Security Analytics The Beginning of the End(Point)



Similar documents
End-user Security Analytics Strengthens Protection with ArcSight

CyberArk Privileged Threat Analytics. Solution Brief

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

AppGuard. Defeats Malware

Endpoint Threat Detection without the Pain

The Cloud App Visibility Blindspot

RSA Security Analytics

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Information & Event Management (SIEM)

Effective Methods to Detect Current Security Threats

IBM QRadar Security Intelligence April 2013

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Continuous Network Monitoring

RSA Security Anatomy of an Attack Lessons learned

Content Security: Protect Your Network with Five Must-Haves

Defending Against Cyber Attacks with SessionLevel Network Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Top 20 Critical Security Controls

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

INCIDENT RESPONSE CHECKLIST

Breaking the Cyber Attack Lifecycle

Networking for Caribbean Development

Effective Methods to Detect Current Security Threats

Unknown threats in Sweden. Study publication August 27, 2014

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Analyzing HTTP/HTTPS Traffic Logs

Why The Security You Bought Yesterday, Won t Save You Today

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Unified Security, ATP and more

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

IT Security Strategy and Priorities. Stefan Lager CTO Services

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Automate PCI Compliance Monitoring, Investigation & Reporting

ENABLING FAST RESPONSES THREAT MONITORING

Braindumps QA

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Comprehensive Advanced Threat Defense

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

McAfee Network Security Platform

Enabling Security Operations with RSA envision. August, 2009

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

What is Security Intelligence?

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Security and Privacy

24/7 Visibility into Advanced Malware on Networks and Endpoints

Secure Your Mobile Workplace

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Solutions to Trust. NEXThink V5 What is New?

Cyber Security Metrics Dashboards & Analytics

Speed Up Incident Response with Actionable Forensic Analytics

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

The Incident Response Playbook for Android and ios

IBM Security IBM Corporation IBM Corporation

Extreme Networks Security Analytics G2 Vulnerability Manager

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Compliance Guide: PCI DSS

Information Security for the Rest of Us

A Case for Managed Security

Things To Do After You ve Been Hacked

Concierge SIEM Reporting Overview

Ovation Security Center Data Sheet

How Attackers are Targeting Your Mobile Devices. Wade Williamson

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Comodo Endpoint Security Manager SME Software Version 2.1

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

THE EVOLUTION OF SIEM

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cyber Situational Awareness for Enterprise Security

Advanced Persistent Threats

Cisco IPS Tuning Overview

Practical Threat Intelligence. with Bromium LAVA

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

NetDefend Firewall UTM Services

Netzwerkvirtualisierung? Aber mit Sicherheit!

Clavister InSight TM. Protecting Values

Cisco Advanced Malware Protection for Endpoints

Targeted attacks: Tools and techniques

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

Getting Ahead of Malware

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

Q1 Labs Corporate Overview

Transcription:

Security Analytics The Beginning of the End(Point) Arie Joosse Arie.Joosse@nexthink.com

It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy Where does a process connect? To the internet but only from one device How are admin privileges used? Shared local admin accounts Any vulnerable devices? AV not up-to-date or without RTP Are policies really enforced? Not all applications via proxy to the internet How effective are incident responses? Device missed because offline, side effect impacting business service

Threats are inevitable. Will you see the next one?

They did not.

90% 75% 80% 11% of attacks exploited vulnerabilities for which patches were already available of attacks spread from victim 0 to victim 1 in less than 24 hours of malware samples are unique to an organization of end-users click on fishing attachments, 50% within the fist hour

How do you see your IT security today?

From candles to the need of light bulbs, what has changed?

http://en.wikipedia.org/wiki/iloveyou Remember?

Personalization What s the difference? #1

Hyper-connectivity What s the difference? #2

What s the difference? #3 Perimeter??

Sophistication What s the difference? #1 #4

Manage threats not breaches!

Your IT from the end-user perspective, in real-time! all users, all devices, all applications, all connections all the time! User Device Binary Port Destination Domain

Your IT is complex. Securing it shouldn t be! IT Operations Analytics (ITOA) Source: Forrester Research Turning big data inward with IT analytics, JP Garbani, Dec 2012

What Is Analytics? Discovery of meaningful patterns in data that give actionable insight into what you can no longer control and don t have the luxury of time to understand

The truth is in your data. Nexthink finds it Built-in privacy roles Continuous collection and discovery at the endpoints Real-time and scalable analytics platform, open for integrations Ultra-fast and to-the-point visual experience and alerting Zero admin & impact

Access current and historical data in seconds Search and drill-down in seconds Search your entire IT in plain English as if you were Googling it See the network from all devices Visualize thousands of connections in one single screen to identify meaningful patterns and spot exceptions Explore live and historical data Navigate all events and issues encountered by a user, across all their devices, on a single timeline Identify anomalies with full context Identify critical issues and understand their business impact based on self-discovery and behavior analysis Build your own dashboards Communicate with great looking dashboards that consolidate and compare live and historical data Get alerted in real-time Be immediately notified about anomalies and instantly drill-down for informed response

Give your existing security solutions a boost with Nexthink Logs via SIEM only see events which are logged, don t receive much context from endpoints to correlate with (hence lots of false positives). Network security only see network activity, no in-device activity and activity not on your network Endpoint DLP can only see data movement, no device and application behaviors over the network Endpoint Protection/AV/ETDR can only seesomemalware, file execution centric and no global oversight of all applications and user experience

How customers.. are using it?

Goals

Manage IT security at the speed of insight

Analytics at all levels with actionable data Scores for CxO Indicators for Directors Metrics, search and drill-down for Engineers

Discover and close exposure as it happens Don't wait for damages to reveal what's putting your sensitive data at risk, assure security posture and compliance in realtime

Find and respond to intrusion quickly Know immediately when a malware is not detected by the anti-virus or an application accessing a dangerous domain, have all the information to remediate quickly.

Validate and find ways to improve Verify remediation contained and blocked the identified threat, crosscheck no vital operations impacted by remediation. Find commonalities and patterns to improve future security posture. Communicate clearly!

Summary The ENDpointis the STARTpointfor most of the sophisticated attacks and to find the appropriate responses to todays threats Security and IT operations needs to work together as a global response team Nexthink can identify security gaps to close holes before they are exploited Nexthink can enhance current solutions to identify threats faster Nexthink can help investigate attacks to respond quicker and improve defenses Nexthink can show the effectiveness of responses,including the impact on user experience

The Hacking Cases Winning the Battles

Use cases 1. Ransomware - Avoidance & Mitigation 2. Insider Threats 3. Discover infections & abnormal behavior 4. Enhancing APT/ Sandboxing Solutions 5. Identify gaps in your Application Control Policy 6. Post infection/ 7. Security incident analysis

Ransomware - Avoidance & Mitigation

German Broadcasting company got hit by Cryptowall3.0 Network share got encrypted A PC missing Adobe updates was infected while being outside the network A story of ransomware

Adobe Flash & Acrobat, Java and IE are the main attack vectors for ransomware attacks Nexthink identifies legacy applications or application versions known as vulnerable A story of ransomware

Endpoint Security products need to be up to date and real time protection has to be active Nexthink discovers endpoints which do not comply with the security policy A story of ransomware

Incident response and investigation is important to mitigate attacks Nexthink allows the analysis of actual and historical events, providing the whole picture of all endpoints A story of ransomware

08:05:45 found the binary f6b.tmp that runs on no other computers

According to a sandbox analysis web domains belong to the found file Crypto Locker Description "Tesla Crypt" and establishes a connection to 3 domains on -this could be confirmed with Nexthink

From 9:30 to 9:49, 53 internal addresses (several servers) were accessed to attempt encrypting shared drives.

The entire process of infection for encryption lasted over 90 minutes With the help of an automatic alert Nexthink was set the alarm if binaries scan for network drives (to encrypt) securityalerts@acme.de

Insider Threats

Insider threats are more difficult to detect and prevent than attacks from the outside An insider threat can be unintentional by users with high privileges Insider threats Source: Insider Threat Report 2015

Indicator of an insider threat can be logins at unusual times, for example during night Nexthink can provide insights of unusual login activity Insider threats

Access to critical resources e.g. servers can indicate a threat from inside Nexthink can discover access to critical resources with additional information like used applications (SSH/RDP) Insider threats

Keeping track of privileges and user accounts can minimize the danger of insider threats Nexthink helps to identify where high privileges are in use Insider threats

Static AND dynamic user-centric data

Examples of scenarios Password sharing of employee s banking application Employee who resigned and printing files out of working hours Employee s account in use while on annual leave Account used when employee didn t badged into the office

And many more High incorrect logon attempts Valid access credentials but from an external IP address Employee changes job/role Behaviors of users with sensitive authorizations and profiles (e.g. SAP_ALL) Access data base directly (via t-code SE16 in SAP or ODBC in XLS) High risk/sensitive activity out of context (e.g. non-hr employee user HR application) Identifying potential fraud detection (access to sensitive apps such as payroll, customer account, holiday record, etc.) User was granted large number of authorizations Dormant account reactivated Privilege changes into admin Admin group everyone on a machine Activity during irregular hours Activity not in user's regular profile User worked from computer host other than his regular host Application used not in user's profile Host computer used by two usernames Username used on two computers simultaneously Role out of job was assigned to a user User printing on a different printer than usual System Administrator tampering with USB port blocking software

Discover infections & abnormal behavior

Discover infections & abnormal behavior Most attacks and security breaches keep undetected for a long time It is important to detect attacks at an early stage to be able to react and prevent further damage Source: Mandiant M-Trends 2015

Discover infections & abnormal behavior A single AntiVirus vendor can miss a threat or be to late to deliver a signatur for detection Nexthink extends the detection to many vendors by using the VirusTotal Threat Intelligence

Discover infections & abnormal behavior Malware often hides by using legitimate operating system names or/and running from different paths Nexthink can detect executions from uncommon paths and identify non operating system files with identical names

Discover infections & abnormal behavior Abnormal behavior of binaries can indicate an infection Nexthink detects unnormal activity like network scans, port scans, high SMTP or suspicious DNS traffic

Enhancing APT/ Sandboxing Solutions

Why sandboxing solutions It s assumed that signature based Antivirus only detects 40% 50% of malware Signature based protection relies on detection, building and deploying signatures Building 0-Day/APT Malware is easy today An attacker can use Exploit Kits or even MAAS Malware as a service

Files will be inspected, executed in a sandbox and analyzed based on their behaviour

How does Nexthink fit in? Sandboxing is done on the perimeter, analyzing traffic that passes the perimeter Often Sandboxing Solutions are only analyzing mirrored traffic, not blocking malware If you detect an attack at the perimeter, it does not mean it s not already in your network Use Nexthink to extend the analysis to your endpoints

Use the results of the Sandboxing for an Nexthink investigation and see within seconds if the malware is on one of your endpoints!

Identify gaps in your Application Control Policy

Blocking Skype was very difficult when it first was released and got common...

Today, all the major NG Firewalls provide Application Control features, which provide the ability to regulate application usage

Is it really that easy? -No! Hundreds of applications are designed to find their way out of a network without being blocked or detected (Proxy/Anonymizer Tools/ File Sharing etc) They use protocol switching, tunneling or even security gateway specific vulnerabilities like the Palo Alto APP-ID Cache polution to work undected and bypass controls These techniques are enhanced and upgraded on an regular basis to be in front of security products For our Skype example, Skype will detect if there is one PC in the same subnet where Skype is allowed to communicate to outside and use it as an proxy for all Skype installations

What we do With Nexthink, we can analyse and visualize which applications are executed We can see how they communicate Without relying on signatures

Application usage and control It is important to identify applications bypassing existing security controls Nexthink discovers applications bypassing security gateways and proxies

Application usage and control Discovering communication paths of applications is necessary to identify security gaps Nexthink provides out of the box visualization of all network connections, even inside the network and between clients

Application usage and control Identifying which application communicates to the outside can be cumbersome Nexthink provides information all applications with successful outside connections

Post infection/ Security incident analysis

A forensic story Recently, the german Bundestag (Parliament) was hacked, the investigation took several weeks The investigation turned out to be very difficult and took several weeks If available at all, security logs have been only stored for 7 days The investigation provided information of two artifacts found on one host:

Summary of findings

With Nexthink, this information can be easily used for investigations

With Nexthink, this information can be easily used for investigations

Providing instantly a list of machines infected...

...and timeline views of affected machines for further analysis

The Hacking Cases Winning the Battles Ransomware - Avoidance & Mitigation Insider Threats Discover infections & abnormal behavior Enhancing APT/ Sandboxing Solutions Identify gaps in your Application Control Policy Post infection/ Security incident analysis And more Firewall rules management (and validation) Identity and access management, VPN, NAC BYOD, Access control policy validation OS and patching compliance (desktops and servers!) PCI compliance

Ready?