About SecuPi. Your business runs on applications We secure them. Tel Aviv, 2014. Founded



Similar documents
WHITE PAPER SPLUNK SOFTWARE AS A SIEM

End-to-End Application Security from the Cloud

The Cloud App Visibility Blindspot

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

The Case For A Cloud Access Security Broker

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Caretower s SIEM Managed Security Services

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

APIs The Next Hacker Target Or a Business and Security Opportunity?

CyberArk Privileged Threat Analytics. Solution Brief

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Oracle Database Security Services

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Find the intruders using correlation and context Ofer Shezaf

The Hillstone and Trend Micro Joint Solution

Intelligent Security Design, Development and Acquisition

How To Protect Your Organization From Insider Threats

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Securing and protecting the organization s most sensitive data

SECURING SENSITIVE DATA WITHIN AMAZON WEB SERVICES EC2 AND EBS

Enterprise-Grade Security from the Cloud

Protect Your Business and Customers from Online Fraud

SIEM is only as good as the data it consumes

Secure Cloud Computing

Securing Sensitive Data within Amazon Web Services EC2 and EBS

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Stay ahead of insiderthreats with predictive,intelligent security

McAfee Network Security Platform

next generation privilege identity management

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Information & Event Management (SIEM)

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

RSA, The Security Division of EMC. Zamanta Anguiano Sales Manager RSA

Netzwerkvirtualisierung? Aber mit Sicherheit!

10 Things Every Web Application Firewall Should Provide Share this ebook

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

High End Information Security Services

GOOD PRACTICE GUIDE 13 (GPG13)

Cenzic Product Guide. Cloud, Mobile and Web Application Security

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Where every interaction matters.

RETHINKING CYBER SECURITY Changing the Business Conversation

Teradata and Protegrity High-Value Protection for High-Value Data

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

How To Create Situational Awareness

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

IBM Security Framework

PCI Compliance for Cloud Applications

Is your SIEM ready.???

RSA Security Analytics

Vulnerability Management

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Security Analytics for Smart Grid

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

National Cyber Security Month 2015: Daily Security Awareness Tips

ALERT LOGIC FOR HIPAA COMPLIANCE

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Jort Kollerie SonicWALL

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

IBM Security Strategy

Securing Remote Vendor Access with Privileged Account Security

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Security of Cloud Computing for the Power Grid

10 Smart Ideas for. Keeping Data Safe. From Hackers

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Evolving Threat Landscape

Transcription:

About Founded Tel Aviv, 2014 Category Enterprise Application Security & Information Theft Prevention Offices NY, London, Tel Aviv, Sao Paolo, Chile Solutions > Application User Behavior Analysis > Information Theft Prevention Your business runs on applications We secure them.

Agenda The Challenge: Preventing sensitive information theft by inside users and cybercriminals Enterprise applications are a blind spot in your security landscape Hackers and malicious insiders know it (75% of attacks target enterprise apps Gartner) Existing solutions lack context and real-time prevention The Difference Application-centric, real-time response to attacks from anywhere and anyone Seamless integration Quick implementation Cybercrime Prevention Solutions Introducing Application User Behavior Analysis (A-UBA) Information Theft Prevention

What do nearly all latest data breaches have in common?

Gartner: 75% of all breaches occur in applications Malicious Insiders >Privilege abuse >Orphan account abuse >Insider Fraud >New hires/resignations theft Hacker attacks > Man-in-the-browser >External fraud >Identity hijacking >APT Easy Easy Enterprise Applications: Packaged applications Home-grown / Custom Client web applications Difficult Customer Accounts 4

Cross-application real-time visibility and protection: putting the perimeter on the application 1. Real-time monitor of user s sensitive information exposure 2. Application-User Behavior Analysis, profiling and peer comparison 3. Alert, block, hide, redact, mask or authenticate (2 nd factor) in real-time before damage occurs! Difficult Difficult Enterprise Applications Customer Accounts 5

architecture - seamless integration Like any Application Performance Monitoring (APM) too, but with 1/10 the APM overhead Installed in minutes - on premise, cloud, hybrid No installations on end-points or databases - No DBA or SQL skills required! No source-code changes Integration with SIEM, AD, IAM and Malware protection Management Server IAM solutions light-agent Endpoint protection Business Applications (e.g., Websphere, Weblogic) Supports all Java application servers,.net (in dev.) / all web front-end apps Central forensics & Audit warehouse Sensitive Database Sensitive Database 5

comparison with APM (e.g., AppDynamics) Identical installation and operation to APM, but with 1/10 of APM overhead Cross-application sensitive data monitoring, auditing and forensics Packaged User Behavior Analysis and peer comparison - detecting malicious insiders and hackers Real-time prevention: Row Level Security, Dynamic Masking, hiding, blocking with no source-code changes Implementation best practices with SIEM/IAM/AD out-of-the-box integration

High-Level Competitive Analysis Threat Network Behavior Analysis DAM/Database Firewalls WAF Application Audit Database Audit IAM Network brutal-force attacks targeting databases - - Hacker hijack user credentials and attack application - - - - - - Malicious insider steal PII by abusing application privileges - - - - - Detect and prevent fraud in business No real-time end-to-end visibility and forensics No context (who was exposed to what, when where ) No sensitive information exposure preventive controls Limitations Java,.Net* and all apps with web GUI Blind to exposure, requires months of learning and tunings, high f/p application - - - - - - Blind to client IP s and users, stored procedures, app. multiplexing, caching or encryption, no controls Blind to sensitive information exposure Blind to sensitive information exposure Blind to information exposure Requires source-code changes and usage of API s

Immediate Value Across Applications Prevent sensitive information theft and fraud (SoD) across your applications Block application APT attacks and malicious insider abuse Monitor and restrict user access privileges via centralized policies across applications (to ensure need-to-know ) Improve compliance by tracking and restricting all PII exposure in real-time Eliminate SOC false positives & Increase SIEM ROI SecuP i Get sensitive information exposure monitoring, forensics and theft prevention within hours! Save investigation time and costs Save SIEM annual license costs

Our dashboard detects users that are accessing excessive amount of sensitive information compared to peers/co-workers

Suspicious user sensitive information exposure is analyzed based on numerous indicators, detecting malicious actors and hackers 10

provides single-point-of-evidence rich context on each sensitive transaction, including user, device fingerprint, role, LDAP/AD groups, SQL and full/partial Request result-set Parameters returned SQL Result set (full or sample) all loaded to big-data repository for analysis and forensic 11

Feed into SIEM (Splunk example) Confidential Information 13

enables various preventive actions: masking, redaction (Row Level Security), re-authentication, blocking Confidential Information 14