The Power of Dynamic Threat Intelligence to Stop APT s



Similar documents
The Hillstone and Trend Micro Joint Solution

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Deep Discovery. Technical details

First Look Trend Micro Deep Discovery Inspector

Cisco Advanced Malware Protection for Endpoints

REVOLUTIONIZING ADVANCED THREAT PROTECTION

User Documentation Web Traffic Security. University of Stavanger

Unified Security, ATP and more

Zak Khan Director, Advanced Cyber Defence

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

IBM Security IBM Corporation IBM Corporation

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

SPEAR PHISHING AN ENTRY POINT FOR APTS

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Advanced Threats: The New World Order

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Symantec Advanced Threat Protection: Network

Cisco Advanced Malware Protection

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

OVERVIEW. Enterprise Security Solutions

Symantec Advanced Threat Protection: Network

Vulnerability Management

WildFire. Preparing for Modern Network Attacks

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Fighting Advanced Threats

Extreme Networks Security Analytics G2 Vulnerability Manager

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Bridging the gap between COTS tool alerting and raw data analysis

You ll learn about our roadmap across the Symantec and gateway security offerings.

Introducing IBM s Advanced Threat Protection Platform

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Security Intelligence Services.

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

SANS Top 20 Critical Controls for Effective Cyber Defense

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Integrating MSS, SEP and NGFW to catch targeted APTs

McAfee Network Security Platform

Cisco Advanced Malware Protection for Endpoints

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Requirements When Considering a Next- Generation Firewall

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Analyzing HTTP/HTTPS Traffic Logs

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

IBM Endpoint Manager Product Introduction and Overview

Symantec Endpoint Protection

AppGuard. Defeats Malware

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

overview Enterprise Security Solutions

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Breaking the Cyber Attack Lifecycle

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Advanced Persistent Threats

The Sophos Security Heartbeat:

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

The Symantec Approach to Defeating Advanced Threats

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Secure Your Mobile Workplace

IBM Security QRadar Vulnerability Manager

24/7 Visibility into Advanced Malware on Networks and Endpoints

A New Approach to Assessing Advanced Threat Solutions

Windows Server 2003 End of Support. What does it mean? What are my options?

Cloud App Security. Tiberio Molino Sales Engineer

ENABLING FAST RESPONSES THREAT MONITORING

CyberArk Privileged Threat Analytics. Solution Brief

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Host-based Intrusion Prevention System (HIPS)

TRITON APX. Websense TRITON APX

Security Information & Event Management (SIEM)

Advanced Threat Protection with Dell SecureWorks Security Services

End-user Security Analytics Strengthens Protection with ArcSight

VESZPROG ANTI-MALWARE TEST BATTERY

Securing the endpoint and your data

FROM PRODUCT TO PLATFORM

Superior protection from Internet threats and control over unsafe web usage

Enterprise Security Platform for Government

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

From the Bottom to the Top: The Evolution of Application Monitoring

Transcription:

The Power of Dynamic Threat Intelligence to Stop APT s Evren BILGIC Senior Sales Engineer, Mediterranean Region evren_bilgic@trendmicro.com

The Headlines Tell Only Half The Story 2 Copyright 2015 Trend Micro Inc.

The Other Half of the Story 78% 86% 79% Of Have organizations active network Command attacks have zero and or day Control or unknown in exploits their networks malware 3 Source: Live proof of concepts 101 customers, 2015 Copyright 2015 Trend Micro Inc.

Today s business reality 75% of attacks require little skill to execute 1 yet require advanced skills to detect and remediate 63% of security professionals believe it is only a matter of time until their enterprise is targeted 2 $5.9M is average cost of targeted attack 3 1. Verizon 2: Source: ISACA APT Awareness Study, 2013 3. Ponemon May 2014

Advanced Attacks Problem: Data has to be moved and shared in and out. Traditional approaches provide a baseline Firewall/IPS Endpoint Protection Email Gateway/Server Web Gateway 5 Copyright 2015 Trend Micro Inc.

Advanced Attacks Problem: Data has to be moved and shared Traditional approaches provide a baseline New attacks use sophisticated methods to gain access All ports, all protocols Spear phishing Island hopping Once inside, attacks can change and start stealing data. Tracking back and analyzing these attacks are complex and require specialized knowledge. 6 Copyright 2015 Trend Micro Inc.

7 Dealing with Targeted Attacks: Traditional defences still work. Who can afford to replace them? Network sizing means organizations just need more sandboxes Specialized labour to analyze advanced malware is hard to find Time and expense reacting to advanced threats is growing

A Network Defense Solution Organizations need to protect and leverage existing investments in security infrastructure A centralized Deep Discovery solution to integrate with those existing investments extends their reach. 8 Copyright 2015 Trend Micro Inc.

Deep Discovery Products Deep Discovery Email Deep Discovery Analyzer Inspector Analysis of suspicious Detect & payloads block attempts and URLs with custom to sandbox. phish credentials Ability to share insight with and/or both establish Trend Micro a point and third party of entry solutions within the network LAN/WAN/WLAN Email Gateway Deep Discovery Inspector Detect targeted attacks by monitoring all network traffic, plus analysis of network payloads with custom sandbox 9 Copyright 2015 Trend Micro Inc. Data Center

Deep Discovery Analyzer Integrated Sandboxing Analysis Endpoints Gateways Network An open sandboxing analysis server to enhance the targeted attack protection of Trend Micro and 3 rd party security products Detection of advanced malware Detailed analysis & reporting Open Web Services API Custom Defense IOC intelligence sharing Enhance the threat protection of your existing security investments

Key Features Custom Sandboxes Broad Analysis Engines Global Threat Intelligence Custom sandbox images precisely match your desktop and server environments (language, OS, configuration) to accurately detect the threats targeting your organization vs. a standard sandbox that can be evaded. Multiple detection engines and correlation rules analyze a wide range of file types and URLs to detect all attack aspects not just malware Real-time cloud intelligence & research powers detection accuracy and continuously updates engines and rule sets URL and File Analysis Integrated solution can analyze all document types, URLs and exe files. Seamless Integration Shared IOC data from new sandbox detections updates Trend Micro and 3rd party products to create a real-time custom defense

Deep Discovery Analyzer Suspicious objects that are discovered by InterScan and Scanmail Security products are sent to Analyzer sandbox OfficeScan will also be able to send suspicious objects Interscan Web Security Interscan Messaging Security Deep Discovery Analyzer Analyzer offers a Web API that allows third party products to submit to Analyzer API Third Party ScanMail Email Security System administrators also have the ability to manually submit samples Manual Submissions OfficeScan

Deep Discovery Analyzer Suspicious URLs, Files, and exe files are executed in the Deep Discovery Analyzer and analyzed for: Advanced malware Command and Control (C&C) Anti-security, self-preservation Autostart or other system configuration Deception, social engineering File drop, download, sharing or replication Hijack, redirection, or data theft Malformed, defective or with known malware traits Process, service or memory object change Rootkit, cloaking Suspicious network or messaging activity Other threat characteristics Interscan Web Security API Third Party Manual Submissions Interscan Messaging Security OfficeScan ScanMail Email Security Deep Discovery Analyzer

Deep Discovery Analyzer Results/Reports are sent back to requesting system. Based on risk score Highly configurable In some cases black lists are automatically updated such that similar attacks in future are thwarted. Emails can be blocked in real time Interscan Web Security API Third Party R R L R Interscan Messaging Security L X ScanMail Email Security Deep Discovery Analyzer R X R R L R L X Reporting Black List / Patterns / IOCs Email Blocking Manual Submissions OfficeScan

Top 3 Solution Differentiators Smart Better detection Simple Low cost to deploy & manage Security that fits Fits evolving ecosystem & enables sharing of intelligence across solution areas

Smart Proven detection of targeted attacks Detection Total Cost of Ownership

Simple Low cost to deploy & manage Single centralized appliance that seamlessly integrates into existing infrastructure with a common management console Highly visual, interactive web interface offers the most relevant threat intelligence at your fingertips Zero-cost access to the Trend Micro Smart Protection Network (global threat intelligence) 17 Copyright 2015 Trend Micro Inc.

Security That Fits Fits evolving ecosystem & enables sharing of threat intelligence across solution areas Integration with existing security investments Automatic threat intelligence sharing with Trend Micro products Sharing of threat intelligence with other security products 18 Copyright 2015 Trend Micro Inc.

Targeted Attack Simulation Game http://targetedattacks.trendmicro.com 19 Copyright 2015 Trend Micro Inc.

Thanks.. We are at Olympia Hall, Booth O17 Ευχαριστώ.. 20 Copyright 2015 Trend Micro Inc.

Back-up Slides 21 Copyright 2015 Trend Micro Inc.

SIEM Firewall / IPS Control Manager Gateway 22 Deep Security Deep Discovery Scan Mail Interscan OfficeScan Copyright 2015 Trend Micro Inc. Deep Discovery

Trend Micro: Connected Threat Defense Enable rapid response through delivery of real-time signatures and security updates RESPOND PREVENT Assess potential vulnerabilities and proactively protect endpoints, servers and applications Analyze risk and nature of attack and attacker, and assess impact of threats retrospectively ANALYZE Insight & Control DETECT Detect advanced malware, behavior and communications invisible to standard defenses