENDOR

Agenda Malware Trends by the numbers Protect Locally Share Globally

CONTENT USERS APPLICATIONS KNOW WHAT S ON YOUR NETWORK AT ALL TIME BASED ON APPLICATIONS, USERS, AND CONTENT Classify all traffic by application (layer 7) with App-ID Tie users and devices to applications, regardless of location, with User-ID Scan content and protect against all threats, both known and unknown, with Content-ID

Structural Reduction of Attack Surface Provide true visibility Enable business-relevant apps & users Known threats Prevention TCP 223 427 * Discover unknown threats End Point Prevention 83 UDP unknown OLD FW APP/USER VISIBILITY & CONTROL URL/AV/IPS /DNS APT SANDBOX PROTECT ENDPOINT SHARED THREAT INTEL AUTOMATED LOOPBACK PROTECTION INVESTIGATE THE RELEVANT

Zero-Day discovery with WildFire Advanced threat visibility and prevention on all traffic, all ports (web, email, ftp, etc.) including SSL Global intelligence and protection delivered to all users Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures Malware run in the cloud with open internet access to discover C2 protocols, domains, URLs and staged malware downloads Malware, DNS, URL, and C2 signatures automatically created based on WildFire intelligence and delivered to customers globally Stream-based malware engine performs true inline enforcement On-premises WildFire appliance available for additional data privacy Command-and-control Staged malware downloads Host ID and data exfil WildFire TM WildFire Users Soak sites, sinkholes, 3 rd party sources WildFire Appliance (optional) 32,000+ 7,500+ Customers NGFWs 10 2015, Palo Alto Networks. Confidential and Proprietary.

Agenda Malware Trends by the numbers Protect Locally Share Globally

Founding Members: Purpose: The Cyber Threat Alliance is a group of cyber security practitioners that have chosen to share threat information with each other for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers. 12 2014, Palo Alto Networks. Confidential and Proprietary.

Founding Members: Membership: Open to any organization that can share a minimum volume of threat intelligence designed by the Alliance. 13 2014, Palo Alto Networks. Confidential and Proprietary.

AutoFocus Palo Alto Networks Threat Intelligence Service

What AutoFocus provides Prioritize important events Context around indicators and incidents Quick and proactive response 223.144.191.23 Adversary Lotus Blossom Related indicators Connection: 101.55.121.171:443 DNS: gagalist.net Targets Government & Military Automatically export high-value indicator sets to security controls Prevent future attacks 15 2015, Palo Alto Networks. Confidential and Proprietary.

AutoFocus Architecture Intelligence with context 900M sessions 540M samples 110B artifacts WildFire TM Palo Alto Networks Threat Intelligence Cloud URL intelligence Dynamic DNS 60+ 3 rd party feeds WildFire intelligence correlated WildFire detects unknown threats on NGFW & Traps +32,000 devices worldwide 5M samples per day 70k unique malware per day 16 2015, Palo Alto Networks. Confidential and Proprietary.

Adding Context Intelligence on actors, campaigns and attack methods Context Analytics 17 2015, Palo Alto Networks. Confidential and Proprietary.

18 2015, Palo Alto Networks. Confidential and Proprietary.

19 2015, Palo Alto Networks. Confidential and Proprietary.