Advanced Malware Protection: A Buyer s Guide

Similar documents
Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Networks

Agile Security Solutions

Cisco Advanced Malware Protection for Networks

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Advanced Malware Protection. May 2016

Protection - Before, During And After Attack

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Defend Against the Unknown

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Advanced Malware Protection (AMP) for Endpoints Security Testing

Cisco Advanced Malware Protection for Endpoints. Donald J Case BizCare, Inc. Saturday, May 19, 2018

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Building Resilience in a Digital Enterprise

McAfee Advanced Threat Defense

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Cisco Advanced Malware Protection against WannaCry

Firewall nové generace na platformě SF, přístupové politiky, analýza souborů, FireAMP a trajektorie útoků

McAfee Endpoint Threat Defense and Response Family

Managed Endpoint Defense

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

SentinelOne Technical Brief

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

PALANTIR CYBERMESH INTRODUCTION

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Snort: The World s Most Widely Deployed IPS Technology

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

THE ACCENTURE CYBER DEFENSE SOLUTION

IBM Security Network Protection Solutions

RSA NetWitness Suite Respond in Minutes, Not Months

Resolving Security s Biggest Productivity Killer

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Transforming Security from Defense in Depth to Comprehensive Security Assurance

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

SentinelOne Technical Brief

The Internet of Everything is changing Everything

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0

Security and Compliance for Office 365

The Symantec Approach to Defeating Advanced Threats

Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

How Vectra Cognito enables the implementation of an adaptive security architecture

Symantec Client Security. Integrated protection for network and remote clients.

NGFW Requirements for SMBs and Distributed Enterprises

Cisco Security: Advanced Threat Defense for Microsoft Office 365

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Carbon Black PCI Compliance Mapping Checklist

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

McAfee Endpoint Security

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Traditional Security Solutions Have Reached Their Limit

Are we breached? Deloitte's Cyber Threat Hunting

SIEM Solutions from McAfee

Next-Generation Network Security

with Advanced Protection

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

2018 Edition. Security and Compliance for Office 365

RSA Security Analytics

WHITEPAPER. Protecting Against Account Takeover Based Attacks

An Investment Checklist

AMP for Endpoints & Threat Grid

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

RSA INCIDENT RESPONSE SERVICES

Cisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017

McAfee epolicy Orchestrator

esendpoint Next-gen endpoint threat detection and response

BUFFERZONE Advanced Endpoint Security

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Office 365 Buyers Guide: Best Practices for Securing Office 365

Symantec Endpoint Protection 14

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

We re ready. Are you?

Application Whitelisting and Active Analysis Nick Levay, Chief Security Officer, Bit9

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

RSA INCIDENT RESPONSE SERVICES

SIEM: Five Requirements that Solve the Bigger Business Issues

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Technical Brochure F-SECURE THREAT SHIELD

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Cisco ASA with FirePOWER Services

Transcription:

Advanced Malware Protection: A Buyer s Guide

What You Will Learn This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today s advanced malware attacks using a combination of four techniques: Advanced analytics Collective global security threat intelligence Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) Continuous analysis and retrospective security Introduction It s no secret that today s attackers have the resources, expertise, and persistence to compromise any organization if given enough time. Traditional defenses, including firewalls and endpoint anti-virus, no longer work against these attacks. The process of handling malware must evolve and quickly at that. Detecting targeted, persistent malware attacks is a bigger problem than a single point-in-time control or product can effectively address on its own. Advanced malware protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyze, and remediate these threats before, during, and after an attack. Questions To Ask Your Vendor How are you using big data for persistent malware determination? How is malware analyzed to determine exactly what it does? How does your malware analysis automatically update detection capabilities? How do you gather intelligence on emerging malware threats? How do you perform continuous analysis for retrospective malware detection? The problem will get worse before it gets better. With the rise of polymorphic malware, organizations face tens of thousands of new malware samples per hour, and attackers can rely on fairly simple malware tools to compromise a device. The blacklist approach of matching a file to known malware signatures no longer scales to keep pace, and newer detection techniques such as sandboxing fall short of 100 percent efficacy. Advanced Analytics and Collective Security Intelligence In an attempt to better serve customers in the wake of the exponential rise in known malware, traditional endpoint-protection vendors introduced a cloud-assisted anti-virus capability that essentially moved the signature databases to the cloud. This addressed the issue of needing to distribute billions of virus signatures to each endpoint every five minutes, but it didn t address the evolution of advanced malware designed to evade signature-based detection. By designing malware that acts patiently, attackers exploited another limitation of the cloudassisted anti-virus model: most anti-malware technologies suffer from a lack of persistence and context, focusing solely on detection the first time a file is seen (point-in-time detection). However, what is benign today can easily become malicious tomorrow. True protection can be achieved only through continuous analysis. Constantly monitoring all traffic helps security personnel trace an infection back to its origin if a file s disposition changes. Advanced malware writers use a variety of techniques to obscure the intent of malware and make it much harder to detect. These innovations include polymorphic files that change just enough to fool the signature engines, sophisticated downloaders that obtain malware on demand from command-and-control (CnC) networks, and erasable Trojans, which delete their own components, making it difficult for forensics investigators to find and analyze the malware. Those are but a few examples. Since malware can no longer be identified based on what it looks like, an effective defense requires new techniques to capture and analyze the malware over its lifecycle. This new model of proactive security intelligence gains an understanding of what the malware does and where it goes. Threats today can evade defenses that deploy point-in-time strategies and will execute and indicate compromise in a system well after the initial detection period. You need an approach to malware that adapts as quickly as the threat. Cisco has taken a new, more comprehensive approach to address these challenges in detecting malware. Supported by a global footprint of thousands of enterprises and millions of endpoints, we collect millions of malware samples every month. Our Threat Grid analysis engines, the Cisco Talos Security Intelligence and Research Group (Talos) and our Collective Security Intelligence (CSI) Cloud analyze tens of thousands of software attributes to separate malware from benign software. We also analyze network traffic characteristics to identify malware searching for CnC networks. For comparison, we use our vast base of Advanced Malware Protection (AMP) installations across our product lines 1 to determine what normal file and network activity looks like, both globally and within each specific customer organization. 1. AMP capabilities are now available as an additionally licensed feature on the Cisco Email and Web Security solutions.

Detecting malware designed to evade traditional detection tactics requires even further sophistication. Cisco uses purpose-built models to identify malware based on what it does, not what it looks like. So new types of attacks, even new zero-day attacks, can be detected. To keep pace with the rate of change of malware, these models update automatically in real time based on attack methods discovered by our Threat Grid analytics engines and our Talos Security Intelligence and Research Group. The integration of our Threat Grid technology into AMP also provides added threat intelligence and both static and dynamic (sandboxing) malware analysis engines. Now integrated into AMP, Threat Grid (also available as a standalone solution) gives security teams an additional malware knowledge base sourced from around the globe. Organizations get context-rich intelligence feeds delivered in standard formats to seamlessly integrate with existing security technologies; analysis of millions of samples every month, against more than 350 behavioral indicators, resulting in billions of artifacts; and an easy-to-understand Threat Score to help security teams prioritize threats. Threat Grid s analysis engines identify what malware is doing, including associated HTTP and DNS traffic, TCP/IP streams, processes it s affecting, and registry activity, enabling security teams to gain better awareness of potential threats in their networks. Figure 1. Cisco s security approach protecting you before, during, and after an attack, across multiple attack vectors and providing continuous analysis and retrospective security in addition to traditional point-in-time detection techniques. BEFORE Discover Enforce Harden Attack Continuum DURING Detect Block Defend AFTER Scope Contain Remediate Added benefits include cloud analytics that evaluate files over an extended period of time. Our AMP solutions can alert you well beyond the first time the file is analyzed, even if it has passed through a detection point. Finally, these benefits extend to the entire Cisco AMP community. Whenever a file disposition changes, AMP sends an alert. In this situation, all organizations using Cisco AMP immediately become aware of the malicious file, providing collective immunity enabled by the power of the cloud. Retrospective Security Turns Back the Clock on Attacks Attackers do not stand still. They constantly evaluate the security controls in place and change tactics to stay a step ahead of defenses. In fact, most attackers test their malware against the leading anti-malware products before launching their attacks. As the efficacy of blacklist approaches wanes, more and more security companies rely on virtual machine (VM)-based dynamic analysis to expose and study the malware. Attackers have responded by adapting their tactics: either they do nothing, or they delay the execution of the attack for a period of hours (or days) when running in a VM. They assume the file will evade detection because it did nothing malicious during the evaluation period. Of course, once the waiting period expires, the malware compromises the device. Unfortunately, point-in-time technologies cannot analyze a file again. When a file has been deemed safe, its status doesn t change regardless of whether detection techniques have improved or the file exhibits malware behavior. Even worse, once the malware evades detection, these controls have no way to track its propagation within the environment, provide visibility into the root causes, or identify potential malware gateways (systems that repeatedly become infected with malware or serve as the launching pad for broader infections). Retrospective Security Network Endpoint Mobile Virtual Cloud Email & Web The use of continuous analysis to constantly scrutinize file behavior, trace processes, file activities, and communications over time in order to understand the full extent of an infection, establish root causes, and perform remediation. This lets you look back in time and turn back the clock on potential attacks. The need for retrospective security arisies when any indication of a compromise occurs, such as an event trigger, a change in the disposition of a file or an Indication of Compromise (IoC) trigger. Threat Intelligence & Advanced Analytics Point-in-time Protection Continuous Analysis & Retrospective Security

The best approach is to assume that no detection measures will be 100 percent effective. To believe that such measures will fully protect you overestimates your ability to defend your critical assets and underestimates your adversaries abilities to attack them. Organizations need to assume their defenses will be evaded. They must have the capacity to understand the scope and context of an infection, contain the damage quickly, and eliminate the threat, root causes, and malware gateways. This capability requires retrospective security. Our retrospective security technology enables you to travel back in time and determine which devices have been exposed to a malware regardless of when the compromised file is identified. Two features provide this capability: file trajectory and indications of compromise (IoCs). File trajectory tracks every file crossing the protected network and gives you access to a full history of actions from every protected device that has been exposed. IoCs use the information from file trajectory to create a behavioral pattern that can be used to search your system for malware that is present but undetected. Tracking Malware Through Trajectory If a file proves to be malware at some point in the future, you have limited options with traditional anti-malware defenses. You can t get into a time machine and block the file upon entrance. It s already in the environment, and you have no idea how far it has spread or what it has done. This is where most anti-malware controls leave you blind to the full scope of the problem and with no ability to figure it out. Enter the big data and advanced analytics underlying AMP. Our trajectory capability quickly determines exactly how the malware has traversed the organization. In some cases, you can immediately and automatically clean the affected devices. Trajectory provides you with a visual mapping of how the files traveled through the organization and what the files did on the system. But you don t just get a view of file activity across the network. AMP can also show you the detailed activity of every executable on a single endpoint, regardless of the file s disposition. With the power to then pivot your view from activity on one endpoint, to then see where malicious files have migrated to other endpoints across your extended network, this provides a powerful level of visibility for security teams. Even more important, since AMP tracks every use of every file, you can identify patient zero (the first malware victim) and every other infected device, helping to ensure the total eradication of the infection. It s well known that if even a single instance of the malware remains after cleanup, the likelihood of reinfection remains significant. Additionally, trajectory doesn t just analyze information related to file activity. It can also track information about the file s lineage, use, dependencies, communications, and protocols. It can track which files are installing malware in order to facilitate a quick root-cause analysis of detected malware or suspicious activity. Security teams can switch from detection to control during an attack, quickly understanding the scope of an outbreak and root causes to effectively stop further infection. Figure 2. A file trajectory screen showing malware propagation with information on point of entry, malware activity, and which endpoints are involved.

Determining which event requires prioritization and an immediate response proves extremely challenging when you re faced with a high number of detection events, especially with malware. A single event, even a blocked malicious file on an endpoint, doesn t always mean compromise. However, when multiple events, even multiple seemingly benign activities, are correlated, the result can significantly raise the risk that a system has been compromised and that a breach is imminent or in progress. IoCs Identify Patterns, Not Fingerprints AMP s Indications of Compromise (IoC) capability allows you to perform deeper analytics to find systems that demonstrate symptoms of an active compromise. This capability goes far beyond what point-in-time detection technologies can deliver because it continues to capture, analyze, and correlate malware-related activity after the first analysis, giving you automated analysis and risk prioritization. Lastly, after malware has gained a foothold within an enterprise, it typically tries to communicate back to CnC servers or, if directly controlled by an attacker, begins reconnaissance activities to move laterally toward its intended target. Cisco AMP monitors communications activity on the protected endpoint and correlates it against Collective Security Intelligence to determine if a compromise has occurred and blocks the communication and distribution of malware at the endpoint. This gives security personnel a distinct advantage controlling malware proliferation on endpoints that may not reside behind the protections of a corporate network, such as systems used by remote or mobile workers. In addition, trajectory and IoCs use the captured network activity to accelerate investigations and prioritize threats. Figure 3. A Cisco AMP dashboard screen showing IoCs on a system.

Better Together: Enforcement on the Network, Secure Gateway, Physical and Virtual Endpoints, and Mobile Devices No security control can live in a vacuum. Defending against advanced malware requires significant coordination between the network, gateway, and endpoint defenses. Your security tools need to work together, share information, and correlate events if you want to increase speed to detection and response, and catch malware intrusions before they materialize into high-level breaches. You also need a central management console that tracks threats and remediation activities across all levels. Cisco provides an integrated system built on cloudbased security intelligence, advanced network analytics, and multiple enforcement points to help ensure that advanced malware doesn t go undetected in your organization. Cisco s broad AMP capabilities start protecting at the network to detect and block malware as it crosses the wire. As every file enters (or exits) the network, AMP for Networks generates a file fingerprint and then consults the Cisco FireSIGHT Management Center (Management Center) to determine whether the file has been identified as malicious. If Management Center has never seen the file, it checks with our collective security intelligence and determines whether the file has been seen within our security intelligence network. This lightweight lookup is a far more scalable approach and has no impact on system latency (as opposed to sandboxing every file on the network). For those files identified as malicious, Management Center delivers file trajectory capabilities to understand the context and extent of exposure. Cisco s lightweight endpoint malware protection agent (the Cisco AMP connector) can also be implemented on each protected device so that all file activity can be checked against our collective security intelligence and known malware. AMP for Endpoints doesn t just look for malicious files, its also detects and blocks malware behavior on protected devices. Even if the file hasn t been seen before, the endpoints are protected against zero-day attacks. AMP for Endpoints also leverages retrospective security and trajectory capabilities, as mentioned above, to identify the extent of any outbreak and identify devices requiring immediate remediation. If a file is flagged as suspicious, AMP performs deeper file analysis. As described above, Cisco s cloud-based analysis determines exactly what the file does and profiles the attack if it is found to be malware technology is now integrated with AMP for Endpoints, bringing additional intelligence feeds, static analysis, and dynamic analysis engines to scrutinize malware even deeper. This process generates IoCs that can be used to find malware that might already be on the network. Leveraging these malware profiles, AMP provides the ability for an organization to take a proactive stance against a malware outbreak. If a file proves malicious after the fact (using retrospective security), or if it is identified in another environment within the Cisco AMP community, the CSI Cloud sends the updated information to Management Center in your organization, so you can block the malware at the network or endpoint. By doing this, you achieve collective immunity with the rest of the Cisco AMP community. Additionally, you can set up custom rules to block specific files and IP addresses if local administrators identify a localized attack that necessitates immediate action. Cisco AMP for Endpoints also protects mobile devices. The AMP mobile connector relies on the same security intelligence cloud to quickly analyze Android applications for possible threats in real time. With visibility extending to mobile devices, you can quickly understand which devices have been infected and which applications have launched malware into the system. You can remediate the attack with powerful controls to blacklist specific applications so you can enforce which applications can be used on mobile devices accessing corporate resources. AMP capabilities are also now available on Cisco Email and Web Security gateways, Cisco Cloud Web Security, Cisco Meraki MX, and on Cisco ASA with FirePOWER Services. With AMP capabilities added to these appliances, you can enhance detection and blocking of advanced malware at these potential points of entry. Key AMP capabilities include file reputation and file sandboxing described above. In addition, retrospective alerting provides continuous analysis of files that have traversed these gateways, using real-time updates from the CSI Cloud to stay abreast of changing threat levels. When a malicious file is identified as a threat, AMP alerts the administrator and provides visibility into what areas and applications on the network may have been infected and when. As a result, customers can identify and address an attack quickly before it has a chance to spread. As we ve described, malware can enter the organization through multiple attack vectors. It s critical to have full visibility of activity throughout an entire organization. By leveraging our global security intelligence network and having an ability to detect, block, track, investigate and remediate outbreaks on the gateway, network, endpoints, mobile devices and virtual systems, organizations can eliminate the blind spots inherent to other security controls that lack broad coverage.

AMP in Action A real-world example is often the best way to see the power of an integrated advanced malware protection solution. AMP worked to detect a Java zero-day attack 48 hours before it was publicly announced. In this instance, AMP for Endpoints detected strange behavioral activity on multiple devices. The customer analyzed the files using the CSI Cloud and determined that the file was indeed malware. The next step was to investigate the extent of the attack and remediate the infection as quickly as possible. The customer used the trajectory capability to find which devices were exposed to the compromised file(s) or showed the behavioral patterns of the attack. After cleaning the effected devices, the customer set up custom rules to block the files as well as IoCs. But those custom rules were needed only for a short period of time. After the event, all AMP customers received the malware profile, inoculating them to that particular attack. Because the files and indicators were added to the big data analytics engine, every instance of that attack was blocked before it had a chance to enter the device or network. This process also alerted customers to the attack, enabling them to search their own environment for the threat. Thus, a single action resulted in global protection to the entire Cisco AMP customer base, even before a public disclosure of the zero-day attack. Conclusion Although the industry acknowledges that advanced malware attacks require innovative solutions to detect and remediate, far too many organizations default to focusing their efforts on detection, whether that involves traditional endpoint detection suites or silver bullet defenses. That is a sure path to failure, as the industry continues to witness with each front-page story about data loss and breaches. To have any chance of effectively defending against modern-day attacks, the solution must use continuous analysis and big data analytics to track file interaction and activity across the network, in physical and virtual environments, and on protected endpoints and mobile devices. Given that many attacks lie dormant during the period of traditional detection, having the ability to go back and retrospectively change a determination to malicious, and then track the trajectory of those files and indicators through an organization, helps you to more effectively contain and remediate the damage of these advanced attacks. Finally, advanced malware protection must be relevant not only to endpoint devices but also to networks, mobile devices, and virtual systems to provide a pervasive and consistent level of protection, given that you cannot predict the target of the next attack. AMP provides: Flexibility in deployment, while using a consistent policy, on endpoints, networks, mobile devices, secure gateways, and virtual systems CSI Cloud, which helps you identify and analyze emerging attacks even before the industry discovers them The capability to retrospectively identify malware and, through trajectory, find every instance of that malware within your organization before it spreads Collective immunity provided by the global Cisco AMP community, which accesses research derived from Talos and from the file samples seen by millions of AMP protection agents C11-733364-02 05/16