Stopping Advanced Persistent Threats In Cloud and DataCenters

Similar documents
Securing the Modern Data Center with Trend Micro Deep Security

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Copyright 2011 Trend Micro Inc.

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Commercial Product Matrix

Dynamic Datacenter Security Solidex, November 2009

South Korea Cyber-attack Heightens Changes in Threat Landscape. Richard Sheng Sr. Director, Enterprise Security, Asia Pacific

Maximum Security with Minimum Impact : Going Beyond Next Gen

Trend Micro and IBM Security QRadar SIEM

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

McAfee Public Cloud Server Security Suite

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SYMANTEC DATA CENTER SECURITY

Changing face of endpoint security

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CloudSOC and Security.cloud for Microsoft Office 365

Building Resilience in a Digital Enterprise

Datacenter Security: Protection Beyond OS LifeCycle

Security in a Virtualized Environment with TrendMicro

Agile Security Solutions

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Proactive Approach to Cyber Security

Synchronized Security

The Evolution of Data Center Security, Risk and Compliance

Trend Micro Deep Discovery and Custom Defence


TREND MICRO SMART PROTECTION SUITES

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

trend micro smart Protection suites

TREND MICRO SMART PROTECTION SUITES

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Annexure E Technical Bid Format

THE ACCENTURE CYBER DEFENSE SOLUTION

Trend Micro OfficeScan XG

Trend Micro Deep Discovery Training Advanced Threat Detection 2.0 for Certified. Professionals Course Description

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

Securing the Software-Defined Data Center

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Everything visible. Everything secure.

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

Microsoft Security Management

PT Unified Application Security Enforcement. ptsecurity.com

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Cisco Firepower NGFW. Anticipate, block, and respond to threats

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

Security by Default: Enabling Transformation Through Cyber Resilience

Future-ready security for small and mid-size enterprises

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro deep security 9.6

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Trend Micro Deep Security

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Office 365 Buyers Guide: Best Practices for Securing Office 365

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

The threat landscape is constantly

McAfee Virtual Network Security Platform

McAfee Advanced Threat Defense

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Checklist for Evaluating Deception Platforms

RSA INCIDENT RESPONSE SERVICES

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

Symantec Endpoint Protection 14

Virtual Patching in Mixed Environments: How It Works to Protect You

Measuring cloud-based anti-malware protection for Office 365 user accounts


McAfee Cloud Workload Security Product Guide

Automated Threat Management - in Real Time. Vectra Networks

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Un SOC avanzato per una efficace risposta al cybercrime

The Evolution of : Continuous Advanced Threat Protection

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

with Advanced Protection

Moving Beyond Prevention: Proactive Security with Integrity Monitoring

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Advanced Endpoint Protection

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation


Securing Your Virtual World Harri Kaikkonen Channel Manager

Securing the Data Center against

Transcription:

Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc.

Agenda How Threats evolved Transforming Your Data Centers Building a Custom Defense 10/9/2015 Copyright 2013 Trend Micro Inc.

How Threats Evolved Classical protect is not enough

10/9/2015 Copyright 2013 Trend Micro Inc.

How threats evolved In the past: Viruses, Trojans, Rootkits, Worms, Spyware, Adware, Developed to be used multiple times As a single instance (file, network packet) Goal: Information gathering Infect as many systems as possible Denial Of Services 10/9/2015

10/9/2015 Copyright 2013 Trend Micro Inc. Help!!

How threats evolved Now with Advanced Threats: Combine different techniques Developed to be used only once Penetrates environments in different stages Toolkits widely available Services available with SLA Goal: Money 10/9/2015

Today s reality 99? % of malware < 10 infect victims 80? % of malware = 1 infect victim 10/9/2015

Basic Attack stages 10/9/2015 1. Intelligence Gathering Identify & research target individuals using public sources (LinkedIn, Facebook, etc) and prepare a customized attack. 2. Point of Entry The initial compromise is typically malware delivered via social engineering (email/im or drive by download). A backdoor is created and the network can now be infiltrated. 3. Command & Control (C&C) Communication Allows the attacker to instruct and control the compromised machines and malware used for all subsequent phases. 4. Lateral Movement Once inside the network, attacker compromises additional machines to harvest credentials, escalate privilege levels and maintain persistent control. 5. Asset/Data Discovery Several techniques and tools are used to identify the noteworthy servers and the services that house the data of interest. 6. Data Exfiltration Once sensitive information is gathered, the data is funneled to an internal staging server where it is chunked, compressed and often encrypted for transmission to external locations.

APT and Targeted Attack Profile What is mostly done: Sandbox analysis puts the focus on Stage 2: Point of Entry Most solutions focus on Stage 3: Command & Control (C&C) Communication Focuses on the edge Building smart walls, shields, intruder intelligence, Nobody can guarantee 100% catch rate in 1 layer.

APT and Targeted Attack Profile You need to look into every stage of the attack Build a custom defence on every layer Use multi-layer / multi-technology approach Correlate every detection Minimize the impact

Transforming your Data Centers to become future prove

Your top 3 security concerns for your DC Provisioning Apply the right security the moment the VM is provisioned or spun up? Management Easily manage all security incidents and requirements consistently across the data center & cloud? Performance Minimize the bottlenecks created by traditional security capabilities? 10/9/2015

ADAPTIVE Intelligent, dynamic provisioning & policy enforcement Host Firewall Intrusion Prevention Integrity Monitoring CONTEXT Workload & applicationaware SOFTWARE Optimized for virtualization & cloud infrastructure Anti-malware Data Encryption Application Scanning Log Inspection PLATFORM Comprehensive capabilities across data center & cloud

Intrusion Prevention Host Firewall Integrity Monitoring Anti-malware Log Inspection Data Protection Application Scanning

Minimize impact One console for everything On premise and in the cloud server security All platforms All detection/protection engines like AM, FW, WR, IDS/IPS, IM, LI Integration with for automation Vmware vcenter, vcloud Director, VMWare NSX Amazon, Azure,.. Protection on hypervisor level (agentless) when using VMWare ESX servers 10/9/2015

Protect against vulnerabilities before you patch Reduce risk of exposure to vulnerability exploits especially as you scale Protect legacy OS & Apps when no patch exists Vulnerability Disclosed or Exploit Available Virtually patch with Trend Micro Intrusion Prevention Exposure Soak Patched Save money avoiding costly emergency patching Patch at your convenience Patch Available Test Begin Deployment Complete Deployment 10/9/2015

An automated approach of Virtual Patching Typical patch cycle without Virtual Patching 12 x patching /year Monthly Security Patching Half-yearly Full Patching Typical patch cycle with Virtual Patching 10/9/2015

Real Customer Case: 5 days after ShellShock went public: 766 attacks blocked by Deep Security Automated Virtual Patching on Sept 30th, at a customer managing 100+ instances Emergency Patching? 19

External Collaboration + Consumerization Risk Employees Partners, Customers Remote workers Contractors, Consultants

On Premise Security Inbound email inspected for zero-day malware OWA Multiple security layers Outlook Exchange APT Protection Gateway Network boundary 21

What happens with Office 365 Included baseline security lacks controls to find hidden malware and zero day threats OWA Network boundary Outlook APT Protection No opportunity to inspect 22

An attacker sends a zeroday infected PDF to a remote employee s personal email

The employee uploads to Office 365 Another employee sees the PDF and downloads it to their ipad

And this employee sends the PDF to a customer Customer

Trend Micro Cloud App Security Trend Micro Cloud App Security Advanced Threat Detection Finds zero-day malware and hidden threats Sandbox malware analysis in the cloud DLP 200+ customizable templates Discovery and visibility capabilities Direct API integration No email re-routing, client changes, or web proxy Copyright 2015 Trend Micro Inc. 26

Integrating Cloud App Security to Office 365 Direct cloud-to-cloud integration No impact to Office 365 functionality 5 minute setup API Trend Micro Cloud App Security MX R e c o r d S o f t w a r e U s e r settings Copyright 2015 Trend Micro Inc. 27

Stand Alone as part of the endpoint platform Smart Protection for Endpoints Smart Protection Complete Endpoint Protection Web & other Gateways Cloud App Security Standalone: add on to your Office 365 deployment As part of EPP suite: a great reason to pick Trend for your overall endpoint protection platform. Central Visibility & Management

Custom Defense How to achieve security efficiency based on your needs?

What Gartner says: The Adaptive Security Architecture 10/9/2015

Full Lifecycle of Threat Defense prioritize areas for Containment, remediation and adapt protection RESPOND PREVENT Proactively protect endpoints, servers and applications Analyze risk and nature of attack and attacker, and assess impact of threats retrospectively ANALYZE MONITOR & CONTROL Midsize & Enterprise Business DETECT Detect advanced malware, behavior and communications invisible to standard defenses

What techniques are used? Real-time signature/rule updates Quarantine items Isolate endpoint RESPOND PREVENT Signatures/Blacklist Vulnerability shielding App Whitelisting Isolation Insight & Control Endpoint Behavioral Investigation/Forensics Sandbox Behavioral ANALYZE DETECT Network Anomaly

All together Signatures Detection Rules Web / File / App / Email reputations 3 rd party products Non-Trend Micro products Suspicious Objects IOC Suspicious Objects Indications of Compromise Control Manager Suspicious Objects Control / Updates Indications of Compromise Actions HP ATA TM DD Inspector / Analyzer Custom Defense OfficeScan Block Endpoint Sensor IOC InterScan Web Block InterScan Messaging Security Block ScanMail Block Deep Security Block.

Prioritize your actions Control Managers will highlight the critical threat detection which might result higher impact for the organization Copyright 2015 Trend Micro Inc.

Visibility by user Copyright 2015 Trend Micro Inc. 35

Visibility by user Copyright 2015 Trend Micro Inc. 36

Visibility by device Copyright 2015 Trend Micro Inc. 37

Visibility by event, across all users Copyright 2015 Trend Micro Inc. 38

Thank You!