See It Study It Stop It Webinar - September 8 2010

Views:
 
     
 

Presentation Description

See It Study It Stop It Webinar

Comments

Presentation Transcript

Slide 1: 

1 Delivering the Next Generation of Network Security See It, Study It, Stop It Contain and Mitigate Advanced Threats 1

Today’s Topic and Speaker : 

Today’s Topic and Speaker 2 Today’s Topic See It, Study It, Stop It Contain and Mitigate Advanced Threats Today’s Speaker Kurt Bertone VP Strategic Alliances Fidelis Security Systems

Evolution of the Threat Landscape : 

Evolution of the Threat Landscape 3

Security Risk Reduction Curve : 

Security Risk Reduction Curve The older, more mature and more pervasive a security technology becomes, the less risk reduction it provides The threat community’s ability to circumvent or defeat security technologies increases over time 4

The Problem : 

The Problem 5 Deeply embedded malware Highly polymorphic malcode Custom and semi-custom attacks Accesses to phishing and malware sites Botnet command and control communications Extrusion/extraction of sensitive information

Integrated Threat Management : 

Integrated Threat Management Single analytics engine for content-aware visualization, intelligent forensics and real-time prevention Real-time visibility for proactive situational awareness Intelligent forensics for incident analysis and response All-ports prevention capability for data breach prevention and threat mitigation 6

Deep Session Inspection™ : 

Deep Session Inspection™ Total visibility and control over inbound and outbound network traffic Deep, session-level application, payload and content decoding and analysis Flexible, multi-level policy engine with multiple real-time enforcement options (visualize, alert, prevent, etc) Scalable up to multiple Gbps of analyzed throughput in a single device 7

The Content Onion : 

The Content Onion 8

The Content Onion, Partially Peeled : 

The Content Onion, Partially Peeled 9

The Content Onion, Fully Peeled : 

The Content Onion, Fully Peeled 10

On the Importance of Policy : 

On the Importance of Policy Example Rules “Block third-party applications on Facebook” “Alert on any external transfer of PII outside defined business process” “Block all connections to known phishing, malware and botnet locations that contain PII” “Alert on rogue SSL/TLS to ‘banned’ countries after hours” “Alert when you see executable files whose file extensions have been changed” “Alert on PDFs with executable code or specific binary signature matches” 11 PhishingSite AND PII Alert and Prevent

Dynamic Threat Intelligence : 

Dynamic Threat Intelligence 12

See it, Study it, Stop it : 

See it, Study it, Stop it 13

See It : 

See It 14

Study It : 

Study It 15

Stop It : 

Stop It Extrusion or extraction of sensitive information (PII, intellectual property, classified documents…) Transfer of documents with deeply embedded malware (e.g. compressed PDFs with embedded executables…) Accesses to phishing, malware and botnet command and control sites Suspicious network activities (e.g. transfer of renamed executables…) Combinations of the above, over any port/protocol… 16

The Solution : 

The Solution 17

Why You Need Fidelis XPS : 

Why You Need Fidelis XPS 18 Your existing network defenses are necessary, but not sufficient They have known weaknesses that your adversaries know how to exploit Network security is asymmetrical The bad guys only need to find ONE way into (or out of) your network, you have to plug ALL the holes Fidelis XPS helps you plug the holes Bi-directional, application- and content-aware network security

authorStream Live Help