You ll learn about our roadmap across the Symantec email and gateway security offerings.



Similar documents
Unified Security, ATP and more

Integrating MSS, SEP and NGFW to catch targeted APTs

The Symantec Approach to Defeating Advanced Threats

Better Together: Microsoft Office 365 & Symantec Office 365

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Securing the endpoint and your data

SPEAR PHISHING AN ENTRY POINT FOR APTS

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Introducing IBM s Advanced Threat Protection Platform

Cisco Advanced Malware Protection

Symantec Advanced Threat Protection: Network

Cisco Advanced Malware Protection for Endpoints

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

End to End Security do Endpoint ao Datacenter

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Secure Your Mobile Workplace

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Analyzing HTTP/HTTPS Traffic Logs

Check Point: Sandblast Zero-Day protection

WildFire. Preparing for Modern Network Attacks

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Countering Insider Threats Jeremy Ho

IBM QRadar Security Intelligence April 2013

Securing Office 365 with Symantec

On and off premises technologies Which is best for you?

ENABLING FAST RESPONSES THREAT MONITORING

#ITtrends #ITTRENDS SYMANTEC VISION

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Vulnerability Management

Defending Against Cyber Attacks with SessionLevel Network Security

Content-ID. Content-ID URLS THREATS DATA

Fighting Advanced Threats

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Cisco Advanced Malware Protection for Endpoints

Under the Hood of the IBM Threat Protection System

Symantec Advanced Threat Protection: Network

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

RSA Security Analytics

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

IBM Security IBM Corporation IBM Corporation

Advanced Threat Protection with Dell SecureWorks Security Services

Symantec Endpoint Protection

Symantec Endpoint Protection

Find the needle in the security haystack

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

APPLICATION PROGRAMMING INTERFACE

The webinar will begin shortly

Modular Network Security. Tyler Carter, McAfee Network Security

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

IBM Security X-Force Threat Intelligence

Protecting Your Organisation from Targeted Cyber Intrusion

Symantec Cyber Security Services: DeepSight Intelligence

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Security Intelligence Services.

Requirements When Considering a Next- Generation Firewall

How To Buy Nitro Security

IBM Security Strategy

UP L13: Leveraging the full protection of SEP 12.1.x

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

McAfee Network Security Platform

Security Intelligence

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

The Hillstone and Trend Micro Joint Solution

All about Threat Central

Streamlining Web and Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

Content Security: Protect Your Network with Five Must-Haves

IBM Security re-defines enterprise endpoint protection against advanced malware

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

McAfee Security Architectures for the Public Sector

Proven LANDesk Solutions

Breach Found. Did It Hurt?

Symantec Endpoint Protection

FROM PRODUCT TO PLATFORM

Public, Private, Hybrid:

Symantec Protection Suite Add-On for Hosted and Web Security

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)

Finding Security in the Cloud

Comprehensive Advanced Threat Defense

Securing OS Legacy Systems Alexander Rau

Transcription:

#SymVisionEmea

In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection today and in the future. You ll learn about our roadmap across the Symantec email and gateway security offerings. We ll reveal our expanded vision of Targeted Attack Protection spanning email, gateway and cloud platforms to provide far greater protection, a 100% detection rate and rapid remediation of both common and advanced threats. 2

#SymVisionEmea Gateway, cloud and targeted attacks Our vision, strategy and roadmap Patrick Gardner VP, Engineering Jane Wong Director, Product Management 3

The rise of targeted attacks 91% increase in targeted attack campaigns in 2013 vs 2012 ISTR 19 (Symantec, 2014) 4

Targeted attacks against organizations by size 5

Organizations are not stopping Targeted attacks 66% Breaches went undetected for 30 days or more 243 days before detection 4 months to remediate 6

The shift in mindset 7

The shift in mindset Threat Intelligence Data Loss Prevention - Discover Endpoint Protection Email Security Web Security Data Center Security Advanced Threat Protection Solution Email, Gateway, Endpoint Managed Security Services Advanced Threat Protection Solution Email, Gateway, Endpoint Managed Security Services Incident Response Services 8

Symantec Advanced Threat Protection Solution Products Advanced Threat Protection Solution Technologies Endpoint Security: Advanced Threat Protection Gateway Security: Threat Defense Email Security: Advanced Threat Protection New advanced threat detection and response capabilities unifying security across the endpoint, email and gateway helping organizations achieve better protection and drive down security operations costs Detection: Better ability to identify targeted attack scope Visibility: Improved insight into events and trends Response: Increased logging of forensic information Context: Global context from the Symantec GIN Symantec Cynic New cloud based sandbox analysis Combines global threat analysis and behavioral analysis Symantec Synapse New correlation across endpoint, email, & gateway Provides prioritization for incident responders 9

Protect, detect & respond Protect - identify new threat at any control point, real-time local block across all Detect discover new malware via Cynic, search all endpoints for similar behaviors (IOC s) Respond discover new spear-phish URL, immediately see who else got the email, who clicked link, and infection status of their endpoint 10

Symantec Advanced Threat Technology 11

Rapid detection of malware - cynic Reports Portable Executables, PDF, Office docs, Acrobat, Java files, containers Draws out VM aware malware Mimics human interaction Cloud based service enables rapid scale, and fast updates to analysis Bare metal execution 12

Accurate prioritization of events - synapse Threat correlation across gateway, endpoint and email enables effective prioritization High prioritization of assets to be remediated due to active infection Lower prioritization of threats already remediated at other control points 0-day threats identified over the network, but blocked at the endpoint, will be assigned a lower priority 13

Symantec Gateway Security: Threat defense 14

Threats to gateway security 2 ND Watering hole attacks are 2 nd only to Spear phishing 77% Websites have vulnerabilities 16% Of these are critical 23 Zero day exploits discovered in 2013 Unprotected % of Unmanaged Endpoints increases the complexity of the problem faced by Sec Ops today Source: Symantec Internet Security Threat Report volume 19 15

Symantec Gateway Security: Threat defense Network Traffic Internet Endpoints BLAC KLIST Real-time Inspection Blacklist Vantage Insight AV Mobile Insight SGSTD 1 On-box inspection with proven technologies. In-line = block; TAP-mode = inspect only 2 Asynchronous inspection of suspicious files sent to Cynic for analysis Symantec big data intelligence Symantec Cloud 3 Cynic assesses file behavior in multiple sandboxing VMs, up to and including bare metal execution for VM-aware malware and utilizes Skeptic and SONAR heuristics Email & Endpoint (ESS, SEPM) Synapse Correlation Cynic 4 Behaviors are put in global context against Symantec Intelligence Data and correlated to email, endpoint events via Synapse Conviction, Actionable intelligence 5 Verdict and an actionable, richly detailed report on what Cynic observed is provided, prioritized contextually 16

Symantec Gateway Security: Threat defense futures Jack in Finance Enhanced visibility into all inspection events across control points to aid in forensic investigation, includes encrypted traffic view Enhanced ability to pinpoint the user under attack and create a profile of normal activity ; i.e. the CEO s administrative assistant versus a new hire to the finance department Additional options for malware analysis (i.e. on-site as a black box appliance, uploading of custom o/s images, etc.) Enhanced integration to the web gateway products to extend ATP capabilities 17

Symantec Email Security: Advanced Threat Protection 18

Threats to email security 1 in 392 emails are a phishing attack 1 in 196 emails are a malware attack 25% of malware in email is delivered via a link 66% of all email worldwide is spam 91% Increase in targeted attacks in 2013 vs 2012 Email is top incursion vector for attacks Source: Symantec Internet Security Threat Report volume 19 Advanced Threat Protection by Symantec SYMANTEC VISION SYMPOSIUM 2014 19

Symantec Email Security: Advanced Threat Protection Vision Detailed reporting on advanced malware blocked by Symantec, including targeted attacks Accurate prioritization of threat activity across control points via Synapse data correlation Detect new malware via Cynic sandboxing including virtual and physical execution Detailed behavioural reporting what was the malware trying to do? Gain campaign insights via Symantec threat actor intelligence 20

Symantec Email Security: Advanced Threat Protection V1: Enhanced visibility of advanced malware More detailed data, targeted attack visibility, threat categories and severity levels Email Details Date, time, timezone Domain of recipient email Rcpt To Envelope Recipient RFC5321 To Header RFC5322 Source IP - sender IP address Geo-location of source Mail From Envelope Sender RFC5321 From Header RFC5322 Subject Line Malware Details Malware name Malicious URL or attachment file hash Detection method e.g. Skeptic, Link Following Targeted Attack Yes/No Why Symantec deems attack to be targeted (summary) Threat Category - Trojan, InfoStealer etc. Severity Level indicating threat sophistication Severity Levels HIGH Targeted Attack MEDIUM Zero-day or new malware LOW Blocked malware Advanced Threat Protection by Symantec SYMANTEC VISION SYMPOSIUM 2014 21

Symantec Email Security: Advanced Threat Protection V1: Enhanced visibility of advanced malware Reduce response time and effort with data correlation SIEM integration API to pull down detailed data on malicious emails that have been blocked by Email Security.cloud Mechanism Data Feeds are streamed on request through a URL HTTPS secures and encrypts the data, CSV format More detail 23 data points (vs. 9 in current Anti-Virus Detailed report) New data includes Targeted Attack analysis, Severity Level, Geolocation of attacker and SHA256 hashes Synapse integration Event correlation drives prioritization and supports response today, sets stage for automated protection in future releases Advanced Threat Protection by Symantec SYMANTEC VISION SYMPOSIUM 2014 22

V2 FOCUS Symantec Email Security: Advanced Threat Protection Futures Better detection of new malware, via integration with Symantec Cynic sandboxing technology Detailed behavioral reporting what did Symantec observe the malware trying to do? Submit blocked email samples for analysis Enhanced Synapse correlation data feed with additional data to further strengthen accuracy of event prioritization across control points Gain intelligence on adversaries and their modus operandi, via Symantec threat actor intelligence Advanced Threat Protection by Symantec SYMANTEC VISION SYMPOSIUM 2014 23

Symantec Endpoint Security: Advanced Threat Protection 24

Symantec Endpoint Security: Advanced Threat Protection Automatic, continuous suspicious event prioritization Detect Accurately Analyze Quickly Respond with Confidence Automatically generates prioritized list of suspicious events Analyzes global and local context data to determine scope and severity. Optionally sends to Cynic for behavior reporting Convicts file and locally blacklists to immediately contain the attack. Endpoints send suspicious activity in real-time Machine-learning based algorithm (SEAA) applied to data Global intelligence benchmarking Cynic results Comprehensive body of evidence for SIEM integration Immediately prevents additional downloads Instructs SEPM to blacklist locally via policy Advanced Threat Protection by Symantec SYMANTEC VISION SYMPOSIUM 2014 25

Suspicious event analytics algorithm Goal Provide high fidelity and automatically generated prioritized list of suspicious events Automates the job of finding suspicious events across your endpoints Informs you of attacks quicker and requires less effort How Machine learning based algorithm Developed in collaboration with STAR Validated against specific enterprise data sets as opposed to broad, global data from enterprises Requires Full visibility into all PE files created on the endpoint Full visibility into all AV and IP Ping data Full visibility into all SONAR submissions (1,400 behaviors) Deep integration with the SEP client 26

Symantec Advanced Threat Protection Solution 27

How we solve the problem. Protect, Detect, Respond Advanced Threat Solution Tell me about advanced threats faster and better than anyone else Elastic cloud technologies detect 0-day evasive threats through many techniques of code execution and analysis Visibility into threats targeting both managed and unmanaged clients Highlight the most important events so I can prioritize my time Give me actionable intelligence so that I can defend my organization Synapse-driven event prioritization across all Symantec control points Greater Symantec context gives you additional intelligence: URL sources, origin, files downloaded by that file, processes created, etc. Deep file analysis provides a full behavioral report which can be used for incident response 28

#SymVisionEmea Thank you! Patrick_Gardner@Symantec.com Jane_Wong@Symantec.com Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Advanced Threat Protection by Symantec 29

Enhance visibility of advanced malware Email ATP Add-on: Detailed Malware Report Threat Categories Worm Viruses (File Infector) Backdoor The ability to self-replicate from across a network. Threats that do not require host files or sectors and selfreplicate across disks (e.g., copying oneself to the floppy drive and from the floppy to the hard drive). The ability to self-replicate on the same host. Program or feature in a program that allows unauthorized remote control and access to the system on which it is installed without notice and consent. The program that controls (and often connects to) the backdoor can be considered a component of the backdoor even if it installs with notice and consent. InfoStealer Downloader Trojan Hacktool Contains functionality that is intended to collect confidential data from the target system without adequate notice and without receiving appropriate consent. Confidential data includes information that most people would not be willing to share with someone and includes bank details, credit card numbers, and passwords. Installs or causes other malware to be installed on the system. Program whose sole purpose is to download programs without adequate notice or consent. Without user consent, purposely modifies or deletes system components in such a way that the program effectively disrupts the host computer's functionality so that activities that would have been possible before it was installed would not be possible after install. This includes changes made to a system to prevent it from accessing other resources on a network or Internet. Programs whose primary purpose is to provide the means to exploit or subvert an operating system or third-party application with the purpose of gaining unauthorized access to or rendering a system unusable by an owner without his authorization. 30

Endpoint Enterprise Global Symantec Endpoint Security: Advanced Threat Protection Detect Accurately Cynic On-Demand GIN Analyze Quickly Delivered as an on-prem. VA. SES: ATP SEP Manager Respond with Confidence Why SES: ATP? SEP Client SEP Client SEP Client Deep endpoint integration leverages proprietary suspicious event data Automatic, continuous and high fidelity suspicious event prioritization using machine-learning based algorithm Quickly builds a comprehensive body of evidence so you can take action with confidence 31