1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

Similar documents
REVOLUTIONIZING ADVANCED THREAT PROTECTION

NEXT GENERATION SECURITY ANALYTICS: REAL WORLD USE CASES KEY FEATURES AND NEW USES FOR THE BLUE COAT SECURITY ANALYTICS PLATFORM

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Can We Become Resilient to Cyber Attacks?

Integrating MSS, SEP and NGFW to catch targeted APTs

Unified Security, ATP and more

DYNAMIC DNS: DATA EXFILTRATION

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1

THE EVOLUTION OF SIEM

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

AppGuard. Defeats Malware

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Cisco Cyber Threat Defense - Visibility and Network Prevention

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

The Purview Solution Integration With Splunk

Security Analytics for Smart Grid

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Security strategies to stay off the Børsen front page

Comprehensive Advanced Threat Defense

IBM Advanced Threat Protection Solution

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Cisco Advanced Malware Protection

Advanced Threats: The New World Order

Agenda , Palo Alto Networks. Confidential and Proprietary.

IBM QRadar Security Intelligence April 2013

Breach Found. Did It Hurt?

The webinar will begin shortly

The Next Generation Security Operations Center

Bio-inspired cyber security for your enterprise

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Bridging the gap between COTS tool alerting and raw data analysis

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

The Hillstone and Trend Micro Joint Solution

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Advanced Threat Protection with Dell SecureWorks Security Services

I D C A N A L Y S T C O N N E C T I O N

Detect & Investigate Threats. OVERVIEW

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Requirements When Considering a Next- Generation Firewall

SECURITY ANALYTICS FOR SECURITY OPERATION CENTER 2.0 A TECHNICAL OVERVIEW

Using SIEM for Real- Time Threat Detection

Cisco Advanced Malware Protection for Endpoints

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

A New Perspective on Protecting Critical Networks from Attack:

Data Science Transforming Security Operations

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Getting Ahead of Advanced Threats

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

How To Buy Nitro Security

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

ENABLING FAST RESPONSES THREAT MONITORING

Content Security: Protect Your Network with Five Must-Haves

SourceFireNext-Generation IPS

NEXT GENERATION SECURE WEB GATEWAY: THE CORNERSTONE OF YOUR SECURITY ARCHITECTURE

WhatWorks in Detecting and Blocking Advanced Threats:

Discover & Investigate Advanced Threats. OVERVIEW

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

End-to-End Application Security from the Cloud

Next-Generation Firewalls: Critical to SMB Network Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Palo Alto Networks. October 6

IBM Security IBM Corporation IBM Corporation

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Enterprise-Grade Security from the Cloud

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

On-Premises DDoS Mitigation for the Enterprise

Stop advanced targeted attacks, identify high risk users and control Insider Threats

RSA Security Analytics

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

WHITE PAPER: THREAT INTELLIGENCE RANKING

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Combating a new generation of cybercriminal with in-depth security monitoring

What s New in Security Analytics Be the Hunter.. Not the Hunted

EnCase Analytics Product Overview

Protecting critical infrastructure from Cyber-attack

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Extreme Networks: A SOLUTION WHITE PAPER

Zscaler Cloud Web Gateway Test

Transcription:

1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

$32.8B 100,000 Cyber Criminals State-Sponsored Spies Hactivists We live in a POST-PREVENTION Amount enterprises are expected to spend on computer security in 2012 (IDC Research 2012) Security researchers still uncovering over 100,000 new malware samples a day (GTISC 2011 Cyber Threat Report) WORLD Solera is the Security Camera for Your Network Record, classify, index, and replay all network traffic Real-time intelligence, forensics and situational awareness 20/20 visibility of advanced malware and zero-day attacks Big Data Security Intelligence and Analytics Delivering: Advanced Persistent Security that easily tells users what to look for and at 2 2013 Solera Networks, A Blue Coat Company

Today s Advanced Threat Landscape 3 2013 Solera Networks, A Blue Coat Company

Window of Opportunity for Advanced Threats* 4 2013 Solera Networks, A Blue Coat Company

do we do what we do? We live in a POST-PREVENTION WORLD 5 2013 Solera Networks, A Blue Coat Company

Security Tool Landscape TCP/IP Model Time 7 6 5 4 3 2 NGFW Content Filtering IDS/IPS Flow Analysis PREVENTION Stateful Firewalls ACLs CONTEXT TODAY S SECURITY CONTENT GAP VISIBILITY BIG DATA SECURITY Advanced Threat Protection 2012 2006 2002 1999 1997 Real-Time File Extraction Real-Time Analytics Deep Packet Inspection Log Analysis & Aggregation Malware Analysis Application-Based Blocking Signature-Based Blocking L2-L7 Indexing Storage Full Packet Capture Coverage 6 2013 Solera Networks, A Blue Coat Company

Most Dreaded Questions from the CISO Who did this to us? How did they do it? What systems and data were affected? Can we be sure it is over? Can it happen again? 7 2013 Solera Networks, A Blue Coat Company

Volume Velocity Variety 8 2013 Solera Networks, A Blue Coat Company

we deliver Advanced Persistent Security that easily tells users what to look for and at 9 2013 Solera Networks, A Blue Coat Company

Blue Coat Advanced Threat Protection The Most Comprehensive Big Data Security Analytics and Advanced Threat Protection Solution Big Data Security Analytics Platform 10 2013 Solera Networks, A Blue Coat Company

Big Data Security Analytics for Advanced Threat Protection Advanced Malware Detection White/blacklists, sandboxing, feeds Visual Insight Context, real-time awareness, alerts Threat Intelligence Full Packet Capture Layer 2-7 indexing & classification Big Data Security Analytics Security Visibility Integration Layer 11 2013 Solera Networks, A Blue Coat Company

Integrated Advanced Threat Protection Security Ecosystem Context-Aware Security Adaptive Security Enhance existing investments Integrated workflow automation Big Data Security Analytics Threat Intelligence Big Data Security Analytics Threat Intelligence Security Visibility Integration Layer Network Visibility Integration Layer 16 2013 Solera Networks, A Blue Coat Company

Providing realtime analysis and full visibility of everything going in and out of your network Records, classifies and indexes all packets and flows from L2 L7 On the wire, file-level visibility of data exfiltration & malware infiltration Actionable intelligence, forensics and situational awareness Unmatched multi-dimensional flow enrichment & big data warehousing Flexible, open and easy-to-use platform do we do what we do? Solera is the Security Camera for your Network 17 2013 Solera Networks, A Blue Coat Company

Turning Complexity into Context As data is gathered and analyzed, relationships can be found and patterns appear Through Data Metadata Inference Context you ll know if it is a threat or not.

Turning Complexity into Context Once pictures begin to emerge, it becomes possible to discern if something is a threat, or if it s benign.

Turning Complexity into Context Once pictures begin to emerge, it becomes possible to discern if something is a threat, or if it s benign.

Real-World Use Cases with Solera DeepSee Situational Awareness Continuous Monitoring Cyber Threat Protection Incident Response Data Loss Monitoring & Analysis Policy Compliance Who? When? What? Where? How? Target(s)? Who Else? Is It Over? What Else? How Long? 21 2013 Solera Networks, A Blue Coat Company

Solera DeepSee Platform Use Cases Situational Awareness Continuous Monitoring Cyber Threat Detection Incident Response Data Loss Monitoring & Analysis Policy Compliance Threat Intelligence ATP Applications Reports, GeoIP, Reconstruction, Packet Analysis Partner Integration Blue Coat ThreatBLADES Threat Intelligence URL File Malware Big Data Analytics ATP Big Data Security Analytics Sensors 22 2013 Solera Networks, A Blue Coat Company

Available Now: Big Data Security for Dummies! And: Advanced Threat Protection for Dummies! BLUE COAT EXCLUSIVE 23 2013 Solera Networks, A Blue Coat Company

Security that Matters TM You have been targeted. You will be hacked. Now what? Our advanced threat protection and security analytics solutions help protect organizations from cyber attackers. And by doing that, we are helping to protect our way of life 24 2013 Solera Networks, A Blue Coat Company