Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Similar documents
Trend Micro. Advanced Security Built for the Cloud

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

How To Manage Security On A Networked Computer System

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Cloud and Data Center Security

SANS Top 20 Critical Controls for Effective Cyber Defense

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

End-user Security Analytics Strengthens Protection with ArcSight

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Protect Your Cloud From Attack

Trend Micro Cloud Security for Citrix CloudPlatform

Comprehensive security platform for physical, virtual, and cloud servers

24/7 Visibility into Advanced Malware on Networks and Endpoints

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

PCI DSS 3.0 Compliance

Unified Security, ATP and more

Netzwerkvirtualisierung? Aber mit Sicherheit!

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

MANAGED SECURITY SERVICES (MSS)

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

McAfee Server Security

The SIEM Evaluator s Guide

The Hillstone and Trend Micro Joint Solution

Vulnerability Management

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

IBM Internet Security Systems

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

FISMA / NIST REVISION 3 COMPLIANCE

Current IBAT Endorsed Services

Introducing IBM s Advanced Threat Protection Platform

QRadar SIEM and Zscaler Nanolog Streaming Service

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Continuous Network Monitoring

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

IBM Security IBM Corporation IBM Corporation

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

IBM QRadar Security Intelligence April 2013

IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Total Protection for Compliance: Unified IT Policy Auditing

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Content Security: Protect Your Network with Five Must-Haves

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

External Supplier Control Requirements

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Trend Micro deep security 9.6

locuz.com Professional Services Security Audit Services

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Extreme Networks Security Analytics G2 Vulnerability Manager

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

IBM Security QRadar Vulnerability Manager

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Breaking down silos of protection: An integrated approach to managing application security

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Host-based Intrusion Prevention System (HIPS)

Safeguarding the cloud with IBM Dynamic Cloud Security

MANAGED SECURITY SERVICES (MSS)

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

LogRhythm and PCI Compliance

Modular Network Security. Tyler Carter, McAfee Network Security

Payment Card Industry Data Security Standard

How To Buy Nitro Security

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Critical Security Controls

QRadar SIEM and FireEye MPS Integration

CLOUD GUARD UNIFIED ENTERPRISE

IBM Endpoint Manager for Core Protection

2012 North American Managed Security Service Providers Growth Leadership Award

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

Spyders Managed Security Services

On-Premises DDoS Mitigation for the Enterprise

Strengthen security with intelligent identity and access management

SECURITY BEGINS AT THE ENDPOINT

Requirements When Considering a Next- Generation Firewall

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

I D C A N A L Y S T C O N N E C T I O N

How To Protect Your Network From Attack From A Network Security Threat

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Defending Against Cyber Attacks with SessionLevel Network Security

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

SecureVue Product Brochure

Fighting Advanced Threats

Transcription:

Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities are rampant, insider threats are a constant, and now cloud computing and consumerization are opening the network even further to exploitation. To minimize your exposure and risk of data breach, analysts recommend a proactive strategy using not only network and host analysis tools but also cloud change detection and management to continually monitor your network and logs for malicious activity.

Threat Center Key Features Advanced Threat Deterrence and Detection Capabilities Inspect AWS Changes through the change detection layer with comprehensive vulnerability analysis Cloud Threat Intelligence, and continually updated threat detection rule sets Detect zero-day threats while minimizing false positives using multi-level correlation Detect malware command and control communication with web reputation Inspect AWS environment for unauthorized applications and malicious hosts Isolate suspicious endpoints pending mitigation Automated Threat Remediation Performs real-time automated mitigation triggered by AWS Discovery Appliance Uses advanced forensic techniques to locate and eliminate malware without signatures 1 Identifies and rolls back any system changes made by malware Uses built in workflow engine to route violations and incident management Threat Analysis and Reporting Provides end-to-end visibility of threat activity and status Offers automated drill down forensic analysis of non-compliant changes, behavior, communication, source, and channel of entry Delivers customizable event alarms Supports multi-level reporting for network managers and security executives Risk Management Services Offerings Proactive monitoring and alerting Threat analysis and advisory Threat remediation assistance Risk posture review and analysis Strategic security planning 1 Available with DevOps module only

Detect and Protect Against Non-compliant cloud changes Advanced Persistent Threats Targeted network exploits Web-based threats (web exploits, cross-site scripting) Sensitive data loss or transfer Bots, Trojans, and Worms Key Loggers and Crimeware Disruptive applications Key Benefits Cloud Transparency and Control Real-time network-wide protection from advanced attacks Automated Threat Remediation Stop evasive intrusions without manual intervention and endpoint downtime Threat Behavior Analysis Forensic analysis provides insight needed to optimize risk posture Reduced Cost & Complexity Host-Based IDS CloudAware Threat Center includes host-based intrusion detection. Cloudasware IDS is a full platform to monitor and control systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful solution. IDS Features and Benefits File Integrity Checking Log monitoring Rootkit and Malware Detection Detect unmonitored servers Trending attacks and hosts Geo-IP Enabled Custom Policy Integrated Incident Management

Compliance Requirements Cloudaware IDS helps customers meet specific compliance requirements such as PCI, HIPAA etc. It lets customers detect and alert on unauthorized file system modifications and malicious behavior embedded in the log files of COTS products as well as custom applications. For PCI, it covers the sections of file integrity monitoring (PCI 11.5, 10.5), log inspection and monitoring (section 10) and policy enforcement/checking. Multi Platform Cloudaware IDS lets customers implement a comprehensive host based intrusion detection system with fine grained application/server specific policies across multiple platforms such as Linux, Solaris, AIX, HP-UX, BSD, Windows, Mac and Vmware ESX. Real-time and Configurable Alerts Cloudaware IDS lets customers configure incidents they want to be alerted on which lets them focus on raising the priority of critical incidents over the regular noise on any system. Integration with smtp, sms and syslog allows customers to be on top of alerts by sending these on to e-mail and handheld devices such as cell phones and pagers. Active response options to block an attack immediately is also available. Integration with Current Infrastructure Cloudaware IDS will integrate with current investments from customers such as SIM/SEM (Security Incident Management/Security Events Management) products for centralized reporting and correlation of events. Centralized Management Cloudaware IDS provides a simplified centralized management server to manage policies across multiple operating systems. Additionally, it also lets customers define server specific overrides for finer grained policies. Agent and Agentless Monitoring Cloudaware IDS offers the flexibility of agent based and agentless monitoring of systems and networking components such as routers and firewalls. It lets customers who have restrictions on software being installed on systems (such as FDA approved systems or appliances) meet security and compliance needs.

Features Multilevel Threat Management CloudAware Threat Center continuously processes security events from multiple sources. Events are correlated across inputs by source IP address, vulnerability type, username and host of other common attributes. Threat center detects coordinated attacks and suspicious activity regardless whether it is coming from inside or outside. Cloud Change Detection and Risk Assessment Network Visibility and Control System Level Protection Pro-active Vulnerability Assessment Detect Non-Compliant changes in AWS that pose security risk. Integrate with Snort to provide real-time visibility and insight. PCI and HIPAA endpoint protection Automated risk assessment and handling based on scan results. Identify security changes that weaken security posture Generate cloud change audit-feed Mitigate AWS weak access control model Signature, protocol, and anomaly based inspection Buffer overflows, CGI attacks, SMB probes Real-time alerts and IPS File integrity checking Log monitoring Rootkit and malware detection Covers PCI DSS 11.5 and 10.5.5 Proactive vulnerability discovery Identify un-scanned assets Workflows for handling new vulnerabilities and resolutions

Traditional Risks Advanced Persistent Threats Targeted network exploits Web-based threats (web exploits, cross-site scripting) Email-based threats (phishing, spear-phishing) Sensitive data loss or transfer Bots, Trojans, and Worms Key Loggers and Crimeware Cloud Specific Risks AWS API and Console privileged access Rogue hosts (unauthorized AMIs) Hosts running outside of secure perimeter (VPC) AWS best practice compliance Sensitive data stored on AWS instances Non-Compliant cloud changes Inability to detect changes Data location Data segregation Insecure or incomplete data deletion CMDB Integration Any IDS will show you what hosts it is scanning, but CloudAware Threat Center can actually show you which hosts have not been scanned or are not running IDS agents. This information is available to CloudAware via its highly integrated CMDB module. CMDB contains information not only about what is installed and running on machines but also information about relationships between instances and applications. Threat center uses this relationship data to quickly map emerging threats against applications and environments.

Automated Scan Initiation CloudAware has API integration with WhiteHat security and Tenable. Either on-demand or automatically when certain conditions have been met, CloudAware can request either provider to scan the application. For example if new application is launched in production, CloudAware user can configure an automatic workflow to kick off a WhiteHat scan as soon as the application is up and running. Rapid Deployment Using CloudAware deployment orchestration module, you can deploy IDS agents to 1000s of servers in a single day. CloudAware supports technologies such as Puppet, Chef and Ansible and provides modules for its IDS agents for all of these configuration management tools.

Continuous Monitoring With 24x7 Security Operations Center With a focus on managed security services (MSS) and cloud threat intelligence, Cloudaware SOC protects traditional and cloud environments. Clients are able to optimize security programs, make informed decisions, achieve compliance and reduce costs. Built on the patented, cloud-based MultiThreat service platform, global threat intelligence from the Security Engineering Research Team (SERT) and certified AWS Engineers, CloudAware services are delivered 24/7 through multiple state-of the art security operations centers (SOCs) Five Problems We Solve 1. Inability to correlate inside and outside attacks. 2. Not knowing where gaps in security are. 3. End-to-end threat visibility and status 4. Detecting new cloud-level attacks. 5. Taking too long to deploy IDS across the board.