secure data gi - delivering contextual intelligence

Post on 06-Aug-2015

78 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

1

Delivering Contextual Intelligence

25/11/14A NEW APPROACH TO COMBATING CYBER CRIME 1

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

2

FIREWALLSENDPOINTSECURITY

THE CURRENT SECURITY LANDSCAPE

GATEWAYSECURITY

IPS/IDSSERVERSECURITY

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

3A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

3

THE SECURITY CONUNDRUM

SECURITY SPEND CONTINUES

TO RISE

$$30.1 BILLION SPEND BY 2017

UP FROM $9.6 BILLION IN 2006

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

4A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

4

THE SECURITY CONUNDRUM

SECURITY SPEND CONTINUES

TO RISE

BUT SO DOES THE NUMBER OF BREACHES

621 REPORTED IN THE LAST 12 MONTHS

UP 23% OVER THREE YEARS

$$30.1 BILLION SPEND BY 2017

UP FROM $9.6 BILLION IN 2006

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

5A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

5

THE SECURITY CONUNDRUM

ORGANISATIONS ON THE FRONT LINE NEED A NEW APPROACH…

WE ARE NOT GOING TO WIN THE BATTLE

$

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

6

ASSESS DETECT PROTECT RESPOND

REAL-TIME RISK ASSESSMENT

CONTEXTUAL RISK PROFILE

CORRELATED THREAT & SECURITY INTELLIGENCE

EARLY THREAT DETECTION

AUTOMATED NETWORK PROTECTION

THREAT PREVENTION

EXPERTISE & PROCESS

RAPID & EXPERIENCED RESPONSE

REMEDIATION

A COMPLETE SECURITY PROCESS

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

7

CLOUD SERVICES CHANGES THE GAME…

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

8

CLOUD SERVICES CHANGES THE GAME…

ENDPOINT SECURITY

• MALWARE INFECTIONS

• NETWORK ATTACK BLOCKED

• VULNERABLE SOFTWARE

• SUSPICIOUS BEHAVIOUR

• PROCESS INJECTION BLOCKED

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

9

• INBOUND CONNECTION FAILED

• OUTBOUND CONNECTION FAILED

• OUTBOUND UDP BLOCKED

• TUNNEL TRAFFIC DETECTED

• INBOUND PING BLOCKED

CLOUD SERVICES CHANGES THE GAME…

FIREWALL SECURITY

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

10

CLOUD SERVICES CHANGES THE GAME…

SERVER SECURITY

• LOGIN FAILURES

• PASSWORD FAILURE

• VULNERABILITY ON SOFTWARE

• LPAL VIOLATION

• MALWARE

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

11

CLOUD SERVICES CHANGES THE GAME…

GATEWAY SECURITY

• SUSPICIOUS EMAILS

• UNSAFE ATTACHMENTS

• MALICIOUS JAVASCRIPT

• SUSPICIOUS URL

• C&C CONNECTION

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

12

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

13

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

TECHNOLOGY PROCESS PEOPLE+ +

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

14

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

TECHNOLOGY PROCESS PEOPLE+ +

LEVERAGED PEOPLE

CORRELATED AND CONTEXTUALISED

APPLIED INTELLIGENCE

LEVERAGED HARDWARE+ +

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

15

APPLIED INTELLIGENCE

TECHNOLOGY PROCESS PEOPLE+ +

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

16A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

16

INSIDE THE SECUREDATA GI CLOUD

CUSTOMER INFORMATION

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

17A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

17

INSIDE THE SECUREDATA GI CLOUD

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

VULNERABILITY SCANNING

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGYSKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

18A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

18

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

VULNERABILITY SCANNING

THREAT FEEDS

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

19A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

19

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

EXPERTPEOPLE

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

TENSOF ALERTS INVESTIGATED

VULNERABILITY SCANNING

THREAT FEEDS

24 X 7 X 365 SOC

SENSEPOST SECURITYCONSULTANCY

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

CYBER ANALSYST TEAM

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

20A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

20

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

EXPERTPEOPLE

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

TENSOF ALERTS INVESTIGATED

INDIVIDUALTHREATS WITH ACTIONABLE INTELLIGENCE

VULNERABILITY SCANNING

THREAT FEEDS

24 X 7 X 365 SOC

SENSEPOST SECURITYCONSULTANCY

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

CYBER ANALSYST TEAM

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

21A NEW APPROACH TO COMBATING CYBER CRIMEPRIVATE & CONFIDENTIAL25/11/1421

THANKYOU

top related