Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Similar documents
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Sourcefire Next-Generation IPS

Sourcefire Next-Generation IPS

How To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee)

How To Manage Sourcefire From A Command Console

SourceFireNext-Generation IPS

SOURCEFIRE PRODUCT OVERVIEW. Sourcefire 3D System. Security for the real world. Discover. Determine. Defend.

Braindumps QA

How To Buy Nitro Security

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Security strategies to stay off the Børsen front page

How To Protect Your Network From Attack From A Hacker On A University Server

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

The Importance of Cybersecurity Monitoring for Utilities

On and off premises technologies Which is best for you?

How To Prevent Hacker Attacks With Network Behavior Analysis

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

The Hillstone and Trend Micro Joint Solution

End-user Security Analytics Strengthens Protection with ArcSight

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How To Create Situational Awareness

Clavister InSight TM. Protecting Values

RAVEN, Network Security and Health for the Enterprise

IBM Security IBM Corporation IBM Corporation

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Network Security Forensics

Certified Ethical Hacker Exam Version Comparison. Version Comparison

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Gateway Security at Stateful Inspection/Application Proxy

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

McAfee Network Security Platform

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Symantec Endpoint Protection

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

13 Ways Through A Firewall What you don t know will hurt you

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Protecting the Infrastructure: Symantec Web Gateway

Overcoming PCI Compliance Challenges

HoneyBOT User Guide A Windows based honeypot solution

Defending Against Data Beaches: Internal Controls for Cybersecurity

13 Ways Through A Firewall

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Discover Security That s Highly Intelligent.

Introduction to Network Discovery and Identity

Take the NetFlow Challenge!

The SIEM Evaluator s Guide

Security Information Management (SIM)

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Salient Managed Services. Hosting and Support

How To Protect A Network From Attack From A Hacker (Hbss)

Closing Wireless Loopholes for PCI Compliance and Security

Modular Network Security. Tyler Carter, McAfee Network Security

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

CEH Version8 Course Outline

24/7 Visibility into Advanced Malware on Networks and Endpoints

The webinar will begin shortly

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

SANS Top 20 Critical Controls for Effective Cyber Defense

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Symantec Endpoint Protection

How To Create An Intelligent Infrastructure Solution

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

PCI DSS. Get Compliant, Stay Compliant Seminar

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

A Layperson s Guide To DoS Attacks

Vulnerability Management

Introducing IBM s Advanced Threat Protection Platform

Concierge SIEM Reporting Overview

RSA Security Anatomy of an Attack Lessons learned

Inspection of Encrypted HTTPS Traffic

Incident Response. Six Best Practices for Managing Cyber Breaches.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CA Host-Based Intrusion Prevention System r8.1

The Critical Importance of Three Dimensional Protection (3DP) in an Intrusion Prevention System

How To Protect Your Network From Attack From A Hacker (For A Fee)

Cisco IPS Tuning Overview

IDS or IPS? Pocket E-Guide

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Whitepaper. Securing Visitor Access through Network Access Control Technology

PCI Security Scan Procedures. Version 1.0 December 2004

IBM Security QRadar QFlow Collector appliances for security intelligence

On-Premises DDoS Mitigation for the Enterprise

Cisco Cloud Security Interoperability with Microsoft Office 365

IBM QRadar Security Intelligence April 2013

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Directory and File Transfer Services. Chapter 7

Cisco Security Intelligence Operations

Transcription:

Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland

2

Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective, efficient security possible driven by network intelligence. Founded in 2001 by Snort Creator, Martin Roesch........... Headquarters: Columbia, MD.... Employees:.. More than 240 More than 1,600 enterprise and government customers.. Over 30 of the Fortune 100 are customers.. Global partner/distributor network NASDAQ: FIRE Best of Both Worlds Open Source Community.. + Corporate Support & Innovation. 3

Acknowledged Leadership FACT: Sourcefire has been depicted by Gartner as the most visionary leader in Gartner s IPS Magic Quadrant since 2006! 4 The Magic Quadrant is copyrighted February 2008 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the Leaders quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Not Knowing can make headlines Rogue Trader Costs Société Générale $7 billion Civil Service Apologises for HMRC Data Loss Hijacked Bank of India Website Downloads Malware Chinese Hackers Breach India s Ministry of External Affairs Indian hacker sell 8 Million private details of Best Western customers to Russian Mafia DoS Attacks on Estonia Launched by Students Korea s Internet Auction [ebay] Hacked; Millions Exposed German Police Attempt to Hack Skype 5 Barts NHS Trust major incident with W/32Mytob virus

and Be Costly Typical Costs Associated With Network Security Breaches: Lost revenue Lost productivity Regulatory fines Class-action lawsuits Damaged reputation Customer erosion 6

IPS is easy, right?

Not All Exploits Initially Pass Through an IPS 8

Defeating an IPS The best network security strategy is one with layered defenses Deterministic IPS, Firewall, Ant-Virus, Anti-Spam Non-Deterministic NBA A $100,000 IPS can easily be defeated with a laptop and a pair of trainers. Martin Roesch Sourcefire Founder & CTO 9

IPS History Lesson Gartner IDS Magic Quadrant 2003 IDS has failed on its promise, 99 out of 100 alerts are meaningless IDS vendors respond to Gartner with IPS We will protect you with our black box, trust us.. Plug & Play no tuning? Security or Connectivity? How do I monitor? 10

Basic IPS the Problem 11 A typical default IPS policy has circa 300 1000 blocking rules (Fact) > 33,000 known vulnerabilities (Fact) 6,751 added in 2007 3,901 added in 2008 Basic IPS 1-3% protection 97-99% of other IPS events require human investigation The IPS has no knowledge of the target Therefore blind and virtually useless

IPS Event Spectrum IPS events that require human investigation Dismissible Events Basic IPS Easy to identify & block 1-3% of vulnerabilities 12

Security Events Must Have Context 13 Does this traffic threaten my business?

Intelligence Driven IPS

Sourcefire Threat, End Point & Network Intelligence Sourcefire IPS Sourcefire RNA Sourcefire RUA Sourcefire NetFlow Analysis Threat End Point / Network End Point / User Network 15

Sourcefire Intelligence Drives Network Discovery Impact Assessment Automated IPS Tuning IT Policy Compliance Network Behavior Analysis User Identity Tracking A whole lot more than a black box protecting against the exploit of 1-3% of vulnerabilities 16

Threat Intelligence Sourcefire IPS Snort de facto IPS standard Most powerful and flexible rules engine Easy for the novice deploy and listen Perfect for the expert packet-level forensics Centralized command and control Reports, alerts and dashboards Third-party integration APIs Master Defense Center (MDC) Backed by the Sourcefire VRT Industry-leading vulnerability research team First among all IPS providers in responding to Microsoft Tuesday vulnerabilities Defense Against: Worms Trojans Buffer overflows DoS attacks Backdoor attacks Spyware Port scans VoIP attacks IPv6 attacks Statistical anomalies Protocol anomalies P2P attacks Blended threats Zero-day attacks And more! 17

Network & End Point Intelligence 18 Sourcefire RNA is watching all the time, in real time 24x7 passive discovery Surgical Active scans when required You Know When a new host appears, whether physical or virtual What OS and services it s running (e.g., BitTorrent) What ports are open What protocols it s using What it s potential vulnerabilities are

Sourcefire IPS event spectrum Sourcefire automates this process, so your security staff can focus on the events that matter. Sourcefire automatically eliminates false positives Sourcefire default IPS policies balance security & connectivity. Blocking 19

Typical Customer Feedback We were generating 20,000,000 IPS events per month. 99.9% Event Reduction! Events have been reduced to approximately 2,000 per month. 20

Automated IPS Tuning How often does your network change? How often do you tune your IPS? Key Adaptive IPS capabilities include: RNA Recommended Rules Adaptive Traffic Profiles Non-Standard Port Handling Tuning 21

Adaptive IPS Capabilities Comparison Capability Impact Analysis Limited Automated IPS Tuning Adaptive Traffic Profiling Non-Standard Port Handling Limited 22

User Identity Tracking Pairs an Active Directory or LDAP username with a host IP address Correlates usernames with security events so incidents can be resolved more quickly Click on username to reveal full name, telephone, email, and department Integrated into all Sourcefire 3D Sensors Mapping a username to an IP address was taking us away from a backlog of other important tasks. What used to take up to an hour now takes just a second or two. Tamara Fisher, AutoTrader.com 23

Benefits of Sourcefire Intelligence Driven IPS 24 Reduces Risk You know what you re protecting You know when your network changes You can detect exploits originating from inside and outside your network Your network is a safer place by monitoring and enforcing IT compliance policies Saves Time & Money Your IPS is always tuned even when your network changes You no longer have to sift through thousands of events to uncover what really matters You know who to call when a host is compromised

Sourcefire 3D System Components Discover Determine Defend Sensing Network In-line IPS Passive SSL-encrypted VPN (Port 8305) Email, SNMP, Syslog,SSL In-line RNA Passive Typically. 1Kb / event DC Firewall, IPS, Switchers, Routers In-line RUA Typically. 100b / event Management Network Configuration and Compliance Mgmt. G/bit copper or fiber 25 Passive G/bit copper

And Best Of All, It Keeps You Out of the Headlines! Questions? 26