Next Generation Firewalls and Sandboxing



Similar documents
Veranderende bedreigingen Security in het virtuele datacenter

FortiSandbox. Multi-layer proactive threat mitigation

Networking for Caribbean Development

Protection Against Advanced Persistent Threats

MSSP Advanced Threat Protection Service

The Hillstone and Trend Micro Joint Solution

Fighting Advanced Threats

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Next Generation Enterprise Network Security Platform

High Performance NGFW Extended

SourceFireNext-Generation IPS

Internal Network Firewall (INFW) Protecting your network from the inside out

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Content-ID. Content-ID URLS THREATS DATA

McAfee Network Security Platform

Next-Generation Firewalls: Critical to SMB Network Security

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

The Evolution of the Enterprise And Enterprise Security

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Agenda , Palo Alto Networks. Confidential and Proprietary.

Symantec Advanced Threat Protection: Network

Cisco Advanced Malware Protection for Endpoints

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Market Guide for Network Sandboxing

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Security Services. 30 years of experience in IT business

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Virtualization Journey Stages

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Modular Network Security. Tyler Carter, McAfee Network Security

Cisco Small Business ISA500 Series Integrated Security Appliances

Importance of Web Application Firewall Technology for Protecting Web-based Resources

overview Enterprise Security Solutions

TRITON APX. Websense TRITON APX

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Network Security Solution. Arktos Lam

Simple security is better security Or: How complexity became the biggest security threat

Defending Against Cyber Attacks with SessionLevel Network Security

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

FROM PRODUCT TO PLATFORM

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Next-Generation Firewalls: CEO, Miercom

Check Point: Sandblast Zero-Day protection

Data Center security trends

Achieve Deeper Network Security

Intrusion Defense Firewall

REVOLUTIONIZING ADVANCED THREAT PROTECTION

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Devising a Server Protection Strategy with Trend Micro

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewall Testing Methodology W H I T E P A P E R

Devising a Server Protection Strategy with Trend Micro

Requirements When Considering a Next- Generation Firewall

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

WildFire. Preparing for Modern Network Attacks

Using Palo Alto Networks to Protect the Datacenter

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

Breaking the Cyber Attack Lifecycle

Achieve Deeper Network Security and Application Control

Secure Cloud-Ready Data Centers Juniper Networks

SonicWALL Unified Threat Management. Alvin Mann April 2009

Gateway Security at Stateful Inspection/Application Proxy

Firewall Sandwich. Aleksander Kijewski Presales Engineer Dell Software Group. Dell Security Peak Performance

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

On-Premises DDoS Mitigation for the Enterprise

Cisco Advanced Malware Protection for Endpoints

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Deep Security Vulnerability Protection Summary

Unknown threats in Sweden. Study publication August 27, 2014

External Supplier Control Requirements

Unified Security, ATP and more

Locking down a Hitachi ID Suite server

FortiGuard Security Services

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Fortigate Features & Demo

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Covert Operations: Kill Chain Actions using Security Analytics

Bio-inspired cyber security for your enterprise

24/7 Visibility into Advanced Malware on Networks and Endpoints

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Network Firewall (INFW)

Content Security: Protect Your Network with Five Must-Haves

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Next Generation Firewall

Transcription:

Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk

Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing? Advanced threat protection. Features. Deployment.

Under constant attack Data breaches, targeted attacks, outages, customer and financial information stolen. How can this happen? I have antivirus! Attacks are becoming more sophisticated. Specially crafted attacks using custom and often highly tailored malware.

Advanced Threats We re using state-of-the-art computer systems, so this could potentially be a threat to others in the industry

New security approaches Next Generation Firewall Sandboxing & Payload Analysis

NGFW : Next Generation Firewall A high performance firewall with application awareness, deep packet inspection, intrusion prevention and threat intelligence capabilities.

NGFW : How are NGFW different? Widening the 5-Tuple Application awareness and DPI (Deep Packet Inspection) IP reputation database and Geo-IP Awareness User and device awareness. Intrusion Prevention System Defends against network borne attacks DOS, XSS, Viruses, Buffer-Overflows, Brute-Force Primarily signature or pattern based 2014 Verizon Breach Report

NGFW : Performance is key 100Mbps, 1GE, 10GE, 40GE and 100GE networks = Big demands Measured in throughput (Gbps) and Latency (µs or ms). ASIC or x86 architectures. Encrypted traffic is growing rapidly. Widespread adoption of Cloud. ASIC = Application Specific Integrated Circuit

NGFW : Deployment : Edge Network Perimeter / Edge Secures North South traffic. Protects against inbound attacks from the internet. Prevents, identifies and blocks malicious outbound traffic. Traditional role of a firewall.

NGFW : Deployment : Internal Internal Network Firewall (INFW) Secures East West traffic. Transparent, invisible. Identifies threats and intrusions, near-zero deployment. Throughput is key. 75% of datacentre traffic is east-west, compared to 17% northsouth through the network edge* Virtualisation. Cloud. Flat networks. *Remaining traffic is inter-dc traffic.

NGFW : Best practices and Features 1. Application awareness. Least privilege. 2. Intrusion Prevention. 3. IP reputation and Geo-IP. 4. External threat intelligence. 5. Zoning and Segmentation. 6. Management. 7. Monitoring. Firewall Breaches

NGFW : Single vendor? Multi-vendor? It is generally not more secure to use firewalls from multiple vendors to protect enterprise networks. Most enterprises should standardize on a single firewall platform to minimize self-inflicted configuration errors Through 2018, more than 95% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws More companies are using outsourced services from MSSPs instead of, or working with, their existing IT resource.

NGFW : Network Traffic Analysis Next Generation Firewall Sandboxing & Payload Analysis

Sandboxing Advanced Threat Prevention

Sandboxing : Introduction

Sandboxing : NGFW scenario

Sandboxing : What is a Sandbox? Secure virtual runtime environment exposes unknown threats. Physical appliance or virtual-machine. Tests files in a secure environment. Report (Good or Bad). Creates signatures that are used by the IPS system and endpoint protection.

Sandboxing : Operation Call Back Detection Full Virtual Sandbox Code Emulation Cloud File Query Identify the ultimate aim, call back & exfiltration Mitigate w/ analytics Examine real-time, full lifecycle activity in the sandbox to get the threat to expose itself Quickly simulate intended activity with code emulation OS independent & immune to evasion high catch rate Check community intelligence & file reputation AV Prefilter Apply top-rated anti-malware engine

Sandboxing : How does it work? Files Productivity (Word, Excel, PDF) Archives (.rar,.zip,.tar.gz,.cab) Executables (.exe,.dll) Media (.avi,.mpeg,.mp3,.mp4) Protocols HTTP, FTP, POP3, IMAP, SMTP, SMB, IM SSL equivalent versions No such thing as a benign file. Blocking Macros or Executables doesn t solve the issue.

Sandboxing : Deployment & Operation Sniffer passive detection. Integrated active detection. API JSON submission. Application integration. Manual Manual submission (by users). Automatic Scan file shares (SMB/CIFS) Cloud

Sandboxing : Evasion Be scared evasion techniques. Human interaction Requires mouse clicks, scrolling or human behaviour to trigger. RTF pfragments exploit is an example ( reverse Turing ) Configuration Specific Understand Sandbox constraints Execution time, analysis time. Environment Specific Attempts to detect virtual environment. VMTools, registry, drive serial numbers, MAC addresses, drivers

Sandboxing : Performance Files per Hour Entry Level 160 per hour Advanced 560 per hour AV scanning Entry Level 6,000 per hour Advanced 15,000 per hour Number of VMs Entry Level 8 Advanced 28 Microsoft licensing (Windows, Office) Figures based on Fortinet FSA-1000D and FSA-3000D

Sandboxing : Effectiveness FortiSandbox 99% detection. Results delivered within 1 minute. NSS Labs Breach Detection (BDS) Evaluated on effectiveness and TCO per Mbps (bang per buck) Other vendors Trend Micro SourceFire (Cisco) FireEye AhnLab OpenSource Option (Cuckoo, Sandboxie, Malwr)

Summary NGFW Securing the network edge INFW in transparent or segmented mode East-West Traffic is 5x higher than North-South Sandboxing Payload analysis. Classification of custom-malware, unknown, targeted and advanced threats. Creates signatures for use by IPS. Sniffer mode, API or integrated.

Thank you - Questions? joe@servicetech.co.uk 07624 487335