Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Similar documents
Cisco Advanced Malware Protection

Cisco Advanced Malware Protection for Endpoints

Protection Against Advanced Persistent Threats

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Advanced Malware Protection for Endpoints

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Cisco Cybersecurity Pocket Guide 2015

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Content Security: Protect Your Network with Five Must-Haves

Braindumps QA

Cisco Web Security: Protection, Control, and Value

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

SourceFireNext-Generation IPS

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Deploying Next Generation Firewall with ASA and Firepower services

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Requirements When Considering a Next- Generation Firewall

Cisco Cloud Web Security

Cisco Security: Layered Protection from Blended Threats

Cisco ASA und FirePOWER Services

Cisco Master Security Specialization Practice Areas Summary. February 2016

TRITON APX. Websense TRITON APX

Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cisco Cloud Web Security Datasheet

Cisco Cloud Security Interoperability with Microsoft Office 365

Symantec Advanced Threat Protection: Network

Security Intelligence Services.

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Zak Khan Director, Advanced Cyber Defence

IBM Endpoint Manager Product Introduction and Overview

Delivering Control with Context Across the Extended Network

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Unified Security, ATP and more

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

The Hillstone and Trend Micro Joint Solution

Intelligent Cybersecurity for the Real World

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cloud Based Secure Web Gateway

Securing Your Business with DNS Servers That Protect Themselves

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Implementing Cisco IOS Network Security

Securing Virtual Applications and Servers

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Securing the endpoint and your data

Symantec Endpoint Protection

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

INTRODUCING isheriff CLOUD SECURITY

Symantec Endpoint Protection Datasheet

Sophistication of attacks will keep improving, especially APT and zero-day exploits

OVERVIEW. Enterprise Security Solutions

Introducing IBM s Advanced Threat Protection Platform

End-user Security Analytics Strengthens Protection with ArcSight

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Securing Your Business s Bank Account

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

SPEAR PHISHING AN ENTRY POINT FOR APTS

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

Building A Secure Microsoft Exchange Continuity Appliance

Combating a new generation of cybercriminal with in-depth security monitoring

Cloud App Security. Tiberio Molino Sales Engineer

Cisco RSA Announcement Update

The Attacker s Target: The Small Business

Total Defense Endpoint Premium r12

End to End Security do Endpoint ao Datacenter

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Fighting Advanced Threats

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Endpoint protection for physical and virtual desktops

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

White Paper. Five Steps to Firewall Planning and Design

Readiness Assessments: Vital to Secure Mobility

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Transcription:

Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016

The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious traffic 100% Cybercrime is lucrative, barrier to entry is low Hackers are smarter and have the resources to compromise your organization Malware is more sophisticated Organizations face tens of thousands of new malware samples per hour of organizations interacted with websites hosting malware Phishing, Low Sophistication Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape 1990 1995 2000 2005 2010 2015 2020 Viruses 1990-2000 Worms 2000-2005 Spyware and Rootkits 2005-Today APTs Cyberware Today +

Malware Will Get Into Your Environment 95% of large companies targeted by malicious traffic $5.9M Average cost of a breach in the United States 60% of data stolen in hours 65% of organizations say attacks evaded existing preventative security tools.

Once Inside, Organizations Struggle to Deal with It 33% of organizations take 2+ years to discover breach 54% of breaches remain undiscovered for months 55% of organizations unable to determine cause of a breach 45 days Average time to resolve a cyber-attack

Point-in-Time Detection Tools Alone Are Insufficient and Provide Limited or No Visibility Into Threats Once They Get in Event Horizon Antivirus Analysis Stops Not 100% Sleep Techniques Unknown Protocols Encryption Polymorphism Blind to scope of compromise Legacy IPS Initial Disposition = Clean Actual Disposition = Bad Too Late!!

Breach Prevention Detection Containment Remediation Continuously + Rapidly

Cisco AMP Provides Threat Intelligence, Point-in-Time Detection, and Continuous Analysis of Files to Defeat Advanced Threats Attack Continuum Before During After Before Discover During Detect After Scope Enforce Harden Block Defend Contain Remediate Threat intelligence and analytics Point-in-Time detection Retrospective security and continuous analysis Email and Web Data Center/Servers Network Endpoints Mobile

AMP Provides the Visibility and Control to Effectively Prevent, Block, Detect, and Remediate Advanced Threats Before an attack During an attack After an attack 1. Visibility See Detect Record, Analyze, Detect 2. Control Prevent Block and Contain Remediate with Threat Intelligence and Analytics with Point-in-Time Protection with Continuous Analysis and Retrospective Security

Threat Intelligence and Advanced Analytics AMP Strengthens Defenses Using Threat Intelligence and Malware Analysis Learn about threats faster Expertise Team of threat analysts/researches working to provide you with the latest threat intelligence 24/7 Knowledge base Extensive and growing back-end research on the latest threats and security trends Insight Analytics and behavioral indicators for your system written in plain English 35% worldwide email traffic 13 billion web requests per day 100 TB of data received daily 1.1 million incoming malware samples per day

Threat Intelligence and Advanced Analytics The Numbers Cisco Collective Security Intelligence 1001 1101 1110011 0110011 101000 0110 00 1001 1101 1110011 0110011 101000 0110 00 101000 0110 00 0111000 111010011 101 1100001 110 101000 0110 00 0111000 111010011 Cisco Collective 101 1100001 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 1100001110001110 1001 1101 1110011 0110011 10100 Security Intelligence Cloud WWW Email Endpoints 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints Experienced team of engineers, technicians, and researchers 35% worldwide email traffic Web 13 billion web requests 24x7x365 operations 4.3 billion web blocks per day 40+ languages 1.1 million incoming malware samples per day AMP Community Private/Public Threat Feeds Networks IPS Talos Security Intelligence AMP Threat Grid Intelligence AMP Threat Grid Dynamic Analysis 10 million files/month Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities AEGIS Program Devices Automatic updates in real time AMP Advanced Malware Protection

Point-in-Time Detection AMP Delivers the First Line of Defense, Blocking Known and Emerging Threats with Point-in-Time Defenses Automatically stop as many threats as possible, known and unknown One-to-one signature Offer better accuracy and dispositioning Fuzzy finger-printing Machine learning Block known and emerging threats Advanced analytics Static and dynamic analysis (sandboxing) Protect your business with no lag

But Point-in-Time Detection Alone Will Never Be 100% Effective

Continuous Analysis and Retrospective Security Only AMP Continuously Monitors and Analyzes All File Activity, Regardless of Disposition Across all control points WWW Email Web Network Endpoints Mobile Take advantage of key capabilities Identify a threat s point of origin Track it s rate of progression and how it spread See where it's been See what it is doing Surgically target and remediate To answer the questions that matter

The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense AMP Threat Intelligence Cloud Remote Endpoints AMP for Endpoints AMP on Firepower NGIPS Appliance (AMP for Networks) Threat Grid Malware Analysis + Threat Intelligence Engine AMP Private Cloud Virtual Appliance AMP on Cisco ASA Firewall with Firepower Services AMP for Endpoints AMP on Web and Email Security Appliances AMP on ISR with Firepower Services Windows OS Android Mobile Virtual MAC OS AMP for Endpoints can be launched from AnyConnect CentOS, Red Hat Linux for servers and datacenters CWS/CTA AMP on Cloud Web Security and Hosted Email

Deployment Options in Detail Private Deployment options AMP on ESA, WSA, ASA, CWS AMP for Networks (AMP on FirePOWER Network Appliance) AMP for Endpoints AMP Private Cloud Virtual Appliance Method License with ESA, WSA, CWS, or ASA customers Snap into your network Install lightweight connector on endpoints Deploy on-premises Virtual Appliance Ideal for New or existing Cisco CWS, Email/Web Security, ASA customers FirePOWER NGIPS customers Windows, Mac, Android, Linux, virtual machines; can also deploy from AnyConnect client High-Privacy Environments Details ESA/WSA: Prime visibility into email/web CWS: web and advanced malware protection in a clouddelivered service AMP capabilities on ASA with FirePOWER Services Wide visibility inside network Broad selection of featuresbefore, during, and after an attack Comprehensive threat protection and response Granular visibility and control Widest selection of AMP features Private Cloud option for those with high-privacy requirements Can deploy full air-gapped mode or cloud proxy mode For endpoints and networks Threat Grid Hybrid or on-premises integration On-premises integration in 1H 2016 Integrated into file analysis feature Integration coming in 1H 2016

If Something Gets in, Retrospective Security Helps You Find Answers to the Most Pressing Security Questions What happened? Where did the malware come from? Where has the malware been? What is it doing? How do we stop it? See AMP in Action! : https://www.youtube.com/watch?v=srqlhdxap5g