securing digital business with security everywhere · of each file as it crosses the data center....

33
Henry Ong Security SE Manager - ASEAN Securing Digital Business with Security Everywhere Global Security Sales Organization

Upload: others

Post on 03-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Henry Ong

Security SE Manager - ASEAN

Securing Digital Business with Security Everywhere

Global Security Sales Organization

Page 2: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Digital Disruption Drives the Hacker Economy There is a multi-billion dollar global industry targeting your prized assets

Social Security

$1

Mobile Malware

$150

$ Bank

Account Info >$1000 depending on account type

and balance

Facebook Accounts $1 for an

account with 15 friends

Credit Card Data

$0.25-$60

Malware Development

$2500 (commercial

malware)

DDoS

DDoS as A Service ~$7/hour

Spam $50/500K

emails Medical

Records >$50

Exploits $1000- $300K

© 2015 Cisco and/or its affiliates. All rights reserved. 2

$450 Billion to

$1 Trillion

Page 3: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

???

“Cat and Mouse” Game

Page 4: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

The Security Effectiveness Gap

Goal for Effective Security

Page 5: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes
Page 6: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes
Page 7: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

A Threat-Centric Security Model

ATTACK CONTINUUM

Point-in-Time Continuous

Network Endpoint Mobile Virtual Cloud

BEFORE Discover

Enforce

Harden

AFTER Scope

Contain

Remediate

Detect

Block

Defend

DURING

Page 8: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Premiere Portfolio in the Industry

Best of Breed | Architectural Approach

Threat Intelligence

Visibility

Cloud Network Integrated

Web

W W W

Email

NGFW/NGIPS Advanced Threat

Policy and Access UTM

Integrated for Best Threat Protection

Page 9: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Cisco Advanced Malware Detection Lattice

Continuous Protection Reputation Filtering Behavioral Detection

9

1-to-1

Signatures

Generic

Signatures

Machine

Learning IOCs

Dynamic

Analysis

Advanced

Analytics

Device Flow

Correlation

Page 10: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Point-in-Time Detection Alone Will Never Be 100% Effective

Point-in-Time Protection

File Reputation and Sandboxing

Retrospective Security

Continuous Analysis

Page 11: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

When Malware Strikes, Have Answers

Where did it come

from?

Who else is

infected?

What is it doing? How do I stop it?

Device Trajectory File Trajectory

Auto Remediation File Analysis

Page 12: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense

AMP

Threat Intelligence

Cloud

Windows OS Android Mobile Virtual MAC OS CentOS, Red Hat

Linux for servers

and datacenters

AMP on Web and Email Security Appliances AMP on Cisco® ASA Firewall

with Firepower Services

AMP Private Cloud Virtual Appliance

AMP on Firepower NGIPS

Appliance

(AMP for Networks)

AMP on Cloud Web Security and Hosted Email

CWS/CTA

Threat Grid

Malware Analysis + Threat

Intelligence Engine

AMP on ISR with Firepower

Services

AMP for Endpoints

AMP for Endpoints

Remote Endpoints

AMP for Endpoints can be

launched from AnyConnect

Page 13: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes
Page 14: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Shared intelligence

Shared contextual

awareness

Consistent policy

enforcement

Cisco Firepower™ Management Center

Talos

Firepower 4100 Series Firepower 9300 Platform

Visibility Radware

DDoS Network analysis Email Threats

Identity and NAC DNS Firewall URL

Industry’s First Fully Integrated threat-focused NGFW

Page 15: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

spotlight on systems at high risk for an active breach

Correlating Weak Signals Into Indicators Of Compromise

Page 16: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Supplement security with specialized protection along common attack vectors

AMP for Web and Email

File Reputation captures a fingerprint

of each file as it crosses the data

center. Automatically block malicious

files and apply policies.

File Sandboxing analyzes unknown

files that are traversing the data

center. The secure environment

combines human and machine

analysis to generate a disposition.

File Retrospection provides continuous

analysis of files over time, updating

with the AMP cloud-based intelligence.

If a file disposition changes to

malicious, admins are notified.

Email Security

Solutions: ESA

Web Security

Solutions: WSA, CWS

Page 17: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Adding Security at the DNS Layer.

91.3% of malware uses DNS

68% of organizations

don’t monitor it

A blind spot for attackers to gain command and control, exfiltrate data, and redirect traffic

Page 18: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

DNS is the fastest way to establish Security Everywhere

Page 19: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

INTERNET

MALWARE

C2/BOTNETS

PHISHING

AV

AV

AV AV

ROUTER/UTM

AV AV

ROUTER/UTM

SANDBOX

PROXY

NGFW

NETFLOW

AV AV

AV AV

MID LAYER

LAST LAYER

MID LAYER

LAST

LAYER

MID LAYER

Endpoint

Endpoint

BENEFITS

Alerts Reduced 2-10x; Improves your SIEM

Block malware before it hits the enterprise

Contains malware if already inside

Internet access Is faster; Not slower

Provision globally in under 30 minutes

FIRST

LAYER

Page 20: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Threat Prevention Not just threat detection

Protects On & Off Network Not limited to devices forwarding traffic through on-prem appliances

Turnkey & Custom API-Based Integrations Does not require professional services to setup

Block by Domains, IPs & URLs for All Ports Not just IP addresses or domains only over ports 80/443

Always Up to Date No need for device to VPN back to an on-prem server for updates

UMBRELLA

A New Layer of Breach Protection

Page 21: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

A T T A C K C O N T I N U U M

BEFORE Discover

Enforce

Harden

AFTER Scope

Contain

Remediate

Detect

Block

Defend

DURING

Consistent Protection for ANY Workload, 24 x 7

Network as a Sensor

Network as an Enforcer

Synergies Through Integration The Network and Security

Page 22: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

RECONNAISSANCE

BOTNET

DATA

HOARDING

SPREADING

MALWARE

POLICY

VIOLATION

Network as a Sensor to Identify Indicators of Compromise

Page 23: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Host

Reputation

Change

Inside Host Potentially

Compromised

Denial of

Service

SYN Half Open; ICMP/UDP/Port

Flood

Discoverable IOCs by Lancope StealthWatch

Botnet

Detection

When Inside Host Talks to Outside

C&C Server

Fragmentation

Attack

Host Sending Abnormal # Malformed Fragments

Worm

Propagation

Worm Infected Host Scans, etc.

Large Outbound File Transfer VS.

Baseline

Data

Exfiltration

Network

Scanning

TCP, UDP, Port Scanning Across

Multiple Hosts

Page 24: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

• Not Intuitive

• Complex

• Long Time to Identity

User Device, Location

ISE & Lancope Integration More Intelligence and Richer Context

Identity Malicious Traffic Faster with More Context

Enhanced Visibility – User, Location, Device

Before Now

Host 1.2.3.4 Scanning Ports of Host 3.3.3.3 Host 1.2.3.4 Scanning Ports of Host 3.3.3.3

VPN

Laptop

Seattle

Finance

POS

Ethernet

New York

B. Thomas

Page 25: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

ADMIN ZONE

ENTERPRISE ZONE

POS ZONE

VENDOR ZONE

Network as an Enforcer And make visibility actionable through segmentation and automation

• Cisco ISE

• Cisco Networking Portfolio

• Cisco NetFlow

• Lancope StealthWatch

• Cisco TrustSec Software-Defined

Segmentation

EMPLOYEE ZONE

DEV ZONE

Page 26: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Network Resources Access Policy

Traditional Cisco

TrustSec®

BYOD Access

Threat Containment

Guest Access

Role-Based

Access

Identity Profiling

and Posture

Who

Compliant

What

When

Where

How

Cisco Identity Services Engine (ISE)

A centralized security solution that automates context-aware access to network resources and shares

contextual data

Network

Door

Context

ISE pxGrid

Controller

Page 27: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Software Defined Network Segmentation with SGTs

Access Layer

Enterprise

Backbone

Voice

VLAN

Voice

Data

VLAN

Employee

Aggregation Layer

Supplier

Guest

VLAN

BYOD

BYOD

VLAN

Non-

Compliant

Quarantine

VLAN

VLAN

Address

DHCP Scope

Redundancy

Routing

Static ACL

VACL

Security Policy based on Topology

High cost and complex maintenance

Voice

VLAN

Voice

Data

VLAN

Employee Supplier BYOD Non-

Compliant

Use existing topology and automate

security policy to reduce OpEx

ISE

No VLAN Change

No Topology Change

Central Policy Provisioning

Micro/Macro Segmentation

Employee Tag

Supplier Tag

Non-Compliant Tag

Access Layer

Enterprise

Backbone

DC Firewall

DC Servers

Policy

TrustSec Traditional

Segmentation

Page 28: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Cisco Rapid Threat Containment Solution Faster Time-to-Containment

• Cisco ASA with Firepower

Services

• FirePOWER NGIPS Appliances

• Cisco AMP for Networks

• Firepower on Cisco ISR

• Cisco FireSIGHT

Management Center

• Automated Contextual Analysis

and Threat Qualification

• Continuous Threat Intelligence

Updates to Threat Sensors

• Cisco FireSIGHT and Cisco ISE

Automate Containment

• Policy Enforcement from Cisco

TrustSec, Downloadable ACL,

or VLAN

Threat Visibility Automated

Enforcement

Advanced

Threat Sensors

Page 29: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Cisco: 17.5 hours Industry TTD rate:* 100 days

Detect infections earlier and act faster

• Automated attack

correlation

• Indications of

compromise

• Local or cloud

sandboxing

• Malware infection

tracking

• Two-click containment

• Malware analysis

Source: Cisco® 2016 Annual Security Report

*Median time to detection (TTD)

JAN

MONDAY

1

JAN

FEB

MAR

APR

Page 30: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Packet Brokering Network Infrastructure &

Policy Management

Performance

Management &

Visualization Mobility

Packet

Capture &

Forensics SIEM & Analytics

Remediation

& Incident

Response

Vulnerability

Management

Custom

Detection

Firewall/Access Control IAM/SSO

Cisco Security Technical Alliances (CSTA)

Page 31: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes

Security Across the Extended Network

Minimize Complexity

Streamline Deployment

Reduce Costs

Security

Everywhere

Enables Security as a Growth

Engine

Page 32: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes
Page 33: Securing Digital Business with Security Everywhere · of each file as it crosses the data center. Automatically block malicious files and apply policies. File Sandboxing analyzes