A New Era of Cybersecurity Neil Mohammed, Sales Engineer



Similar documents
Raytheon Oakley Systems

ENABLING FAST RESPONSES THREAT MONITORING

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Analyzing HTTP/HTTPS Traffic Logs

Content Security: Protect Your Network with Five Must-Haves

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

WEBSENSE SECURITY SOLUTIONS OVERVIEW

TRITON APX. Websense TRITON APX

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Comprehensive real-time protection against Advanced Threats and data theft

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Unified Security, ATP and more

High End Information Security Services

Enterprise Cybersecurity: Building an Effective Defense

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Comprehensive Advanced Threat Defense

WEBSENSE TRITON SOLUTIONS

Requirements When Considering a Next- Generation Firewall

Fighting Advanced Threats

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Cybersecurity Delivering Confidence in the Cyber Domain

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

24/7 Visibility into Advanced Malware on Networks and Endpoints

Security Analytics for Smart Grid

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

How To Manage Security On A Networked Computer System

Detect & Investigate Threats. OVERVIEW

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

The webinar will begin shortly

Fight fire with fire when protecting sensitive data

Cisco Cyber Threat Defense - Visibility and Network Prevention

GOING BEYOND BLOCKING AN ATTACK

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

SPEAR PHISHING AN ENTRY POINT FOR APTS

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Security Intelligence Services.

The Cloud App Visibility Blindspot

How To Buy Nitro Security

Can Your Organization Brave The New World of Advanced Cyber Attacks?

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Discover & Investigate Advanced Threats. OVERVIEW

Vulnerability Management

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

End-user Security Analytics Strengthens Protection with ArcSight

Increase insight. Reduce risk. Feel confident.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Agenda , Palo Alto Networks. Confidential and Proprietary.

KEY TRENDS AND DRIVERS OF SECURITY

CylanceINFINITYENGINE: Applying Data Science to Advanced Threats

Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper.

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

TRENDS IN THE THREAT LANDSCAPE

Symantec Consulting Services

EnCase Analytics Product Overview

INSERT COMPANY LOGO HERE

V1.4. Spambrella Continuity SaaS. August 2

Carbon Black and Palo Alto Networks

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

1 Introduction Product Description Strengths and Challenges Copyright... 5

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Advanced Threats: The New World Order

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Cyber and Operational Solutions for a Connected Industrial Era

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

RETHINK SECURITY FOR UNKNOWN ATTACKS

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

End-to-End Application Security from the Cloud

Vendor Landscape: Security Information & Event Management (SIEM)

Next Generation Enterprise Network Security Platform

CyberArk Privileged Threat Analytics. Solution Brief

McAfee Network Security Platform

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

and Security in the Era of Cloud

You ll learn about our roadmap across the Symantec and gateway security offerings.

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security Services: Data Loss Prevention Monitoring Overview

Endpoint Threat Detection without the Pain

REPORT Perimeter Security Defenses. State of Perimeter Security Defenses, Time to Think Different?

Cisco Advanced Malware Protection for Endpoints

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

AMPLIFYING SECURITY INTELLIGENCE

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

#ITtrends #ITTRENDS SYMANTEC VISION

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

anomaly, thus reported to our central servers.

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Strategies for assessing cloud security

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

The Benefits of an Integrated Approach to Security in the Cloud

Transcription:

A New Era of Cybersecurity Neil Mohammed, Sales Engineer Copyright 2015 Raytheon Company. All rights reserved.

R W Market Advantages Strong Financial Backing Accelerated Innovation Increased Breadth and Depth Full spectrum of security solutions that span the full life cycle of advanced external attacks Sophisticated insider theft controls Greater Integration Tighter security unified across networks, the cloud, endpoints and mobile devices Higher value through less hardware, fewer consoles, and lower training requirements

Learning from History Recent Failures General Dynamics Boeing Commercial and Federal are Different Separation must be at the Highest Level Product Synergy Must Make Sense

Types of Merges/Acquisitions Conglomerate Horizontal Vertical

ThreatScope Sandbox Technology Applies ACE analytics Infection process post-infection activity Track infected system activity System level events/behavior/changes Processes, registries, files, etc. Communication monitoring Connection type, method, etc.

ThreatScope Reporting

SureView Threat Protection Capabilities and Differentiators Detection framework encompasses static, behavioral, heuristic, signature-based, file context, metadata and machine learning methods Proprietary hypervisor technology thwarts attacker attempts to evade virtual machines Enhanced visibility with advanced endpoint capabilities Detection and Prevention modes of operation Extensible detection framework to quickly integrate proprietary and third-party solutions Threat Sandbox detects zero-day attacks across web, email, and endpoints 7

SureView Threat Protection Malware (Email) Infection Detection Use Case: Malware Detected from Email Attachment 1. Email platform receives email with attachment 2. Email platform queries SureView Threat Protection platform in real-time to determine whether or not email attachment contains malware 3. SureView Threat Protection platform runs file through multiple malware detection algorithms, including sandboxing and machine learning 4. If presence of malware is determined, SureView Threat Protection platform can block the email in realtime 5. Analyst receives malware alert in Web UI 8

Sandbox Roadmap

Beyond Feature/Function

1

Visibility is at the Crux of the Issue The digital revolution has obfuscated visibility Organizations cannot manage threats they cannot see 1

SureView Insider Threat Capabilities and Differentiators Comprehensive user activity monitoring across all channels at endpoint DVR-like playback forensics capabilities Proven scalability and performance based on Easy-to-author and flexible policy creation capabilities with deployment at some of the largest environments pre-packaged policy packs Built-in privacy protection Complete visibility into and context around end user activity and behavior Easy aggregation of external data and integration of third-party and custom analytics 13

SureView Insider Threat Management Controls Role-based Access Robust Operator Auditing Segregation of Collected Data Chain of Custody Features Non-technical Oversight Integration with 3 rd party enterprise tools such as epo and various SIEM s -ArcSight, Splunk, etc. Access based on role, business needs, and authorization 1

SureView Policy-Driven Auditing AUDITED ACTIVITY File write to removable media File contains sensitive data fingerprinted text SAP code names AUDIT RECORD Date/Time, Username, Workstation Offending Device Action: Capture File Action: <email> Security Staff Action: <forward> ArcSight Specify what to audit / what should be in the audit record Specify what not to collect Ex: Do not collect email to/from chaplain@unit.army.mil Leverage simple If/Then statements Enable Multiple Stakeholders US DoD Image 1

Return on Investment Forrester Research recently completed a study entitled, The Total Economic Impact of Raytheon s SureView. Source: The Total Economic Impact of Raytheon s SureView. Forrester, 2014 1

Intuitive User Experience Provides end-to-end visibility, context, and protection across enterprise 1 17

DLP Web Secure Network Segmentation Email User Behavior Forensics APT Protection Server Security

The Focus Copyright 2015 Raytheon Company. All rights reserved.

CUSTOMERS GOODS & SERVICES BUSINESS DATA $ MONEY IDEAS 2015 Websense, Inc. Proprietary and Confidential.

2013 2.25 million 2017 4.25 million CYBERSECURITY SKILLS GAP CONTINUES TO GROW Market indicators show the need for as many as 4.25 million security professionals by 2017, representing the potential for a 47% shortage in qualified personnel. 2013 (ISC)2 Global Information Workforce Study = 250,000 security professionals 2015 Websense, Inc.

Exploits DLP Botnets Application Controls Zero-day Forensics DATA THEFT PREVENTION Real-time Analytics APTs Sandboxing Spear-phishing Threat Intelligence 2015 Websense, Inc. Proprietary and Confidential.

DATA OUTBOUND ACTIVITY 2015 Websense, Inc. Proprietary and Confidential.

1 2 3 DEPLOY ADAPTIVE SECURITY For rapidly changing technology and threat landscapes. PROTECT EVERYWHERE For in the cloud data and applications as well as off-premise workers. RAISE THE SECURITY IQ For more skilled security professionals and more risk aware employees. 2015 Websense, Inc. Proprietary and Confidential.

Analytics takes Center Stage Understand and Prioritize Discover more about an entity that you know about (reactive/prevent) Investigate to understand patterns, find anomalies (proactive/detect)

WE ENABLE ORGANIZATIONS TO PREVENT DATA THEFT WHILE INNOVATING & GROWING IN THIS AGE OF DISRUPTIVE CHANGE. ENTER A NEW ERA OF CYBERSECURITY

Questions?

A Layered Approach for the New Normal

Real World Example. COMPANYA COMPANY B COMPANY C No Direct Attack Vector