Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.

Similar documents
Palo Alto Networks. October 6

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

How Attackers are Targeting Your Mobile Devices. Wade Williamson

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Next Generation Enterprise Network Security Platform

Breaking the Cyber Attack Lifecycle

FROM PRODUCT TO PLATFORM

Securing the Virtualized Data Center With Next-Generation Firewalls

WildFire. Preparing for Modern Network Attacks

A Modern Framework for Network Security in the Federal Government

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Networking for Caribbean Development

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

The Hillstone and Trend Micro Joint Solution

Carbon Black and Palo Alto Networks

How Palo Alto Networks Can Help With ASD's Top Cyber Intrusion Mitigation Strategies

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

10 Smart Ideas for. Keeping Data Safe. From Hackers

IBM Security re-defines enterprise endpoint protection against advanced malware

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Data Center security trends

Practical Steps To Securing Process Control Networks

Fighting Advanced Threats

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

SECURITY 2.0 LUNCHEON

A Modern Framework for Network Security in Government

PALO ALTO SAFE APPLICATION ENABLEMENT

With Great Power comes Great Responsibility: Managing Privileged Users

SANS Top 20 Critical Controls for Effective Cyber Defense

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Enterprise Cybersecurity: Building an Effective Defense

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Enterprise Security Platform for Government

Advanced Threats: The New World Order

Critical Security Controls

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

Evolution Of Cyber Threats & Defense Approaches

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Streamline PCI Compliance With Next-generation Security

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Unified Security, ATP and more

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Content-ID. Content-ID URLS THREATS DATA

Combating the Next Generation of Advanced Malware

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Advanced Security and Risk Management for Cloud and Premise environments

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Protecting Your Organisation from Targeted Cyber Intrusion

REPORT & ENFORCE POLICY

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

REVOLUTIONIZING ADVANCED THREAT PROTECTION

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

UNCLASSIFIED. General Enquiries. Incidents Incidents

Why The Security You Bought Yesterday, Won t Save You Today

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Streamline PCI Compliance With Next-generation Security

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Next Generation Firewalls and Sandboxing

Perspectives on Cybersecurity in Healthcare June 2015

Covert Operations: Kill Chain Actions using Security Analytics

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Defending Against Data Beaches: Internal Controls for Cybersecurity

Marble & MobileIron Mobile App Risk Mitigation

THREAT INTELLIGENCE CLOUD

I D C A N A L Y S T C O N N E C T I O N

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

September 20, 2013 Senior IT Examiner Gene Lilienthal

A Love Affair: Cyber Security, Big-data and Risk

Using Palo Alto Networks to Protect the Datacenter

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Zak Khan Director, Advanced Cyber Defence

McAfee Network Security Platform

Modular Network Security. Tyler Carter, McAfee Network Security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Compliance Guide: PCI DSS

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH

Analyzing HTTP/HTTPS Traffic Logs

Anti-exploit tools: The next wave of enterprise security

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

On-Premises DDoS Mitigation for the Enterprise

RSA Security Anatomy of an Attack Lessons learned

Transcription:

Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and Proprietary.

4 2013, Palo Alto Networks. Confidential and Proprietary.

WHAT S CHANGED? THE EVOLUTION OF THE ATTACKER CYBERCRIME NOW $1+ trillion industry CYBER WARFARE 100+ nations

CYBER THREATS ARE GETTING MORE ADVANCED Advanced Persistent Threat Uses a broad spectrum of exploits Both well-known and zero-day exploits Crosses multiple vectors; uses crypting Goal-oriented rather than opportunistic Highly targeted, methodical attacks Re-encodes or uses polymorphism Organized, wellfunded criminal adversaries Nation-states, cyberespionage groups Thousands of off-theshelf tools available

How exploit develops.. SMTP IMAP POP3 Web browsing (7) Code execution exploits seen in SMTP, POP3, IMAP and web browsing. Smoke.loader botnet controller Delivers and manages payload Steals passwords Encrypts payload Posts to URLs Anonymizes identity Twitter Web browsing Facebook 8 2014 Palo Alto Networks. Confidential and Proprietary.

COMPROMISED CREDIT CARDS APTs IN ACTION THE FAIL CHAIN Attacker penetrates network from supplier Lack of monitoring allows credential escalation Signals of data exfiltration are not monitored Network security logs are ignored Alert from IPS that malware is being installed is missed Poor segmentation allows attacker to make lateral move to sensitive data Recon on companies Target works with Spearphishing third-party HVAC contractor Breached Target network with stolen payment system credentials Moved laterally within Target network and installed POS Malware Compromised internal server to collect customer data Exfiltrated data command-andcontrol servers over FTP Maintain access

MORE TOOLS HAVE RESULTED IN SECURITY SILOES AND UNCESSARY COMPLEXITY Degraded performance without really solving the issue Firewall helpers have limited view of traffic Complex and costly to buy and maintain Doesn t provide adequate visibility Internet Enterprise Network

State of the nation 100+ nations

How exploit develops.. SMTP IMAP POP3 Web browsing (7) Code execution exploits seen in SMTP, POP3, IMAP and web browsing. Smoke.loader botnet controller Delivers and manages payload Steals passwords Encrypts payload Posts to URLs Anonymizes identity Twitter Web browsing Facebook 12 2014 Palo Alto Networks. Confidential and Proprietary.

CONTENT USERS APPLICATIONS KNOW WHAT S ON YOUR NETWORK AT ALL TIME BASED ON APPLICATIONS, USERS, AND CONTENT Classify all traffic by application (layer 7) with App-ID Tie users and devices to applications, regardless of location, with User-ID Scan content and protect against all threats, both known and unknown, with Content-ID

SYSTEMATICALLY REDUCE THE SCOPE OF YOUR SECURITY CHALLENGE 0 Full visibility 1 Limit traffic legitimate apps and sources 2 Eliminate known threats 3 Eliminate unknown threats

Safe Application Enablement: Some Examples 16 2012, Palo Alto Networks. Confidential and Proprietary.

PREVENTION AGAINST UNKNOWN THREATS 3 SIGNATURE CREATION Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures 2 Command-and-control Staged malware downloads Host ID and data exfil SANDBOX TESTING TM WildFire Soak sites, sinkholes, 3 rd party sources 4 Global intelligence and protection shared with all customers 1 SUSPICIOUS TRAFFIC Palo Alto Networks Customers

NETWORK SEGMENTATION Group systems logically by trust levels and risk factors independent of physical location Deny all traffic between zones by default except the few legitimate applications (App-ID) Apply least privilege access for user access (User-ID) Inspect all content for malicious payload known and unknown threats Limit the scope of compliance Fewer servers are subject to compliance audits Limit the scope of vulnerability - Separate vulnerable parts of the network, or old servers that cannot be patched from others Limit data exfiltration limit the volume of data that is compromised in the case of a breach

Palo Alto Networks Cost Reductions, Improved Operations Fewer appliances and policies to deploy and maintain (5x) One management platform across security functions and locations Business-relevant policies Fewer translation errors between business and security teams Better security decisions Introduction NXG Firewalls vs traditional 30%-80% savings 40%-65% savings No data or intelligence silos Reporting, and compliance audits are made easier Better performance from single pass architecture across functions

2014 Magic Quadrant for Enterprise Network Firewalls Palo Alto Networks is assessed as a Leader, mostly because of its NGFW focus, because it set the direction of the market along the NGFW path, and because of its consistent visibility in shortlists, increasing revenue and market share, and its proven ability to disrupt the market. --Gartner Magic Quadrant for Enterprise Network Firewalls