HOW TO DEAL WITH THE ADVANCED THREAT LANDSCAPE?



Similar documents
REVOLUTIONIZING ADVANCED THREAT PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Unified Security, ATP and more

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Concierge SIEM Reporting Overview

RSA Security Anatomy of an Attack Lessons learned

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection for Endpoints

Analyzing HTTP/HTTPS Traffic Logs

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Fighting Advanced Threats

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

QRadar SIEM and FireEye MPS Integration

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Bridging the gap between COTS tool alerting and raw data analysis

The Hillstone and Trend Micro Joint Solution

IBM Security IBM Corporation IBM Corporation

SourceFireNext-Generation IPS

The SIEM Evaluator s Guide

IBM SECURITY QRADAR INCIDENT FORENSICS

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Defending Against Cyber Attacks with SessionLevel Network Security

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Integrating MSS, SEP and NGFW to catch targeted APTs

Networking for Caribbean Development

Vulnerability Management

End-user Security Analytics Strengthens Protection with ArcSight

Content Security: Protect Your Network with Five Must-Haves

Next-Generation Firewalls: Critical to SMB Network Security

Detect & Investigate Threats. OVERVIEW

McAfee Network Security Platform

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Threat Containment for Facebook

ENABLING FAST RESPONSES THREAT MONITORING

Breaking the Cyber Attack Lifecycle

RSA Security Analytics

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Spear Phishing Attacks Why They are Successful and How to Stop Them

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Palo Alto Networks. October 6

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Content-ID. Content-ID URLS THREATS DATA

Advanced Endpoint Protection Overview

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

AppGuard. Defeats Malware

Under the Hood of the IBM Threat Protection System

Introducing IBM s Advanced Threat Protection Platform

On-Premises DDoS Mitigation for the Enterprise

Next Generation Firewalls and Sandboxing

IBM Advanced Threat Protection Solution

Protecting Your Organisation from Targeted Cyber Intrusion

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Comprehensive Advanced Threat Defense

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Check Point: Sandblast Zero-Day protection

APPLICATION PROGRAMMING INTERFACE

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Discover & Investigate Advanced Threats. OVERVIEW

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1

Endpoint Threat Detection without the Pain

Security Analytics The Beginning of the End(Point)

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Security Information & Event Management (SIEM)

Advanced Threat Protection with Dell SecureWorks Security Services

Getting Ahead of Malware

FROM PRODUCT TO PLATFORM

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Agenda , Palo Alto Networks. Confidential and Proprietary.

IBM QRadar Security Intelligence April 2013

Modular Network Security. Tyler Carter, McAfee Network Security

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Advanced Threats: The New World Order

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Advanced Endpoint Protection

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

DUBEX CUSTOMER MEETING

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Carbon Black and Palo Alto Networks

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Practical Threat Intelligence. with Bromium LAVA

DPI and Metadata for Cybersecurity Applications

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Next Generation Enterprise Network Security Platform

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Transcription:

HOW TO DEAL WITH THE ADVANCED THREAT LANDSCAPE? MAY 5 TH 2015 Erik Engberg Advanced Threat Defense Specialist Nordics & Benelux 1

THE BURNING QUESTION How To Prevent My Organization From Suffering Security Breaches? 2

WHAT WE ARE DEALING WITH 3

BURNING QUESTION TODAY How To Prevent My organisation organization From Suffering Security Breaches? Am I Ready To Respond? 4

NGFW IDS / IPS Host AV Web Gateway SIEM Email Gateway DLP Web Application Firewall ADVANCED THREATS BYPASSING DEFENCE IN DEPTH APTs Follow a Complex Kill Chain* Methodology SIGNATURE-BASED DEFENSE-IN-DEPTH TOOLS 2 4 6 1 3 5 7 Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives * Intelligence-Driven Computer Network Defense, Lockheed Martin, 2011 Traditional Advanced Threats Known Novel Malware Threats Zero-Day Known Malware Threats Targeted Known Attacks Files Modern Known IPs/URLs Tactics & Techniques SSL Create new variant = Back to 0 day! 5

ATTACKERS WINDOWS OF OPPORTUNITY OBJECTIVE: DECREASE TTD & TTR January February March April Time ATTACKER FREE TIME Need to collapse free time Initial Compromise Detection Containment 66% Takes Months or more to be discovered 7

THE INEVITABILITY OF THE CLICK *ThreatSim It only takes one person to compromise your network 8

A NEW DEFENSE REQUIRED Fixed fortifications are monuments to man s stupidity. General George S. Patton 9

GARTNER: FRAMEWORK FOR ADVANCED THREAT PROTECTION The traditional defense-in-depth components are still necessary, but are no longer sufficient in protecting against advanced targeted attacks and advanced malware. Today's threats require an updated layered defense model that utilizes "lean forward" technologies at three levels: network, payload (executables, files and Web objects) and endpoint. Five Styles of Advanced Threat Defense Combining two or all three layers offers highly effective protection against today's threat environment. Gartner, August 2013 10

POST-PREVENTION SECURITY GAP Percentage of Enterprise IT Security Budgets Allocated to Rapid Response Approaches by 2020. Gartner 2014 11

SITUATION IN SUMMARY Prevention alone not working: Strategic shift towards rapid detection and resolution Delay between first attack and vendor update: Increases TTD. >100k+ variants per day Self detection is rare: 67% of attacked discovered by third parties Multi-stage, multi-vector: Difficulty understanding kill chain in a timely manner Firefighting blindly over root cause: Lack of context and lack of content Pervasive by nature: Leveraging Paths of Trust. No Alerts = no visibility 12

THE CALL FOR A NEW SECURITY ARCHITECTURE The Four Stages of an Adaptive Protection Architecture Shift your security mindset from "incident response" to "continuous response," wherein systems are assumed to be compromised. The failure to stop targeted attacks requires security organizations to rebalance investments in all four stages. Source: Gartner (February 2014) Detective, preventive, response and predictive capabilities from vendors have been delivered in non-integrated silos. Source: Gartner, Designing an Adaptive Security Architecture for Protection from Advanced Attacks, 2014 The Gartner document is available upon request from https://www.gartner.com/doc/2665515/designing-adaptive-security-architecture-protection 13

ADVANCED THREAT PROTECTION LIFECYCLE DEFENSE Security Analytics Advanced Web/Mail Gateway Security Analytics Platform with ThreatBlades for nonweb protocols Incident Resolution Investigate & Remediate Breach Threat Profiling & Eradication GLOBAL INTELLIGENCE NETWORK Ongoing Operations Detect & Protect Block All Known Threats SWG & WebFilter Content Analysis Mail Threat Defense DLP Full Visibility with Encrypted Traffic Managment SSL Visibility Web Security Service Incident Containment Analyze & Mitigate Novel Threat Interpretation Dynamic malware analysis Sandboxing 14

BLUE COAT GLOBAL INTELLIGENCE NETWORK 75 Million users 1 Billion+ daily categorized web requests 3.3 Million+ threats blocked daily 80 categories 55 languages Anti-virus AV scanning Whitelisting Central cloud database Dynamic Real- Time Ratings Malware detection Global Intelligence Network Next-Generation Sandboxing 3 rd party feeds Malware expertise Quality checks Effective Advanced Threat Protection Real-time Cloud-based Zero-day Response Performance and Scalability Unrivaled Network Effect Blocks 3.3 million threats per day 15

MAPPING MALNETS SEARCH ENGINE POISONING MALVERTISING PORN MOBILE PHISHING Attack type doesn t matter. Zero-day exploits don t matter. 16

INTELLIGENT DEFENSE IN DEPTH Block Known Web Block Known Threats Web Threats ProxySG ProxySG Allow Known Good Content Allow Known Analysis System Good Content with Analysis Application System with Application Whitelisting Whitelisting Block Known Bad Block Downloads Known Bad Content Analysis System and with Mail Malware Threat Scanning Defense? Analyze Analyze Unknown Unknown Threats Threats Malware Analysis Appliance Block all known sources/malnets and threats before they are on the network Free up resources to focus on advanced threat analysis Reduce threats for incident containment and resolution Discover new threats and then update your gateways 17

CHALLENGES - ADVANCED MALWARE What is Advanced Malware? VM Evasive Targeted Polymorphic/one-day wonders Multi-Stage and Multi-Vector Sleeper Cell Malware Encrypted 43% percent of incident response engagements were the result of malware missed by perimeter defense and sandbox tools NTT 2014 Global Threat Intelligence Report 18

TRADITIONAL SECURITY MODEL WEAKNESSES REAL-TIME BLOCKING OF ALL THREATS IS NOT REALISTIC LAYERED DEFENSES WILL NEVER FILL ALL OF THE HOLES Unacceptable user delays Never-before-seen threats False sense of security Too many ways in Malware already present Users are the weakest link MODERN MALWARE EASILY DEFEATS TRADITIONAL FRONTLINE DEFENSES 19

STAGE 2: ANALYZE & MITIGATE 1 Ongoing Operations 2Incident Containment 3Incident Resolution Malware Analysis Appliance Next-Generation Sandboxing PC Emulator Virtual Machine 01010 10101 00101 10010 Dual-Detection Hybrid Analysis of Suspicious Samples Closely Replicates Customer s Gold Configurations Automated Risk Scoring and Rich Analysis Quickly analyze and prioritize advanced and zero-day threats for remediation and continuous security improvement 20

WHY ANALYZE MALWARE? CAN T WE JUST BLOCK IT? Malware analysis provides the critical information you need to effectively respond to malicious software threats that elude traditional defenses DETECT Suspicious Files in Your Infrastructure DETERMINE a Suspect File or URL Capabilities LOCATE All Infected Machines and Files UNDERSTAND Exactly How a Breach Occurred REMEDIATE to Reduce Future Vulnerabilities MEASURE and Contain Any Damage Done IDENTIFY Adversaries, Intentions, and Targets 21

BEHAVIORAL DETECTION PATTERNS POLYMORPHIC BINARIES Multiple malware variations with equivalent instructions SINGLE-DAY DOMAINS Malicious websites that disappear within 24 hours Patterns form the Basis of the MAA s Embedded Intelligence Behavior-based malware classification patterns flag events based on malicious activity Kernel-level, application-level, and user-level event detection patterns Open detection rules with custom criteria and relevant risk scoring Highly resistant to polymorphic binaries and auto-generated URLs 22

24

SOC CASE STUDY TALKING TO ANALYSTS 3AM: Nmap scan and buffer overflow detected Time to resolution: Quality of resolution: Assurance: Great, but what ACTUALLY happened before / after? Long (or never) Hard to say Low 25

LACK OF CONTEXT IDS/IPS = SINGLE FRAME (ALSO, THEY ARE SIGNATURE-BASED) 9A 26

BUT WHAT ABOUT OUR SIEM? - LACK OF CONTENT! SIEM ONLY AS GOOD AS THE LOGS BEING MONITORED 27

GO BIG DATA! RECORD AND INDEX ALL TRAFFIC TO ACHIEVE COMPLETE VISIBLITY (Don t forget SSL) 28

STAGE 3: INVESTIGATE & REMEDIATE 1 Ongoing Operations 2Incident Containment 3Incident Resolution Security Analytics Platform The security camera for your network Full Security Visibility of All Network Traffic Forensic Details Before, During and After an Alert Reduce Time-to- Resolution and Breach Impact The Security Camera for Your Network 29

WEB, MAIL & FILE THREAT IDENTIFICATION WebThreat BLADE inspects all HTTP or HTTPS traffic and identifies malicious communications and files MailThreat BLADE inspects all SMTP, POP3 and IMAP traffic for malicious communications and files FileThreat BLADE inspects all FTP and SMB traffic for malicious communications and files If no clear verdict on content, suspicious files are delivered to a hybrid sandbox for analysis Malware Analysis Appliance 30

SECURITY CAMERA FOR YOUR NETWORK Real-time indicators and retrospective forensics analysis on any attack Full details + All Artifacts = Clear Supporting Evidence = High Assurance Answer the critical post-breach questions that plague CISOs: who? what? where? when? why?... Faster time to identification/action/reaction with Security Analytics allows up to 85% faster resolution Multiple sources for real-time integrity & reputation of URL, IP address, file hash or email address Blue Coat Global Intelligence Network updated with newly-discovered threat intelligence 31

TAKE ADVANTAGE OF THE THREAT INTELLIGENCE NETWORK EFFECT NEW THREAT INTELLIGENCE SHARED LOCALLY AND GLOBALLY Increased system performance through fewer malware scans & detonations Incident Resolution GLOBAL INTELLIGENCE NETWORK Ongoing Operations Newly Identified & Known threats blocked at gateway More robust zero-day threat analysis with fewer false positives Greater accuracy and fewer threats to contain and resolve Incident Containment Efficient, fast and thorough Incident resolution 32

SECURITY ANALYTICS Key Features / Product details Copyright 2015 2014 Blue Coat Systems Inc. All Rights Reserved. 33

SECURITY ANALYTICS SOFTWARE OVERVIEW Web-based interface accessible from any browser Deep analysis of every network event Alerts for up-to-the-minute notification of suspicious, malicious, or prohibited behavior Investigator s interface quickly narrows or expands scope, shifts timeline Event and file recreation through Extractions Interactive reports on essential Layer 2-7 metadata 34

REPORTS Numerous customizable reports to instantly view granular detail of all event activity 35

THREAT RISK Verdicts stored by BLADE and reputation service Description Score Alert importance Very High Risk 10 Critical High Risk 8-9 Critical Moderate Risk 6-7 Warning Unknown 5 Notice Low Risk 3-4 No alert Very Low Risk 1-2 No alert 36

APPLICATION CLASSIFICATION AND DESCRIPTION Powerful Deep Packet Inspection (DPI) Locates evasive applications and malware Classifies network traffic by application fingerprint Extracts metadata to describe identities, actions, and content DPI improves directed search performance by up to 10X 2000+ 30 Application Families Applications and Protocols 6000+ Metadata Attributes I can now see all applications and files, regardless of the port they might be hiding on and digging through GBs of data is fast 37

EXTRACT AND RECONSTRUCT Reassemble packets into sessions and extracts application-layer artifacts See web pages exactly as they were seen by the user Safely exclude unsafe objects Retrieve web components from captured data or current state on web servers Reconstruct IM, email and VoIP sessions Filter instantly within results to find specific artifacts Search by MD5 or SHA1 hash Filename, size, file type, etc. I view an email as an email and a Word doc as a Word doc. Not just a bunch of packets. Nice! Example Artifacts Archive files (zip, rar, rpm) Images (bmp, gif, jpg, png) Multimedia (avi, flash, mov, mpg, wav, wmv), Office files (doc, docx, ppt, pptx, wpd, xls, xlsx), PDF, DLL, EXE, HTML, Java, FTP, email more 38

ARTIFACTS TIMELINE Visual representation of extracted network artifacts over time Helps analyst to quickly visualize a sequence of objects Substantially improves artifact search performance SMB and email are some of the most common transports for malware propagation, and Artifact Timeline lets me see the forest as well as the trees. 39

MEDIA PANEL Quickly analyze all images/audio files recreated from raw packets Filter by file type, extension, size See all associated metadata URL Source IP Destination IP Size MIME Type A Picture is worth a thousand words. No denying what my user saw good or bad. 40

GEOLOCATION Visually identify traffic (and volume of traffic) to locations of interest Filter and alert on traffic to suspect countries Integrated map database requires no external connection Configurable location of private networks Export data and view time-based representation of connections in Google Earth See hotspots of activity and where your traffic is coming from and going to Traffic to North Korea that s not right! 41

PACKET ANALYZER Enter Packet Analyzer through multiple starting points Save time: filter and view packets before transferring PCAPs over the wire No need to launch outside packet analysis applications No more waiting to download a huge file for Wireshark to analyze. It s Wireshark directly on the server that s efficient! 42

COMPARATIVE REPORTING Compare data to previous periods to identify abnormal patterns Establish a baseline and target deviations Understand trends over time I can compare traffic against a normal window of traffic and identify anomalies or discover trends. 43

FAVORITES/ALERTS/ACTIONS Rule-based alerting Use built-in attributes, custom objects (Favorites), or both Import custom favorites Tunable notification frequency Automate common queries and actions for additional analysis Automatically export a PCAP Send to file share Analyze with 3 rd -party tools like DLP You ll notify me if any interesting values or identified threats are seen on my network? Now you re telling me things I didn t know. That s what I need! 44

ROOT CAUSE EXPLORER You ve made one of the most time-consuming, rote functions of my job as simple as pushing a button That was easy! easy Automates tracing of HTTP referrer chains Correlates relevant email, IM, and HTTP information for quick analysis 45

REPUTATION SERVICES/ DATA ENRICHMENT On-demand Reputation Checks, including: ISC/SANS Google SafeBrowse VirusTotal Bit9 LastLine Domain Age RobText SORBS WHOIS I can lookup IPs, URLs, files and hashes against multiple reputation services? Multiply 12 keystrokes and 2 browser tabs by 100x a day and you just gave me an extra day a month! 46

PCAP IMPORT Rich analysis now applied to PCAPs from other sources Optimize available appliance storage - save captured data to PCAP for later import as needed Allows analyst to obtain high-level information quickly to aid investigation targeting Packet Renaissance It s like I ve traveled back in time and made my old data more valuable. 47

EXTENDED METADATA RETENTION Independent allocation of storage for metadata and full packets Allows for retention and analysis of multiple generations of metadata (months/years/ ) Enables long-term trend analysis window Optimize limited amount of storage I can save full packet data for a comfortable window of a few weeks or a month, but can save the metadata for a year or more to see trends. 48

PLAYBACK HISTORICAL DATA Transmit captured data flows to third party tools for further analysis Regenerate traffic with less than 1 ms of latency, even on 10GBps networks Throttle traffic playback so other tools don t bog down Replay traffic to other tools to validate effectiveness This is the DVR for my network. I can confirm that my other security tools are effective after signature updates. 49

FILTER AND REPLAY NETWORK TRAFFIC Replay any traffic Combine segments Throttle playback Filter Inbound/Outbound Traffic by protocol, IP, MAC address, payload type, or unique bit pattern Filter at the header or payload level Multiple filters start and stop at any time, continue to capture Import filters using standard Berkley Packet Filter (BPF) format I can optimize the use of my available storage and capture and replay just want I need to 50

SIZE IT UP https://www.bluecoat.com/storage-calculator OS Meta Packet On board storage: 6TB or 22TB OS Meta SAS Attached Storage Packet Max Supported for 40 TB modules = 240TB of packet capture storage (6x40TB JBODS) 51

ENTERPRISE SCALABILITY WITH CENTRAL MANAGER Single point of management Security Analytics 10G Appliance Security Analytics 10G Appliance + Storage Directed searches Aggregate searches Security Analytics Virtual Appliance Security Analytics 2G Appliance Arbitrary groups and sub-groups Role-Based Access Control with Data Access Controls Security Analytics Central Manager Dashboard Reports Supports 200+ distributed devices Extractions 52

EASY DEPLOYMENT easy 1 Select the Security Analytics Platform you need 2 Select the Security Analytics Storage you need 3 Select the ThreatBLADES you need Flexible, Simple to Deploy and Centrally Managed 2G WebThreat BLADE MailThreat BLADE 2G 10G FileThreat BLADE 53

ENABLING ADVANCED THREAT PROTECTION DLP IPS 1) Encrypted Traffic Management SSL Visibility Appliance Internal Network 4) Incident Resolution & Analysis 3) Unknown Threat Protection Security Analytics Platform Malware Analysis Appliance SSL offloading in v4.0 2) Known Threat Protection ProxySG Content Analysis System Global Intelligence Network 5) Collaborative, Real-time Advanced Threat Database 54

SOLUTION VALUE Business Objectives Operate with integrity Increase Revenue Protect Intellectual Property Operational Objectives Mitigate Incidents Improve Security Posture Technical Objectives Reduce Attack Surface Enforce Acceptable Use Policy Increase Network Visibility 55

PARTNER ECOSYSTEM Threat Intelligence Big Data Security Analytics Security Visibility Integration Layer 56