Deploy Symantec Cloud Workload Protection for Storage

Similar documents
Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Best Practices in Securing a Multicloud World

AWS Reference Design Document

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

McAfee Public Cloud Server Security Suite

SYMANTEC DATA CENTER SECURITY

Datacenter Security: Protection Beyond OS LifeCycle

Securing the Modern Data Center with Trend Micro Deep Security

Office 365 Buyers Guide: Best Practices for Securing Office 365

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

100% Endpoint Protection dank Machine Learning, EDR & Deception?

SIEMLESS THREAT DETECTION FOR AWS

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Securing Your Amazon Web Services Virtual Networks

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

CLOUD WORKLOAD SECURITY

McAfee Endpoint Threat Defense and Response Family

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Software-Defined Secure Networks in Action

Comodo Certificate Manager

Symantec Endpoint Protection Family Feature Comparison

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Security by Default: Enabling Transformation Through Cyber Resilience

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

INTRODUCING CISCO SECURITY FOR AWS

Defend Against the Unknown

Securing the Software-Defined Data Center

McAfee Advanced Threat Defense

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

Comprehensive Database Security

McAfee Virtual Network Security Platform

Securing Your Microsoft Azure Virtual Networks

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

THE ACCENTURE CYBER DEFENSE SOLUTION

McAfee Cloud Workload Security Product Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

Symantec Advanced Threat Protection: Endpoint

Symantec Cloud Workload Protection

How to Secure Your Cloud with...a Cloud?

Put an end to cyberthreats

THALES DATA THREAT REPORT

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Hackproof Your Cloud Responding to 2016 Threats

SOLUTION BRIEF Fulfill the promise of the cloud

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

JUNIPER SKY ADVANCED THREAT PREVENTION

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Everything visible. Everything secure.

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Qualys Cloud Platform

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

BETTER Mobile Threat Defense (BMTD)

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Infrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation

Maximum Security with Minimum Impact : Going Beyond Next Gen

8 Must Have. Features for Risk-Based Vulnerability Management and More

Qualys Cloud Platform

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

10 FOCUS AREAS FOR BREACH PREVENTION

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

Security and Compliance for Office 365

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Resolving Security s Biggest Productivity Killer

CloudSOC and Security.cloud for Microsoft Office 365

Juniper Sky Advanced Threat Prevention

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Securing Office 365 with SecureCloud

Managed Endpoint Defense

Stopping Advanced Persistent Threats In Cloud and DataCenters

Five Essential Capabilities for Airtight Cloud Security

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

External Supplier Control Obligations. Cyber Security

Enhanced Threat Detection, Investigation, and Response

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

: Administration of Symantec Endpoint Protection 14 Exam

Protect Your End-of-Life Windows Server 2003 Operating System

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Clearing the Path to Micro-Segmentation. A Strategy Guide for Implementing Micro- Segmentation in Hybrid Clouds

Infoblox as Part of the Ecosystem

Security Gap Analysis: Aggregrated Results

Transcription:

Deploy Symantec Cloud Workload Protection for Storage An additional layer of protection for your data stored in Amazon S3 Copyright 2018. Symantec or its affiliates. All rights reserved. Copyright 2018. Amazon Web Services, Inc. or its affiliates. All rights reserved. Deploy Symantec Cloud Workload Protection for Storage 1

INTRODUCTION As organizations generate ever-increasing amounts of information on a daily basis, the need to securely collect, store, and rapidly analyze this data at a massive scale has never been greater. To keep pace, many corporations have migrated to Amazon Web Services (AWS), where they use Amazon Simple Storage Service (Amazon S3) to store and retrieve any amount of data from anywhere including websites, mobile applications, corporate applications, and Internet of Things (IoT) sensors and devices. With this much data stored on the cloud, protecting it is a primary concern. Symantec Cloud Workload Protection for Storage (CWP for Storage) is designed to discover and remediate malware and advanced threats. The solution provides an additional layer of security for your data stored on AWS. CWP for Storage helps protect data in your Amazon S3 buckets while helping to keep your data safe inside of your secure Amazon Virtual Private Cloud (Amazon VPC). protection of your stored data from malware and advanced threats. Discover how the flexibility and scalability of CWP for Storage helps protects your data in Amazon S3 buckets, and enables the secure adoption of containers and serverless technologies, including AWS Lambda. We will also provide details on why Snapper a New Zealand-based company that develops custom account-based payment and ticketing solutions chose to adopt CWP for Storage to enhance the protection of their data in Amazon S3. Read this ebook to learn more about how CWP for Storage can help your organization implement a robust security strategy that will enhance the Deploy Symantec Cloud Workload Protection for Storage 2

PROTECTIN FOR STORED DATA FROM MALWARE AND ADVANCED THREATS Your organization needs to adopt a cloud-based security strategy that is different from the one you use to protect your on-premises data storage. Sophisticated hackers have developed numerous approaches to compromise anti-malware solutions which are not specifically created to protect storage environments. For example, many such programs are unable to vet very large files. As a result, hackers are able to exploit this vulnerability to evade antimalware scans. Consider the following examples: MALWARE PERSISTENCE: Malware is no longer limited to persisting in files or registries on endpoints, and is increasingly able to hide in shared storage. In this scenario, malware can resurrect itself even if the system is rebooted. DAY-1 INCURSION: Scheduled scanning of stored files helps to discover and remediate malware incursions that may have happened before the file was known to be malicious. Without periodic rescanning with updated definitions, you will run the risk of new infections. UN-SCANNABLE NETWORK FILE: Attackers are finding particular success evading detection by using deeply nested larger compressed files, such as.zip,.tar,.gz, and.bz. When these files are larger than 10MB, they are often not scanned and can serve as springboards for new attacks. These changes, and others, in the evolving threat landscape are why you need a security solution like CWP for Storage that can scan files both automatically, and at regularly scheduled times, to discover and block persistent and stealthy threats that enter through gaps in security or through doors that may have been inadvertently left open. Deploy Symantec Cloud Workload Protection for Storage 3

FURTHER SECURE DATA IN AMAZON S3 BUCKETS BY USING SYMANTEC CWP FOR STORAGE To prevent your Amazon S3 buckets from being contaminated by malware, ransomware, and other threats, consider using CWP for Storage to protect your cloud data storage and help to ensure that your Amazon S3 buckets are not publicly accessible. The auto-scaling CWP for Storage solution includes malware protection, public access visibility, quarantine management, and remediation policies all run from a single console. It can help you further protect data stored in Amazon S3 buckets using Symantec Endpoint Protection (SEP) anti-malware technologies. These include advanced machine learning and reputation analysis, which help to discover advanced threats in your cloud storage environment. Amazon S3 bucket security postures, alerts, and events are viewed in the single CWP console. Automatic, scheduled, and on-demand scanning modes enable full-time protection to inspect files when they are uploaded, downloaded, or modified. Importantly, CWP for Storage helps to protect against data exposure by discovering and alerting when Amazon S3 buckets are unintentionally configured to share data to the public internet. CWP for Storage does not remove data from your Amazon VPC during anti-malware scanning, which keeps sensitive data protected during assessment and can also help you maintain regulatory compliance. To further protect your data storage from being contaminated with malware, ransomware, and other threats, consider using CWP for Storage. Deploy Symantec Cloud Workload Protection for Storage 4

HOW CWP FOR STORAGE WORKS CWP for Storage automatically discovers and helps protect Amazon S3 buckets against infiltration by malware and advanced threats. Powered by SEP technologies, the solution s Near Real-time Scan (NRTS) feature scans new and updated files and objects in Amazon S3 buckets. To catch files that are retroactively classified as threats, CWP for Storage provides Scheduled Scanning to periodically scan bucket contents against the latest anti-malware definitions. Part of the Symantec Cloud Workload Protection Suite, CWP for Storage enables discovery and visualization of all Amazon S3 buckets, along with their security postures and alerts regarding the public accessibility status of buckets, files, and objects. All scanning is performed within your Amazon VPC, ensuring that sensitive data never leaves your secure environment. This can help organizations meet compliance goals and data sovereignty requirements. The solution is available in AWS Marketplace. Automatic and scheduled scanning of Amazon S3 buckets helps to discover malware and prevent infection of cloud applications, services, and users CWP for Storage helps to protect against data exposure by discovering and alerting when Amazon S3 buckets are misconfigured or unintentionally exposed to the public internet This solution discovers and blocks the latest detected threats using Symantec's suite of anti-malware technologies including reputation analysis and advanced machine learning Automatic protection of data stored in Amazon S3 buckets helps to reduce administrative workloads CWP for Storage threat scanning infrastructure scales elastically up and down with scanning loads for cost optimization Files are not removed from the Amazon VPC during scanning, ensuring that sensitive information is not exposed during assessment Deploy Symantec Cloud Workload Protection for Storage 5

HOW SNAPPER PROTECTS DATA STORED IN AMAZON S3 Snapper Services Limited, a New Zealandbased mobile payments provider supporting public transportation, needed a way to scan files transiting in and out of Amazon S3 buckets for threats and malware to address compliance mandates. They were in the process of creating an online concessions payment program for local students in Wellington, New Zealand, and had concerns about how to further secure the personal data they store in Amazon S3 buckets. They required a storage security solution that would provide an additional layer of protection for the online student profiles and payment details stored in Amazon S3. Snapper chose to adopt CWP for Storage based on its flexibility, scalability, and ability to deploy within a matter of hours. They also chose this solution because of its simplicity and efficiency. In addition, the solution needed to integrate with Snapper s DevOps workflows and scale elastically with dynamic scanning loads. All of Snapper s solutions are built on AWS. For this concessions-based project they needed a way to protect students personal and payment data while rapidly identifying the offers each student qualified for, and then safely store all of this data in Amazon S3. The files Snapper is scanning are typically flat text files (lists of eligible students) and PDFs up to 100MB in size (documents that confirm student eligibility). To meet the security requirements of this project, Snapper must scan all outbound content for malware before it can be sent. This is a contractual obligation that cannot be overlooked. Having the ability to tag this content to show it has been scanned enabled them to rapidly proceed with CWP for Storage as their solution. They can scan and tag each document and clearly demonstrate when it was successfully scanned. The flexibility of CWP for Storage to scale up or down was also a key factor in Snapper s decision to work with Symantec. Even with only one server set to auto-scaling and the queue building up, CWP for Storage is able to service the queue until it has been scanned in its entirety. If the queue count gets too big, Symantec will automatically spin up another instance to handle the congestion. Deploy Symantec Cloud Workload Protection for Storage 6

WHY SNAPPER CHOSE CWP FOR STORAGE ON AWS CWP for Storage helps Snapper meet their contractual requirements and provides the ability to scale elastically. In July 2018 the concessionbased payment system will be fully operational. After the initial launch they anticipate having to scale up to meet demand, however they appreciate the capability to scale down as needed for cost optimization once they are fully operational. The willingness of Symantec s development team to accept feedback has greatly benefited Snapper during deployment of CWP for Storage on AWS. For instance, Symantec created and implemented the tagging feature to demonstrate that content had been scanned and confirm when it occurred. Snapper is currently building this new feature into the workflow of their concessions portal. Snapper did not expect to find a turn-key solution, and the ones they initially evaluated would be difficult to fix when/if they encountered problems. Snapper appreciated Symantec s agile support and rapid introduction of new features. Deploy Symantec Cloud Workload Protection for Storage 7

CONCLUSION CWP for Storage is a cloud-native, anti-malware solution that helps protect storage repositories without removing sensitive data from your Amazon VPC. Use CWP for Storage to provide an additional layer of security for your data stored in Amazon S3 with automatic and scheduled scanning that discovers and remediates malware to further reduce the risk of infections spreading between your cloud applications, services, and users. CWP for Storage also increases the visibility of publicly exposed and misconfigured buckets while simplifying the security management of your storage environment from a single console. GET STARTED Symantec Cloud Workload Protection for Storage: Free trial Symantec Cloud Workload Protection for Storage Symantec AWS Microsite Symantec Cloud Workload Protection for Storage in AWS Marketplace Amazon Simple Storage Service Symantec on AWS Copyright 2018. Symantec or its affiliates. All rights reserved. Copyright 2018. Amazon Web Services, Inc. or its affiliates. All rights reserved. Deploy Symantec Cloud Workload Protection for Storage 8