Upload
skybox-security
View
74
Download
1
Embed Size (px)
Citation preview
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
1
Delivering Contextual Intelligence
25/11/14A NEW APPROACH TO COMBATING CYBER CRIME 1
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
2
FIREWALLSENDPOINTSECURITY
THE CURRENT SECURITY LANDSCAPE
GATEWAYSECURITY
IPS/IDSSERVERSECURITY
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
3A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
3
THE SECURITY CONUNDRUM
SECURITY SPEND CONTINUES
TO RISE
$$30.1 BILLION SPEND BY 2017
UP FROM $9.6 BILLION IN 2006
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
4A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
4
THE SECURITY CONUNDRUM
SECURITY SPEND CONTINUES
TO RISE
BUT SO DOES THE NUMBER OF BREACHES
621 REPORTED IN THE LAST 12 MONTHS
UP 23% OVER THREE YEARS
$$30.1 BILLION SPEND BY 2017
UP FROM $9.6 BILLION IN 2006
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
5A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
5
THE SECURITY CONUNDRUM
ORGANISATIONS ON THE FRONT LINE NEED A NEW APPROACH…
WE ARE NOT GOING TO WIN THE BATTLE
$
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
6
ASSESS DETECT PROTECT RESPOND
REAL-TIME RISK ASSESSMENT
CONTEXTUAL RISK PROFILE
CORRELATED THREAT & SECURITY INTELLIGENCE
EARLY THREAT DETECTION
AUTOMATED NETWORK PROTECTION
THREAT PREVENTION
EXPERTISE & PROCESS
RAPID & EXPERIENCED RESPONSE
REMEDIATION
A COMPLETE SECURITY PROCESS
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
7
CLOUD SERVICES CHANGES THE GAME…
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
8
CLOUD SERVICES CHANGES THE GAME…
ENDPOINT SECURITY
• MALWARE INFECTIONS
• NETWORK ATTACK BLOCKED
• VULNERABLE SOFTWARE
• SUSPICIOUS BEHAVIOUR
• PROCESS INJECTION BLOCKED
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
9
• INBOUND CONNECTION FAILED
• OUTBOUND CONNECTION FAILED
• OUTBOUND UDP BLOCKED
• TUNNEL TRAFFIC DETECTED
• INBOUND PING BLOCKED
CLOUD SERVICES CHANGES THE GAME…
FIREWALL SECURITY
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
10
CLOUD SERVICES CHANGES THE GAME…
SERVER SECURITY
• LOGIN FAILURES
• PASSWORD FAILURE
• VULNERABILITY ON SOFTWARE
• LPAL VIOLATION
• MALWARE
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
11
CLOUD SERVICES CHANGES THE GAME…
GATEWAY SECURITY
• SUSPICIOUS EMAILS
• UNSAFE ATTACHMENTS
• MALICIOUS JAVASCRIPT
• SUSPICIOUS URL
• C&C CONNECTION
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
12
CLOUD SERVICES CHANGES THE GAME…
IPS/IDS
• IDENTIFY MALICIOUS ACTIVITY
• VULNERABILITY DETECTION
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
13
CLOUD SERVICES CHANGES THE GAME…
IPS/IDS
• IDENTIFY MALICIOUS ACTIVITY
• VULNERABILITY DETECTION
TECHNOLOGY PROCESS PEOPLE+ +
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
14
CLOUD SERVICES CHANGES THE GAME…
IPS/IDS
• IDENTIFY MALICIOUS ACTIVITY
• VULNERABILITY DETECTION
TECHNOLOGY PROCESS PEOPLE+ +
LEVERAGED PEOPLE
CORRELATED AND CONTEXTUALISED
APPLIED INTELLIGENCE
LEVERAGED HARDWARE+ +
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
15
APPLIED INTELLIGENCE
TECHNOLOGY PROCESS PEOPLE+ +
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
16A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
16
INSIDE THE SECUREDATA GI CLOUD
CUSTOMER INFORMATION
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
17A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
17
INSIDE THE SECUREDATA GI CLOUD
MILLIONSOF SECURITY LOGS AND DATA ANALYSED
VULNERABILITY SCANNING
CUSTOMER INFORMATION
SOFTWARE ALGORITHM
HARDWARE TECHNOLOGYSKYBOX RISK MANAGEMENT TOOL
SIEM PLATFORM CLASS LEADING
DATA PLANE
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
18A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
18
INSIDE THE SECUREDATA GI CLOUD
ANALYTICS
MILLIONSOF SECURITY LOGS AND DATA ANALYSED
HUNDREDSOF SECURITY EVENTS IDENTIFIED
VULNERABILITY SCANNING
THREAT FEEDS
CUSTOMER INFORMATION
SOFTWARE ALGORITHM
HARDWARE TECHNOLOGY
MALTEGO BIG DATA ANALYTICS
SKYBOX RISK MANAGEMENT TOOL
SIEM PLATFORM CLASS LEADING
DATA PLANE
INTELLIGENCE STORE
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
19A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
19
INSIDE THE SECUREDATA GI CLOUD
ANALYTICS
EXPERTPEOPLE
MILLIONSOF SECURITY LOGS AND DATA ANALYSED
HUNDREDSOF SECURITY EVENTS IDENTIFIED
TENSOF ALERTS INVESTIGATED
VULNERABILITY SCANNING
THREAT FEEDS
24 X 7 X 365 SOC
SENSEPOST SECURITYCONSULTANCY
CUSTOMER INFORMATION
SOFTWARE ALGORITHM
HARDWARE TECHNOLOGY
CYBER ANALSYST TEAM
MALTEGO BIG DATA ANALYTICS
SKYBOX RISK MANAGEMENT TOOL
SIEM PLATFORM CLASS LEADING
DATA PLANE
INTELLIGENCE STORE
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
20A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
20
INSIDE THE SECUREDATA GI CLOUD
ANALYTICS
EXPERTPEOPLE
MILLIONSOF SECURITY LOGS AND DATA ANALYSED
HUNDREDSOF SECURITY EVENTS IDENTIFIED
TENSOF ALERTS INVESTIGATED
INDIVIDUALTHREATS WITH ACTIONABLE INTELLIGENCE
VULNERABILITY SCANNING
THREAT FEEDS
24 X 7 X 365 SOC
SENSEPOST SECURITYCONSULTANCY
CUSTOMER INFORMATION
SOFTWARE ALGORITHM
HARDWARE TECHNOLOGY
CYBER ANALSYST TEAM
MALTEGO BIG DATA ANALYTICS
SKYBOX RISK MANAGEMENT TOOL
SIEM PLATFORM CLASS LEADING
DATA PLANE
INTELLIGENCE STORE
A NEW APPROACH TO COMBATING CYBER CRIME25/11/14
21A NEW APPROACH TO COMBATING CYBER CRIMEPRIVATE & CONFIDENTIAL25/11/1421
THANKYOU