SlideShare uma empresa Scribd logo
1 de 22
CONTENT ANALYSIS SYSTEM
AND
ADVANCED THREAT PROTECTION

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

1
EVOLVING LANDSCAPE
OF MODERN THREATS

TODAY’S
ADVANCED
THREAT
LANDSCAPE

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

2
ADVANCED THREAT PROTECTION
LIFECYCLE DEFENSE

STAGE 3

STAGE 1

Resolve &
Remediate
Threats
Discovered on
the Network

Block &
Enforce
All Known Threats
GLOBAL
INTELLIGENCE
NETWORK

STAGE 2
Detect &
Analyze
Unknown Threats

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

3
BUSINESS ASSURANCE TECHNOLOGY

Security and
Policy Enforcement
Center

Mobility
Empowerment
Center

Trusted
Applications
Center

Performance
Center

Resolution
Center

SG & SG-VA
Web Security Service
WebFilter
SSL Visibility
CAS, MAA, DLP
FW/IDS on X-Series

Mobile Device
Security Service

App Classification
Service
Web App Reverse
Proxy

MACH5
CacheFlow
PacketShaper

Reporter SW
Reporter Service
Intelligence Center
DeepSee Analytics
Appliance

BUSINESS ASSURANCE PLATFORM
• Open Environment for Best-of-Breed Solutions

• Threat, Web & Application Intelligence

• Proxy-Based Architecture

• Scalable Virtualization Platform

• Global Cloud Infrastructure

• Rich Security Analytics

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

4
CONTENT ANALYSIS SYSTEM
&
ADVANCED THREAT PROTECTION

What problems are we solving?
Average cost per lost data record from advanced attack is $222.
This is 27% more than cost from incidents of insider negligence
Average time to discover an advanced persistent threat is 80
days for a malicious breach
Average time to resolution is 123 days for a malicious breach

Current solutions try and solve the ATP problem via silos of
technology

Security defenses must align with each other, share
information and be adaptive
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

5
THE NEED FOR
NETWORK-CENTRIC CONTENT ANALYSIS

SANS Institute
“Utilize network-based anti-malware tools to analyze
all inbound traffic and filter out malicious content
before it arrives at the endpoint.”
Critical Controls For Effective Cyber Defense
- SANS Institute, March 2013

Network World
“So ultimately enterprise organizations need both
network and host-based advanced malware
defenses. Yeah, it's a lot of work but it's inevitable.”
Advanced Malware Protection: Network or Host?
- Network World, July 2012
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

6
CONTENT ANALYSIS SYSTEM

AntiMalware

WhiteListing

Sophos
Kaspersky
McAfee

Bit 9

Sand-Boxing
Off-Box
Local

Sand-Boxing
On-Box
& Cloud

Static Code
Analysis

On-Box
DRTR

Future

Future

Future

Norman

Content Analysis System
Expandable, Best of Breed, High Performance, Integrated Security Platform

Blue Coat Confidential
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

7
CONTENT ANALYSIS SYSTEM

Content
Analysis
System

CA-S400-A1

CAS Appliance
50 Mbps

CAS Appliance
100Mbps

CA--S400-A3

CA-S400-A4

CAS APPLIANCE

CAS SW LICENSE

Key
Components
and
Packaging

CA-S400-A2

MALWARE ANALYSIS
APPLIANCE
(Sandbox)

MALWARE ANALYSIS
NW LICENSE

LICENSE A
Single AV + Bit 9 license
(by user )

CAS Appliance CAS Appliance
500 Mbps
250 Mbps

or

LICENSE B
Dual AV + Bit 9 license
(by user )

or
MalwareAnalysis Appliance
MAA-S500-10

MalwareAnalysis Appliance
MAA-S400-10

Annual Subscription and Update Service @ 20% of HW List

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

8
CONTENT ANALYSIS SYSTEM
FLEXIBLE CHOICES

Choose Content
Analysis device

Content
Analysis
System

CA-S400-A1
CA-S400-A2
CA-S400-A3
CA-S400-A4

– 50Mbps
– 100Mbps
– 250Mbps
– 500Mbps

+
Select single or dual AV from
Kaspersky, McAfee or Sophos

Subscription
Services

Single AV + Bit 9 Whitelisting
Dual AV + Bit 9 Whitelisting

+
Select
Malware Analysis
Appliance

Malware
Analysis

Malware Analysis Appliance MAA-S400
Malware Analysis Appliance MAA-S500

Cloud & On-Box Sandboxing
Available Mid-2014
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

9
WHY SANDBOXING?
 Traditional network defenses are
great at dealing with knownthreats, terrible at dealing with
unknown-threats
 Unknown threats require dynamic
analysis (aka detonation) in the
form of a virtual machine and/or
bare-metal or emulation sandbox
 By year-end 2016, 20% of
enterprises will implement
Windows containment
mechanisms for end users
handling untrusted content and
code, up from less than 1% in
2013. Gartner
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

10
MALWARE APPLIANCE
CORE TECHNOLOGY
Hybrid Analysis
Unmatched intelligence


Emulation



IntelliVM virtualization

Behavioral Patterns
Expose targeted attacks


Detection patterns



Open source patterns



Custom patterns

Plug-in Architecture
Extend detection and processing


Interact with running malware



Click-through dialogs and installers

SandBox

IntelliVM

Software x86
emulator

Full Windows XP or
Win 7 licensed
software

Hardware emulation

Hardware virtualization

Generates numerous
low-level events –
page faults,
exceptions, etc.

Generates high-level
events – file, registry,
network, process, etc.

Emulated network
access and services

Real network access
and services

Hook-based event
introspection

KernelScout filter
driver captures lowlevel events

Add your own
patterns

Add your own patterns

Supports EXEs and
DLLs

Wide range of file
support

Portable executable
memory dumps

Extend processing
with plugins

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

11
INTELLI-VM PROFILES AND PLUG-INS
 Supports multiple profiles for AND analysis
INTELLIVM PROFILESpowerfulPLUGINS
• Windows 7 SP1 and Windows XP SP3

 Customize to closely match production environments
• Pilot patches, software rollouts, and O/S upgrades
• Test with exact application versions, browsers, add-ons, etc.

 Flexibility to detect non-traditional threats
• VM kernel and application-level event monitoring
• Supports EXE, DLL, PDF, JAR, BAT, and Office Docs “out of the box”

Extend custom processing with plugins
• Interact with malware before, during, and after execution

• Hook detection, memory dumps, click-through dialogs and installers

Exercise malware within precisely tailored virtual
environments to see its real effects on operations
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

12
BEHAVIORAL DETECTION PATTERNS

INTELLIVM PROFILES AND PLUGINS
 Generic and malware campaign specific patterns
• Trojan, spyware, worm, ransomware

 Extensive pattern library
•
•
•
•

Core patterns (incl. WebPulse info)
Create your own patterns
All matching patterns will trigger
Global and user-specific patterns

 Risk scoring
• Set by highest matched pattern
• Scores update with new patterns
• Script notification triggers for further action

Patterns can detect targeted and single-use
malware, and do not rely on signature-based
detection methodologies
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

13
MALWARE APPLIANCE
KEY FEATURES
Malware Appliance
Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance
– Automated bulk sample processing and risk scoring
– Parallel processing on up to 40 virtual machines per appliance
Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM
IntelliVMs – Replicate actual production environments including custom applications
Plugins – Interact with malware, click through installers, extend custom processing
Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining
Open Patterns – Detection criteria is never hidden; Users can add custom patterns
Powerful RESTful API – Full programmatic access for integration and automation
Pub-Sub API – Secure notifications of analysis task status and task completion
Remote management, security, and health status monitoring eases deployment

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

14
BUSINESS CASE

ProxySG+ CAS + Malware Appliance

Proxy SG

Content Analysis System
Malware Analysis Appliance

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

15
CONTENT ANALYSIS SYSTEM:
MULTI-LAYERED SECURITY
FOR KNOWN & UNKNOWN THREATS
Unencypted
& Encrypted
ProxySG
Traffic

Not From Known
Malicious
Site/Malnet

Content Analysis System

ALLOW Further
Inspection

Application
Whitelist

Not On Whitelist
Send To Malware
Signature Databases

Known Malware
BLOCK
& UPDATE

WebPulse
BLOCK
Known Malicious
Site/Malnet

On Whitelist
ALLOW
DELIVERY

Slide under revision

BlueCoat
Malware
Appliance
Sandbox

Not
Malicious
ALLOW
DELIVERY

Malicious
UPDATE &
ALERT

Malware
Signature
Databases
Not On Malware
Signature
Databases
Allow Further
Inspection

Non-BlueCoat
Sandbox

Not
Malicious
ALLOW
DELIVERY

Malicious
ALERT

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

16
BLUECOAT NETWORK EFFECT

Benefits Of BlueCoat System
- Subsequent requests/lures
are blocked before download
- Performance improvements
for CAS and Malware Appliance
as further scans are not needed.
- False positives are reduced as filtering
occurs prior to the sandbox
- Webpulse updates all BlueCoat
SWG s for improved efficiency
on ALL devices

Able to feed information TO and collect
information FROM other vendor’s devices
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

17
COMPLETE
ADVANCED THREAT PROTECTION

ProxySG+ CAS + Malware Appliance + Solera Analytics

Security Analytics
Platform

Proxy SG

Content Analysis System
Malware Analysis Appliance

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

18
ADVANCED THREAT PROTECTION SOLUTION
LIFECYCLE DEFENSE
The Blue Coat ATP solution delivers the
industry’s most comprehensive
protection through the following:
1) Lifecycle Defense: Protection that
maps to three threat stages: Realtime blocking for known threats and
malware sources (malnets);
Advanced threat analysis for
unknown threats; and Dwell time
reduction for latent threats
2) Adaptive Malware Analysis:
Dynamic APT protection that
analyzes unknown threats and
shares information with other
systems in the security infrastructure
to increase protection efficiency for
unknown and latent threats
3) Network Effect: APT information
sharing between 75M users in
15,000 organizations through a
feedback loop into the Blue Coat
Global Intelligence Network

STAGE 3

STAGE 1

Resolve &
Remediate
Threats
Discovered on
the Network

Block &
Enforce
All Known Threats
GLOBAL
INTELLIGENCE
NETWORK

STAGE 2
Detect &
Analyze
Unknown Threats

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

19
CAS

COMPLETE
ADVANCED THREAT PROTECTION

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

20
BLUE COAT
ADVANCED THREAT PROTECTION
A Complete and Integrated
Portfolio of Advanced Threat
Protection Technologies
(need to add CAS & MAA pics)
Blocking and Prevention

SSL Visibility
Blue Coat SSL
Visibility
Appliance

Sandbox
Malware Analysis
Appliance

Blue Coat ProxySG

Content Analysis System

Security Analytics Platform by Solera

Solera
Appliances

Solera Storage
Appliances

ThreatBLADES

Solera Central
Manager
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

21
END

KEVIN FLYNN
PRODUCT MARKETING

OCTOBER, 2013

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

22

Mais conteúdo relacionado

Mais procurados

Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorDavid Perkins
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the UnionDavid Perkins
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionDavid Perkins
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSAndris Soroka
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionCisco Canada
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREDeivid Toledo
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XSophos Benelux
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDeivid Toledo
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsIndicThreads
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban PrósperoClusterCba
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware
 

Mais procurados (20)

Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 

Destaque

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeBlue Coat
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?Blue Coat
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus NetworkBlue Coat
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-idsecconf
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Takayoshi Takaoka
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016InvestorSymantec
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationInvestorSymantec
 

Destaque (10)

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 

Semelhante a Content Analysis System and Advanced Threat Protection

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
AWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutAWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutPureSec
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surfaceAvi Shulman
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)Sam Kumarsamy
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenInman News
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017Adam Faeder
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cSam Kumarsamy
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 

Semelhante a Content Analysis System and Advanced Threat Protection (20)

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
AWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutAWS Lambda Security Inside & Out
AWS Lambda Security Inside & Out
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surface
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt Cohen
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Content Analysis System and Advanced Threat Protection

  • 1. CONTENT ANALYSIS SYSTEM AND ADVANCED THREAT PROTECTION Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 1
  • 2. EVOLVING LANDSCAPE OF MODERN THREATS TODAY’S ADVANCED THREAT LANDSCAPE Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 2
  • 3. ADVANCED THREAT PROTECTION LIFECYCLE DEFENSE STAGE 3 STAGE 1 Resolve & Remediate Threats Discovered on the Network Block & Enforce All Known Threats GLOBAL INTELLIGENCE NETWORK STAGE 2 Detect & Analyze Unknown Threats Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 3
  • 4. BUSINESS ASSURANCE TECHNOLOGY Security and Policy Enforcement Center Mobility Empowerment Center Trusted Applications Center Performance Center Resolution Center SG & SG-VA Web Security Service WebFilter SSL Visibility CAS, MAA, DLP FW/IDS on X-Series Mobile Device Security Service App Classification Service Web App Reverse Proxy MACH5 CacheFlow PacketShaper Reporter SW Reporter Service Intelligence Center DeepSee Analytics Appliance BUSINESS ASSURANCE PLATFORM • Open Environment for Best-of-Breed Solutions • Threat, Web & Application Intelligence • Proxy-Based Architecture • Scalable Virtualization Platform • Global Cloud Infrastructure • Rich Security Analytics Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 4
  • 5. CONTENT ANALYSIS SYSTEM & ADVANCED THREAT PROTECTION What problems are we solving? Average cost per lost data record from advanced attack is $222. This is 27% more than cost from incidents of insider negligence Average time to discover an advanced persistent threat is 80 days for a malicious breach Average time to resolution is 123 days for a malicious breach Current solutions try and solve the ATP problem via silos of technology Security defenses must align with each other, share information and be adaptive Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 5
  • 6. THE NEED FOR NETWORK-CENTRIC CONTENT ANALYSIS SANS Institute “Utilize network-based anti-malware tools to analyze all inbound traffic and filter out malicious content before it arrives at the endpoint.” Critical Controls For Effective Cyber Defense - SANS Institute, March 2013 Network World “So ultimately enterprise organizations need both network and host-based advanced malware defenses. Yeah, it's a lot of work but it's inevitable.” Advanced Malware Protection: Network or Host? - Network World, July 2012 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 6
  • 7. CONTENT ANALYSIS SYSTEM AntiMalware WhiteListing Sophos Kaspersky McAfee Bit 9 Sand-Boxing Off-Box Local Sand-Boxing On-Box & Cloud Static Code Analysis On-Box DRTR Future Future Future Norman Content Analysis System Expandable, Best of Breed, High Performance, Integrated Security Platform Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 7
  • 8. CONTENT ANALYSIS SYSTEM Content Analysis System CA-S400-A1 CAS Appliance 50 Mbps CAS Appliance 100Mbps CA--S400-A3 CA-S400-A4 CAS APPLIANCE CAS SW LICENSE Key Components and Packaging CA-S400-A2 MALWARE ANALYSIS APPLIANCE (Sandbox) MALWARE ANALYSIS NW LICENSE LICENSE A Single AV + Bit 9 license (by user ) CAS Appliance CAS Appliance 500 Mbps 250 Mbps or LICENSE B Dual AV + Bit 9 license (by user ) or MalwareAnalysis Appliance MAA-S500-10 MalwareAnalysis Appliance MAA-S400-10 Annual Subscription and Update Service @ 20% of HW List Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 8
  • 9. CONTENT ANALYSIS SYSTEM FLEXIBLE CHOICES Choose Content Analysis device Content Analysis System CA-S400-A1 CA-S400-A2 CA-S400-A3 CA-S400-A4 – 50Mbps – 100Mbps – 250Mbps – 500Mbps + Select single or dual AV from Kaspersky, McAfee or Sophos Subscription Services Single AV + Bit 9 Whitelisting Dual AV + Bit 9 Whitelisting + Select Malware Analysis Appliance Malware Analysis Malware Analysis Appliance MAA-S400 Malware Analysis Appliance MAA-S500 Cloud & On-Box Sandboxing Available Mid-2014 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 9
  • 10. WHY SANDBOXING?  Traditional network defenses are great at dealing with knownthreats, terrible at dealing with unknown-threats  Unknown threats require dynamic analysis (aka detonation) in the form of a virtual machine and/or bare-metal or emulation sandbox  By year-end 2016, 20% of enterprises will implement Windows containment mechanisms for end users handling untrusted content and code, up from less than 1% in 2013. Gartner Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 10
  • 11. MALWARE APPLIANCE CORE TECHNOLOGY Hybrid Analysis Unmatched intelligence  Emulation  IntelliVM virtualization Behavioral Patterns Expose targeted attacks  Detection patterns  Open source patterns  Custom patterns Plug-in Architecture Extend detection and processing  Interact with running malware  Click-through dialogs and installers SandBox IntelliVM Software x86 emulator Full Windows XP or Win 7 licensed software Hardware emulation Hardware virtualization Generates numerous low-level events – page faults, exceptions, etc. Generates high-level events – file, registry, network, process, etc. Emulated network access and services Real network access and services Hook-based event introspection KernelScout filter driver captures lowlevel events Add your own patterns Add your own patterns Supports EXEs and DLLs Wide range of file support Portable executable memory dumps Extend processing with plugins Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 11
  • 12. INTELLI-VM PROFILES AND PLUG-INS  Supports multiple profiles for AND analysis INTELLIVM PROFILESpowerfulPLUGINS • Windows 7 SP1 and Windows XP SP3  Customize to closely match production environments • Pilot patches, software rollouts, and O/S upgrades • Test with exact application versions, browsers, add-ons, etc.  Flexibility to detect non-traditional threats • VM kernel and application-level event monitoring • Supports EXE, DLL, PDF, JAR, BAT, and Office Docs “out of the box” Extend custom processing with plugins • Interact with malware before, during, and after execution • Hook detection, memory dumps, click-through dialogs and installers Exercise malware within precisely tailored virtual environments to see its real effects on operations Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 12
  • 13. BEHAVIORAL DETECTION PATTERNS INTELLIVM PROFILES AND PLUGINS  Generic and malware campaign specific patterns • Trojan, spyware, worm, ransomware  Extensive pattern library • • • • Core patterns (incl. WebPulse info) Create your own patterns All matching patterns will trigger Global and user-specific patterns  Risk scoring • Set by highest matched pattern • Scores update with new patterns • Script notification triggers for further action Patterns can detect targeted and single-use malware, and do not rely on signature-based detection methodologies Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 13
  • 14. MALWARE APPLIANCE KEY FEATURES Malware Appliance Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance – Automated bulk sample processing and risk scoring – Parallel processing on up to 40 virtual machines per appliance Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM IntelliVMs – Replicate actual production environments including custom applications Plugins – Interact with malware, click through installers, extend custom processing Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining Open Patterns – Detection criteria is never hidden; Users can add custom patterns Powerful RESTful API – Full programmatic access for integration and automation Pub-Sub API – Secure notifications of analysis task status and task completion Remote management, security, and health status monitoring eases deployment Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 14
  • 15. BUSINESS CASE ProxySG+ CAS + Malware Appliance Proxy SG Content Analysis System Malware Analysis Appliance Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 15
  • 16. CONTENT ANALYSIS SYSTEM: MULTI-LAYERED SECURITY FOR KNOWN & UNKNOWN THREATS Unencypted & Encrypted ProxySG Traffic Not From Known Malicious Site/Malnet Content Analysis System ALLOW Further Inspection Application Whitelist Not On Whitelist Send To Malware Signature Databases Known Malware BLOCK & UPDATE WebPulse BLOCK Known Malicious Site/Malnet On Whitelist ALLOW DELIVERY Slide under revision BlueCoat Malware Appliance Sandbox Not Malicious ALLOW DELIVERY Malicious UPDATE & ALERT Malware Signature Databases Not On Malware Signature Databases Allow Further Inspection Non-BlueCoat Sandbox Not Malicious ALLOW DELIVERY Malicious ALERT Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 16
  • 17. BLUECOAT NETWORK EFFECT Benefits Of BlueCoat System - Subsequent requests/lures are blocked before download - Performance improvements for CAS and Malware Appliance as further scans are not needed. - False positives are reduced as filtering occurs prior to the sandbox - Webpulse updates all BlueCoat SWG s for improved efficiency on ALL devices Able to feed information TO and collect information FROM other vendor’s devices Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 17
  • 18. COMPLETE ADVANCED THREAT PROTECTION ProxySG+ CAS + Malware Appliance + Solera Analytics Security Analytics Platform Proxy SG Content Analysis System Malware Analysis Appliance Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 18
  • 19. ADVANCED THREAT PROTECTION SOLUTION LIFECYCLE DEFENSE The Blue Coat ATP solution delivers the industry’s most comprehensive protection through the following: 1) Lifecycle Defense: Protection that maps to three threat stages: Realtime blocking for known threats and malware sources (malnets); Advanced threat analysis for unknown threats; and Dwell time reduction for latent threats 2) Adaptive Malware Analysis: Dynamic APT protection that analyzes unknown threats and shares information with other systems in the security infrastructure to increase protection efficiency for unknown and latent threats 3) Network Effect: APT information sharing between 75M users in 15,000 organizations through a feedback loop into the Blue Coat Global Intelligence Network STAGE 3 STAGE 1 Resolve & Remediate Threats Discovered on the Network Block & Enforce All Known Threats GLOBAL INTELLIGENCE NETWORK STAGE 2 Detect & Analyze Unknown Threats Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 19
  • 20. CAS COMPLETE ADVANCED THREAT PROTECTION Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 20
  • 21. BLUE COAT ADVANCED THREAT PROTECTION A Complete and Integrated Portfolio of Advanced Threat Protection Technologies (need to add CAS & MAA pics) Blocking and Prevention SSL Visibility Blue Coat SSL Visibility Appliance Sandbox Malware Analysis Appliance Blue Coat ProxySG Content Analysis System Security Analytics Platform by Solera Solera Appliances Solera Storage Appliances ThreatBLADES Solera Central Manager Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 21
  • 22. END KEVIN FLYNN PRODUCT MARKETING OCTOBER, 2013 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 22

Notas do Editor

  1. The SANS Institute is one of the world’s most respected cyber security organizations. Their March 2013 report includes their recommendations for creating an effective cyber defense and the importance of network based anti-malware.http://www.sans.org/critical-security-controls/cag4-1.pdf --- Page 28.