FIREEYE CYBER ADVANCED SECURITY SOLUTIONS FOR NEW BREED CYBER ATTACKS

Similar documents
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Beyond the Hype: Advanced Persistent Threats

CYBER SECURITY, A GROWING CIO PRIORITY

External Supplier Control Requirements

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Combating a new generation of cybercriminal with in-depth security monitoring

Cyber Security Management

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

The Four-Step Guide to Understanding Cyber Risk

Vulnerability Assessment & Compliance

Building a Business Case:

Spear Phishing Attacks Why They are Successful and How to Stop Them

Cybersecurity and internal audit. August 15, 2014

WRITTEN TESTIMONY OF

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

How To Protect Your Network From Attack From A Network Security Threat

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Breaking the Cyber Attack Lifecycle

A Case for Managed Security

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

A New Approach to Assessing Advanced Threat Solutions

SPEAR-PHISHING ATTACKS

Application Security in the Software Development Lifecycle

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Persistence Mechanisms as Indicators of Compromise

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

RETHINKING CYBER SECURITY

CyberArk Privileged Threat Analytics. Solution Brief

2012 Endpoint Security Best Practices Survey

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

IBM Global Small and Medium Business. Keep Your IT Infrastructure and Assets Secure

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Anti-exploit tools: The next wave of enterprise security

Energy Cybersecurity Regulatory Brief

ALERT LOGIC FOR HIPAA COMPLIANCE

Cybernetic Global Intelligence. Service Information Package

The Cyber Threat Profiler

McAfee Server Security

Advanced Threat Protection with Dell SecureWorks Security Services

External Supplier Control Requirements

Securing Your Business with DNS Servers That Protect Themselves

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

End-user Security Analytics Strengthens Protection with ArcSight

Design Your Security

Information Security Services

Protecting against cyber threats and security breaches

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Agenda , Palo Alto Networks. Confidential and Proprietary.

The Key to Secure Online Financial Transactions

Cyber Risks and Insurance Solutions Malaysia, November 2013

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Content Security: Protect Your Network with Five Must-Haves

The Advantages of Security as a Service versus On-Premise Security

Internet threats: steps to security for your small business

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Enterprise Cybersecurity: Building an Effective Defense

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

Security Intelligence

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Address C-level Cybersecurity issues to enable and secure Digital transformation

AUTOMATED PENETRATION TESTING PRODUCTS

Advanced Cyber Threats in State and Local Government

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Protect Your Business and Customers from Online Fraud

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Transcription:

White Paper FIREEYE CYBER ADVANCED SECURITY SOLUTIONS FOR NEW BREED CYBER ATTACKS FireEye www. Fireeye.com

Executive summary This white paper presents the advanced security solutions designed by FireEye to protect organizations like yours from the new generation of cyber-attacks. FireEye has thousands of customers from more than 40 countries, including more than 20% of the Fortune 500. [xii] Traditional defenses mainly focus on known cyber threats while FireEye can provide real-time, dramatic threat protections against unknown threats. The purpose of this white paper is to introduce a new approach to protect your business as well as value gain. Cyber security has become the biggest concern for web-based companies in recent years. Cyber attackers have been working intensely to break into systems, looking for private data and information. Breaches of information system can be the trigger of destroying a company reputation. For long-term development, cyber security issues cannot be ignored. Many big companies are willing to spend millions of dollars on cyber security because this necessary cost is negligible comparing with the tremendous loss after one cyber-attack. For the past ten years, FireEye has guarded its customers against new breed cyber-attack and has provided unique customized services to the companies who highly rely on their cyber security. With its advanced security solutions and top security experts, FireEye has received valuable positive feedbacks from its customers and win annually the prestigious technology innovation awards. [xix] FireEye provides comprehensive services on cyber security. It can shield your data center, stop attacks via mobile devices, get fast malware analysis, block malicious file or provide local authentication. FireEye Platform Benefits: FireEye Multi-Vector Virtual Execution (MVX) engine can detect malicious code with different potential environmental variable Hardened proprietary hypervisor can execute automated malware analysis Multi-flow analysis can find malicious code missed by basic file inspection FireEye System Health Monitoring Report can score your security status Real-Time Protection can share suspicious attacks on real-time basis by using the powerful FireEye DTI cloud. [xx] You can enjoy the easy-to use integrated services of detection, analysis, monitoring and solution provided by FireEye to guard your network and data. FireEye is highly-adaptable, so it can be convenience to install without affect your current system. Its detection rate is 99.14% which is much higher than the average detection rate in cyber security industry. Besides, you can use the FireEye System Health Monitoring Report to improve your system s performance and make your security system more robust to defense future attacks. The existing Anti-virus software have an average detection rate less than 5% to new virus, which are vulnerable and outdated. To defense your organization s reputation and secure your data, you will need an updating security system. Otherwise, it is completely wasting your time and money. As the malicious cyber-attacks have been escalated recently that the existing defenses are not powerful enough to stop such attacks. FireEye is doing research on new technologies to fight against cyber-attacks and commit to serve our customers best interest more professionally and efficiently.

Introduction Cyber Security: Challenges/Problems How much does your data cost? Businesses store endless amounts of data ranging from internal organization s data to customer information. Small, medium, and big companies face the same cyber-attacks and threats. [iii] What is a cyberattack? A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. [xiv] Cyber attacks are not only damaging the reputation of the company, but they are also costly. The statistic shows the amount of damages caused by cyber crime reported from 2001 to 2013. In 2001, the annual total loss of complaints reported approximately 17.8 million U.S. dollars and grew to 781.84 million U.S. dollars in 2013, as shown in Figure 1. [iv] There are two categories of cybercrime: one that targets computers or network directly such as attacks, malware, and viruses; another one uses social engineering to perform fraud and identity theft. [ix] As of June 2014, 23% of annualized costs caused by cyberattacks were due to malicious code and 18% of those costs were caused by denial of service, as shown in Figure 2. [v]

Market Driver In recent years, breaches of information systems have become increasingly common, causing widespread concern over the safety of private company data and personal information of customers. The immense amount of data produced and stored by businesses around the world is a gold mine for hackers. As businesses continue to implement new technology to improve their operations, cyber attackers will increase their attempts to infiltrate the systems of businesses to gain access to that data. During the holiday season of 2013, Target was hit by a major cyberattack that compromised 40 million debit and credit cards in addition to 70 million names, addresses, emails, and phone numbers. Attackers were able to steal this information by installing malware into Target s security and payments system, enabling them to capture credit and debit card number when scanned at the register. Target spent $61 million responding to the breach and saw sales in the following holiday season drop by 46 percent [xvi]. Following the crisis faced by Target, JP Morgan Chase & Co. s computer servers were breached in what would be the largest cyberattack on a bank in history. Approximately 76 million households and 7 million small businesses were affected by the breach. Hackers were able to gain access to names, addresses, phone numbers, and emails of customers. In response to the attack, JP Morgan is spending $250 million on cybersecurity [xviii]. In addition to the Target and JP Morgan Chase & Co., hackers were able to breach the information systems of Neiman Marcus, Home Depot, and Michael s, compromising the credit and debit cards of millions of customers. As a result of these breaches, customers are concerned

that their personal information is at risk and are questioning whether or not companies have taken the necessary precautions to protect their systems from cyberattacks [xviii] According IBM, there were 1.5 million monitored cyberattacks in 2013 alone. With the increasing use of cloud computing, wireless networks, and mobile devices to move data, these attacks will only increase [xii]. IBM expects a 12% year-to-year increase in security events and in Cisco s 2014 annual security report, Cisco s IntelliShield showed a 14% increase in threat alerts from 2012 to 2013 [ii]. In order to protect themselves from future attacks, businesses need to invest in effective, thorough, and strong security measures. If left without adequate protection, the information systems of businesses can be breached by attackers, compromising sensitive business information and customer information. Such attacks can leave businesses at a major loss. Solutions Why is it important to protect your network and data? To defend your company's reputation to maintain public trust and confidence in your company to protect against legal liability to secure your customers' sensitive data What FireEye can do for you FireEye has top security experts with the most advanced technology and latest knowledge working 24/7 to monitoring your systems and networks. With this combination, you have the best tools to identify, prevent, examine, and find a solution of the attacks quickly compared to the traditional approaches. [vi] Data Center Security o Your data centers store tremendous of sensitive information about your organization and customers. As the amount of data increase, the threats against them also increase. o Why our data center security solutions: Shield data centers from advanced persistent threats and sophisticated malware found in content stores, web and application servers, and common file shares [v] Stop attacks entering centers via mobile devices and portable storage [v] Receive on-target analysis to pinpoint possible gaps that need addressing [xiv] Protect your key assets and prevent attacks with products and services that work together [v] Prevent attacks with an adaptive cyber security strategy [v] Safeguard your organization from attacks that use web servers and other data center infrastructure to host malware [v] Detect threats quickly to reduce lag time before resolution [v] Get reliable, fast malware analysis with our patented Multi-Vector Virtual Execution engine [v]

Provide continuous, dynamic, non-disruptive resolution to incidents [v] The FireEye Network Security NX series enable organizations to prevent, detect, and respond to exploit attempts, web downloads, and advanced malware that routinely bypass conventional defenses [ix] o Achieve a detection rate of 99.14% by Delta Testing [i] o Monitor, detect, and block malicious files, web and email threats o Perform daily analyses and reports back to your host servers o Respond quickly to prevent attacks, fraud, and identity theft

Preventing a Cyber Attack: Customer Examples Since 2004, FireEye has provided cyber security solutions to dozens of banks. In this section, we are going to discuss in detail about how we helped the Citizens Bank of Texas, Finansbank and the Bank of Thailand prevent Cyber Security Attacks. Citizens Bank of Texas Citizens Bank of Texas is the third largest independent bank in Teas with over 150 employees and over $550 million in assets [vii]. the challenges that the bank faced were that Maintain its commitment to protecting sensitive client data against increasingly sophisticated Web-based attacks Identify a proactive and preventative approach to handling threats that addresses shortcomings in existing security portfolio Protect against attacks launched from Web browsing and malicious URLs in email messages Avoid impact to employee productivity caused by having to take desktop devices offline to resolve security issues After accessing the Citizens Bank of Texas challenges, implementing the FireEye Web Malware Protection system would be the best solution to fix the Citizens Bank of Texas challenges. The benefits that the FireEye Web Malware Protection system provided are that it proactively detects malicious threats without the need to take employees offline. In addition, the solution would detect web- based and email weakness before the attack could happen. Here was the feedback that s we received from the Citizen Bank after we implemented our solution.. According to Wade Jones, CIO of Citizens Bank of Texas, FireEye s Solution was immediately evident and we felt that FireEye Web Malware Protection System represented the final piece in the puzzle to lock down our infrastructure [vii]. Additionally, Jones told FireEye that the solution detected embedded malware and immediately started blocking approximately 200 callbacks. If any of these reached their intended target they could have severely compromised the banks system [vii]. Finansbank Finansbank is a TurkishBank that has a broad array of subsidiaries such as asset management, information technology and financial applications. The challenges that this bank faced were that Detect and mitigate Web-based threats that have bypassed existing traditional security measures Accommodate Finansbank s diverse, distributed infrastructure and support detailed offline analysis of malware components After careful consideration of the banks challenges, we decided to install the Network Security appliance. This solution benefited Finansbank by fully protecting their complex network environment against attacks and the ability to archive suspected malware attacks. The Network

Security appliance easily integrated with Finansbank s existing security information event management system [viii]. The feedback that we received was from Mert Sarica, Senior penetration tester. He said that After all of our testing was conducted we felt confident that this was the right approach to safeguard the bank from advanced malware, zero-day and targeted attacks [viii]. Mert Sarica then went along to say that Security and data integrity are mission- critical imperatives for Finansbank; having FireEye in our infrastructure just makes us more secure-period [viii]. Bank of Thailand The Bank of Thailand is Thailand s national bank. This bank is in charge of formulating the monetary policy and the money supply for their country. The challenges that the Bank of Thailand faced were Staying ahead of issues that could endanger the bank s mission Identifying and blocking unknown cyber threats that are missed by traditional defenses Preventing the potential compromise of critical operations and data Since the Bank of Thailand was had such a big infrastructure we had to implement 4 of our FireEye solutions. The solutions included, FireEye Network Threat Prevention Platform, FireEye Email Threat Prevention Platform, FireEye Central Management and FireEye Threat Intelligence. These solutions benefited the bank of Thailand by detecting and preventing cyber threats easier and being able to monitor the entire system [vi]. Once all of our solutions were implemented and tested here is what their Senior Director of the Information Technology department said about our solutions Best practice is no longer good enough when it comes to cybersecurity. The world has changed dramatically. The reality of what we face is a world with an extraordinary array of new security challenges. From proof of value to implementation, Bank of Thailand chose FireEye technology to manage advanced protection [vi]. Conclusion FireEye has been protecting 5 of top 6 US telecom companies, 5 of the top 10 financial institutions, 7 of top 10 energy companies, 7 of top 10 high-tech companies and 5 of top 10 aerospace/defense contractors. [xv] A powerful cyber security system can increase value to your organization. As you may notice, Banks always have high expectations on their cyber security systems. In the cases above, FireEye has satisfied those requirements and keep a good relationship with our customers from various backgrounds. It has been ten-years for us to seek new technologies and keep leading cyber security industry. FireEye is honored to help you improve your cyber security system and promises to provide you re the world-class services with our top cyber security team. Your business will benefit from using our Web Malware Protection system that can protect your system from malicious attacks and fix problems quickly. We can offer you a three-month new customer experience package for free. And FireEye is confident to assist you to become one of the top successful companies in the world. The first step for success is to make us you top choice. You can also design your own service with us.

Visit www. Fireeye.com to view more details about our products. We are looking forward to hear from you and be part of your success.

Citations i. A New Approach to Assessing Advanced Threat Solutions. N.p.: n.p., n.d. Web. 29 Jan. 2015. ii. Cisco 2014 Annual Security Report (n.d.): 21-22. Cisco. Web. 27 Jan. 2015. <http://www.cisco.com/web/offer/gist_ty2_asset/cisco_2014_asr.pdf>. iii. Cyber crime: Reported damage to the IC3 2001-2013 Statistic. (n.d.). Retrieved January 29, 2015, from <http://www.statista.com/statistics/267132/total-damage-caused-by-bycyber-crime-in-the-us/> iv. Cyber Crime - Statistics and Market Data Statista. (n.d.). Retrieved January 29, 2015, from http://www.statista.com/markets/424/topic/1065/cyber-crime/ v. Data Center Security FireEye. (n.d.). Retrieved January 29, 2015, from <https://www.fireeye.com/solutions/datacenter.html> vi. FireEye.(2014). Bank of Thailand Chooses FireEye Technology to Manage Advanced Protection [PDF file]. Retrieved from <https://www.fireeye.com/content/dam/fireeyewww/global/en/customers/pdfs/fireeye-bank-of-thailand.pdf> vii. FireEye. (2014). Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye [PDF file]. Retrieved from <https://www.fireeye.com/content/dam/fireeye-www/global/en/customers/pdfs/fireeyecitizens-national-bank-casestudy.pdf.> viii. FireEye. (2014). Leading Turkish Financial Services Provider, Finansbank, Safeguards Its Growing Global Presence with FireEye Network Security (NX) [PDF file]. Retrieved from< https://www.fireeye.com/content/dam/fireeyewww/global/en/customers/pdfs/cs-turkiye-finansbank.pdf.> ix. FireEye As A Service. (2014, January 1). Retrieved January 29, 2015, from <https://www.fireeye.com/content/dam/fireeye-www/global/en/products/pdfs/fireeye-asa-service.pdf> x. FireEye Network Threat Prevention Platform. (2014). Retrieved January 29, 2015, from https://www.fireeye.com/content/dam/fireeye-www/global/en/products/pdfs/fireeyenetwork-threat-prevention-platform.pdf xi. FireEye Wins CRN Enterprise App Award for Security. 2014, December 8, from <http://finance.yahoo.com/news/fireeye-wins-crn-enterprise-app-130000763.html> xii. "IBM Statistics on Data Breach Epidemic." IBM. N.p., Apr. 2014. Web. 27 Jan. 2015. <http://www-935.ibm.com/services/us/en/it-services/security-services/data-breach/>.

xiii. Jon Clay (Trend Micro). Big Data Analytics and the Smart Protection Network. August 2012. xiv.percentage of annualized cyber crime cost for U.S. companies 2014 Statistic. (2014, June 30). Retrieved January 29, 2015, from <http://www.statista.com/statistics/193431/annual-cyber-crime-cost- for-us-companiesby-attack-type/> xv. Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks. Retrieved January 29, 2015, from< https://www2.fireeye.com/protect-your-data-from-cyberattacks.html?x=fe_web_ic> xvi.riley, Michael, Ben Elgin, Dune Lawrence, and Carol Matlack. "Target Missed Warnings in Epic Hack of Credit Card Data." Bloomberg.com. Bloomberg, 13 Mar. 2014. Web. 26 Jan. 2015. <http://www.bloomberg.com/bw/articles/2014-03-13/targetmissed-alarms-in-epic-hack-of-credit-card-data>. xvii. THE FIREEYE ADVANTAGE: A New Security Approach for Today s Advanced Attacks. from<http://www2.fireeye.com/rs/fireye/images/fireeye-debunkingthe-myth-of-sandbox-security.pdf> xviii. Veiga, Alex. "JPMorgan Breach Is 'Crisis Point' For Banks." The Huffington Post. TheHuffingtonPost.com, 3 Oct. 2014. Web. 26 Jan. 2015. <http://www.huffingtonpost.com/2014/10/03/jpmorgan-breach-fears_n_5924920.html>. xix. What is a Cyberattack? - Definition from Techopedia. (n.d.). Retrieved January 29, 2015, from http://www.techopedia.com/definition/24748/cyberattack xx. Www.insemot.eu. (2012, April 26). Retrieved January 29, 2015, from <http://www.insemot.eu/en/is-basics1/23-why- is- it- important-to-protect-informationand-personal-data>