Extending Network Visibility: Down to the Endpoint

Lancope, Inc.
18 de Jun de 2015
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
1 de 21

Mais conteúdo relacionado

Mais procurados

IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain OpenDNS
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust

Mais procurados(20)

Destaque

StackOverflowStackOverflow
StackOverflowSusam Pal
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseLancope, Inc.
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
Top 10 Security Vulnerabilities (2006)Top 10 Security Vulnerabilities (2006)
Top 10 Security Vulnerabilities (2006)Susam Pal
Cisco Threat Defense (Cisco Stealthwatch)Cisco Threat Defense (Cisco Stealthwatch)
Cisco Threat Defense (Cisco Stealthwatch)Cisco Russia
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware Lancope, Inc.

Similar a Extending Network Visibility: Down to the Endpoint

Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.

Similar a Extending Network Visibility: Down to the Endpoint(20)

Mais de Lancope, Inc.

Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecurityLancope, Inc.
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesLancope, Inc.
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesLancope, Inc.
The Library of SpartaThe Library of Sparta
The Library of SpartaLancope, Inc.
Looking for the weird   webinar 09.24.14Looking for the weird   webinar 09.24.14
Looking for the weird webinar 09.24.14Lancope, Inc.
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.

Extending Network Visibility: Down to the Endpoint

Notas do Editor

  1. Josh to do introductions of everyone presenting on the webinar, brief overview of the webinar topic and agenda, pass over to Peter to start presentation
  2. Josh: - You can’t predict future attack behaviors – and thus you can’t ignore the unknown. Continuous monitoring and informed visibility is a key aspect of having a secure environment
  3. Josh: - APT…key word here is “persistent” – attackers will find a way into your environment as their attacks are targeted and the attackers will be very patient and agile when it comes to penetrating your organization’s perimeter Question for Matt (Josh will ask): - QUESTION: “Matt, what are you seeing in your environment at Council Rock School District? Are you seeing a similar threat landscape in your environment? How about insider threats?” - ANWER: (focus in on talking about the insider aspect of your organization, maybe even talk about the students hacking in to the grade system)
  4. Josh: - In reference to the $3.5M: Nobody wants to be on the front page of the NYT…protecting your reputation is key - Obviously, real-time detection is key, but its also important to be able to review behaviors from the past that may not have seemed suspicious at the time. With average dwell times creeping well over half a year, its important to have the tools in place to be able to investigate and respond to modern day threats
  5. Josh: - It’s critical to monitor your entire environment, including your endpoints and network. Looking for departures from normal activity patterns is critical for detecting APT’s - Not only monitoring your on-network assets, but also your off-network assets
  6. Josh: - Question for Peter: “Over the past few years we’ve seen more and more targeted attacks which have bypassed traditional security solutions. Ziften’s view is that traditional blocking prevention solutions such as Antivirus are absolutely necessary, but aren’t sufficient for stopping modern threats. Instead there needs to be more effort put into detection and response solutions. How do you feel about the need to shift from relying on just blocking and prevention solutions?”
  7. Josh: - I think this is a great point which only re-iterates what we had discussed in the last slide. Since threats will make it into your environment, its imperative that they are detected quickly. Shortening the Mean Time to Know is the most critical aspect of keeping your environment secure. By condensing the time it takes to detect a breach and determine the full scope of it, your security teams are able to spend more time investigating other threats which due to lack of resources, are currently going undetected. - Not only is detection of the threat critical, its also equally as critical to determine the root cause of the breach and design and model changes to your environment in order to prevent future attacks from happening. Without having continuous monitoring solutions in place like Ziften and Lancope, learning from the attack behaviors is nearly impossible.
  8. Peter to talk about StealthWatch for a moment, discuss the 6.7 release and integration with Ziften around the web lookup pivot; hand off to Josh to move to the next slide and present. Josh will say something like “Let me show you how this works…” which will be the cue to move to the next slide
  9. Josh: - Its critical to not only continuously monitor your network using a lightweight and scalable solution like Lancope, but its also important to be able to connect the dots from suspicious network behaviors to the endpoints involved. By combining Lancope’s StealthWatch solution with Ziften’s endpoint solution, you are now able to seamlessly extend your visibility from your perimeter, to your network, all the way down into your endpoints. Let me show you how! Cues to click: I’ll say “next you can see…” and stuff like that to indicate the next transition Peter will jump in at the end to wrap up what I said. After Peter wraps things up, I’ll jump in an introduce Matt again and Peter will hand off to him for his slides
  10. Josh: - Question for Matt: “With such a small security team, do you feel that the time it takes to detect if a suspicious behavior is actually due to a legitimate threats is equally as important as the time it takes to determine that a suspicious behavior is from normal behavior and actually a non-threat?”
  11. Peter to review Lancope’s use cases
  12. Josh to review Ziften use cases
  13. QUESTION: “Are Ziften and Lancope scalable in large environments? I have over 60,000 desktops/laptops and multiple 10’s of thousands of servers.” - **Josh to ask Peter to respond first, then Josh will add in Ziften’s response after - JOSH ANSWER: Ziften was purpose built to be lightweight and scalable. It doesn’t matter how great a solution is on paper, if it doesn’t scale to large environments it eventually become irrelevant. 2) QUESTION: “With all of the new threats on the horizon, how does a security team prioritize what should be looked at?” - **Josh will answer first, then hand off to Peter - JOSH ANSWER: That’s a great question, and I think it really sums up the reason we’re hosting this webinar. Each silo within an organization is going to have their own security solutions, but what is critical is being able to correlate observables across these silos to quickly hone in on the suspect, high priority incidents. In addition, by having integrated solutions like Ziften and Lancope, you’re able to peer deeper than just your endpoint or network on their own, and instead you’re now able to quickly connect the dots to either confirm something is a threat, or move on. 3) QUESTION: “Are you saying that prevention products aren’t necessary? I’m not sure I agree with that statement.” - Josh to answer first, Peter to jump in if he has anything to add, Matt to jump in last if he has anything to add - JOSH ANSWER: Not at all! I know I mentioned something about this earlier in the discussion, but I may have not been totally clear. Blocking and prevention solutions will never go away, and are 100% necessary. What I was trying to emphasize is that the current focus on blocking and prevention is not sufficient. Instead, organizations need to look at expanding their security posture by not only trying to block and prevent incidents by using modern-day solution, but to instead also look at having solutions in place that allow them to quickly detect threats that have slipped through the cracks of existing prevention solutions and be able to efficiently investigate these incidents and quickly respond to them.
  14. Josh to thank everyone for attending, as well as Peter and Matt for presenting in the webinar Josh to mention that you can contact Ziften and Lancope by emailing us at sales@ziften.com and sales@lancope.com Mention that we can put anyone interested in contact with Matt, and to reach out to either Ziften or Lancope if you want to speak with Matt.