Cisco ASA und FirePOWER Services



Similar documents
Deploying Next Generation Firewall with ASA and Firepower services

Cisco ASA with FirePOWER Services. October 2014

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

SourceFireNext-Generation IPS

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Requirements When Considering a Next- Generation Firewall

Protection Against Advanced Persistent Threats

Cisco Advanced Malware Protection

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

IT Sicherheit im Web 2.0 Zeitalter

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

Security in IT & Automatisierung

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Cisco Cloud Web Security

Cisco & Big Data Security

Netzwerkvirtualisierung? Aber mit Sicherheit!

Cisco Cybersecurity Pocket Guide 2015

Threat-Centric Security for Service Providers

Networking for Caribbean Development

Breaking the Cyber Attack Lifecycle

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Introducing IBM s Advanced Threat Protection Platform

Content Security: Protect Your Network with Five Must-Haves

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Concierge SIEM Reporting Overview

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

Mobile device Management mit NAC

Integrated Network Security Architecture: Threat-focused Nextgeneration

AppGuard. Defeats Malware

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

CCNA Security 2.0 Scope and Sequence

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Braindumps QA

How Attackers are Targeting Your Mobile Devices. Wade Williamson

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

The Hillstone and Trend Micro Joint Solution

Cisco RSA Announcement Update

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Sourcefire Next-Generation IPS

Assessing the Business Value of the Secured Datacenter

Security Intelligence Services.

SANS Top 20 Critical Controls for Effective Cyber Defense

5 Steps to Advanced Threat Protection

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Securing Your Business with DNS Servers That Protect Themselves

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Integrating MSS, SEP and NGFW to catch targeted APTs

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

Data Center security trends

RSA Security Anatomy of an Attack Lessons learned

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

CONTENTS. Cisco Cyber Threat Defense v2.0 First Look Design Guide 2

BeyondInsight Version 5.6 New and Updated Features

Next Generation IPS and Reputation Services

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

24/7 Visibility into Advanced Malware on Networks and Endpoints

Infrastruktur Sicherheit mit Checkpoint

Cisco Advanced Malware Protection for Endpoints

Securing Cloud-Based

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Limiting the Spread of Threats: A Data Center for Every User

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Network Security Solution. Arktos Lam

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Unified Security, ATP and more

Did you know your security solution can help with PCI compliance too?

Palo Alto Networks. October 6

Cyber Security From product to system solution

Fighting Advanced Threats

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Vertrauen in Cloud Dienste schaffen

Cisco ASA mit FirePower Services

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

RSA Security Analytics

Transcription:

Cisco ASA und FirePOWER Services 1

Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle Bedrohungsanalyse NG-IPS Security-Intelligenz Web/DNS Sicherheit Visibilität und Automation Advanced Malware Protection Retrospective Security IoCs/Incident Response 2

Die Cisco ASA-Firepower Lösung Cisco Collective Security Intelligence Cisco ASA als erprobte und bewährte Stateful Firewall Clustering & High Availability Network Firewall Routing Switching Intrusion Prevention Application Visibility & Control FireSIGHT Analytics & Automation Advanced Malware Protection Built-in Network Profiling WWW URL Filtering DNS-Control Identity-Policy Control & VPN Granulare Cisco Application Visibility und Control (AVC) Die führende Lösung im Bereich Next-Generation IPS (NGIPS) Reputations- und Kategorien- basierender URL-Schutz Cisco ASA DNS-Überwachung* & Kontrolle Advanced Malware Schutz 3

Eine umfangreiche Netzwerk-Sichtbarkeit ist elementar Categories FirePOWER Services Typical IPS Typical NGFW Threats Users Web Applications Application Protocols File Transfers Malware Command & Control Servers Client Applications Network Servers Operating Systems Routers & Switches Mobile Devices Printers VoIP Phones Virtual Machines 4

Cisco FireSIGHT: Umfassende Transparenz für eine präzise Gefahrenerkennung und eine adaptive Abwehr Threats Users Web Applications Application Protocols File Transfers Malware Command & Control Client Applications Network Servers Operating Systems Mobile Devices 5

Das FireSIGHT Management Center steuert das Event-, Policy- und Konfigurationsmanagement 6

Impact Assessment IMPACT FLAG ADMINISTRATOR ACTION WHY 1 Act Immediately, Vulnerable Event corresponds to vulnerability mapped to host 2 Investigate, Potentially Vulnerable Relevant port open or protocol in use, but no vuln mapped 3 Good to Know, Currently Not Vulnerable Relevant port not open or protocol not in use 4 Good to Know, Unknown Target Monitored network, but unknown host Korelliert alle Intrusion Events zu einem Risikofaktor eines Angriffes gegen ein Ziel 0 Good to Know, Unknown Network Unmonitored network 7

Indications of Compromise (IoCs) IPS Events SI Events Malware Events Malware Backdoors CnC Connections Connections to Known CnC IPs Malware Detections Malware Executions Exploit Kits Admin Privilege Escalations Office/PDF/Java Compromises Dropper Infections Web App Attacks 8

Advanced Malware Protection Alle Methoden bleiben unter 100% Erkennung One-to-One Signature Fuzzy Finger-Printing Machine Learning Advanced Analytics Dynamic Analysis Reputations-Filtering und File-Sandboxing 9

Advanced Malware Schutz als Prozess 10

Advanced Malware Schutz für alle Bereiche ASA Firepower Services FirePOWER Appliance Web & Email Security Appliance Cloud Based Web Security & Hosted Email Private Cloud PC / MAC Mobile Virtual NGIPS /NGFW mit FirePOWER Kontinuierliche & Zero-Day Kontrolle Moderne Analyse und Korrelation Enterprise Betrieb & Design 11

Zusammenfassung 12

Ihre Security-Policy bleibt ein Prozess Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Cloud Point in Time Continuous. 13

Danke