Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Similar documents
Security for the Cloud Era

Total Threat Protection. Whitepaper

Business Strategy Theatre

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Security and Compliance for Office 365

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Security Readiness Assessment

Copyright 2011 Trend Micro Inc.

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Protect your business in today s fast-changing security and risk environment.

Security Assessment Checklist

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Seqrite Endpoint Security

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

2018 Edition. Security and Compliance for Office 365

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

MESSAGING SECURITY GATEWAY. Solution overview

Modern attacks and malware

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Evolution of Spear Phishing. White Paper

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Integration Guide Software Version 6.7

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Comprehensive datacenter protection

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Encryption Vision & Strategy

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Security Gap Analysis: Aggregrated Results

The Oracle Trust Fabric Securing the Cloud Journey

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Gladiator Incident Alert

The Eight Components of a Strong Cyber Security Defense System

Cisco Ransomware Defense The Ransomware Threat Is Real

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Mitigating Branch Office Risks with SD-WAN

ADC im Cloud - Zeitalter

2017 Annual Meeting of Members and Board of Directors Meeting

Layer by Layer: Protecting from Attack in Office 365

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

CHECK POINT CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS

AT&T Endpoint Security

Cato Networks. Network Security as a Service

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security

Symantec Protection Suite Add-On for Hosted Security

We are innovating in security

with Advanced Protection

Future-ready security for small and mid-size enterprises

Securing Digital Transformation

Maximum Security with Minimum Impact : Going Beyond Next Gen

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Defend Your Web Applications Against the OWASP Top 10 Security Risks. Speaker Name, Job Title

Cisco s Appliance-based Content Security: IronPort and Web Security

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

A Comprehensive CyberSecurity Policy

CloudSOC and Security.cloud for Microsoft Office 365

Welcome. Security: First Line of Defense. Chris Riley Director x4331

Competitive Matrix - IRONSCALES vs Alternatives

TREND MICRO SMART PROTECTION SUITES

PEOPLE CENTRIC SECURITY THE NEW

Best Practices in Securing a Multicloud World

Securing Office 365 with Symantec

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Securing Your Amazon Web Services Virtual Networks

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Cybersecurity Roadmap: Global Healthcare Security Architecture

Phishing in the Age of SaaS

Synchronized Security

AKAMAI CLOUD SECURITY SOLUTIONS

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

TREND MICRO SMART PROTECTION SUITES

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Proofpoint, Inc.

THE CLOUD SECURITY CHALLENGE:

Juniper Sky Advanced Threat Prevention

Cisco Security Exposed Through the Cyber Kill Chain

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

Deliver Office 365 Without Compromise

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Securing Your Microsoft Azure Virtual Networks

Protecting from Attack in Office 365

Stopping Advanced Persistent Threats In Cloud and DataCenters

GSX 365 Usage Usage & Compliance Reporting Collect, Analyze & Anticipate

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Getting over Ransomware - Plan your Strategy for more Advanced Threats

IBM Security Network Protection Solutions

2018 Cyber Security Predictions

Transcription:

Security Landscape 2018 Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

Traditional threat vectors Network Perimeter Email User Remote Access Web Applications Remote Users

https://csi.barracuda.com

In the beginning Legitimate Mail Internet Mail Server Corporate Inbox Users

Started with Security and Archiving Archiving Spam/malware Legitimate Mail Internet Mail Server Corporate Inbox Users Spam & Virus Protection, DLP, Encryption

Extended to the Cloud and added Backup Spam/malware Legitimate Mail Internet Spam & Virus Protection, DLP, Encryption Backup, Archiving Corporate Inbox Users

Advanced Threat Protection Spam/Malware Legitimate Mail Internet Zero Hour Corporate Inbox Users Spam & Virus Protection, DLP, Encryption Backup, Archiving, Sandboxing

Antivirus Signature-based tools alone A B C Malware constantly changes to evade AV tools Not enough diversity of threat data to be effective across all vectors Modern attacks evade IPS and gateway based detection solutions A Safe Signatures Database B Virus C Trojan

Advanced Threat Protection

Example: Advanced Threat 0-day attachment (RAR)

Global Threat Intelligence Network

Network Perimeter Email User Remote Access Web Applications Remote Users

New threats can bypass gateways Spam/Malware Legitimate Mail Internet Zero Hour Corporate Inbox Executives Spam & Virus Protection, DLP, Encryption Backup, Archiving, Sandboxing

Attacks are entering through the back door Spam/Malware Internet Legitimate Mail Zero Hour unified inboxes Personal Email Spear Phishing Spam & Virus Protection, DLP, Encryption Backup, Archiving, Sandboxing

So what is SPEAR PHISHING?

Multi-stage spear phishing bait, hook and catch Step 1 Infiltrate Step 2- Reconnaissance Step 3 Extract Value

Can you guess which ones are legitimate? Sender name Sender email link Subject DocuSign doc@www.docusigns. net http://www.reliancein struments.com/js/doc u.php Completed: Please DocuSign Amazon.com storenews@amazon.com https://www.amazon.c om/gp/r.html Most Read from The Washington Post Dropbox gonzalezfdc@gmail.co m http://agenciaquem.co m.br/folder/document / Your Financial Institution just sent you an important documents via Dropbox FedEx trackingupdates@fede x.com https://www.fedex.co m/insight/findit/nrp.js p?tracknumbers=7762 FedEx MPS Shipment 776229818182 Delivered

Can you guess which ones are legitimate? Sender name Sender email link Subject DocuSign doc@www.docusigns. net http://www.reliancein struments.com/js/doc u.php Completed: Please DocuSign Amazon.com storenews@amazon.com https://www.amazon.c om/gp/r.html Most Read from The Washington Post Dropbox gonzalezfdc@gmail.co m http://agenciaquem.co m.br/folder/document / Your Financial Institution just sent you an important documents via Dropbox FedEx trackingupdates@fede x.com https://www.fedex.co m/insight/findit/nrp.js p?tracknumbers=7762 FedEx MPS Shipment 776229818182 Delivered

Ransomware

The business model

The business model (contd.)

Network Perimeter Email User Remote Access Web Applications Remote Users

Securing the gateway is still necessary, but no longer sufficient

Next Generation Email Protection Human Firewall Fraud Protection Phishing Simulation and Training AI-based spear phishing protection DMARC to prevent domain spoofing Resiliency Cloud Backup Email Continuity Gateway Defense Inbound/Outbound Security Encryption and DLP for secure messaging Archiving for compliance O365 Exchange Confidential

So e-mail is bad. What else is new?

Timeline of the Equifax breach

WAF Extends Your Network Security Posture Layer 7 Network Firewall Applications are in the open Exploits are visible Layer 7 Network Firewall Applications are insulated Exploits are contained

What a Web Application Firewall Does Comprehensive Application Security Data Loss Prevention OWASP Top-10 Attacks Credit Card Numbers Application DDOS Social Security Number Proactive Defense Custom Patterns Application Cloaking Geo-IP Control Inbound Inspection Outbound Inspection

Network Perimeter Email User Remote Access Web Applications Remote Users

Anatomy of the Target breach HVAC Servers Step 2 Step 3 POS Step 1 Internet

Network Perimeter Email User Remote Access Web Applications Remote Users

From Next Generation to Cloud Generation Vertical Scaling Backhauled Networks Aggregated Policy Monolithic Architecture Feature Heavy Not Orchestrated Expensive Next Gen Cloud Gen Horizontal Scaling Distributed Policy Central Management Secure Connectivity No-MPLS Traffic Regulation 0-touch deployment Visibility Security at source Elastic Scaling Dispersed Workloads Orchestration API Support Cloud Use Cases Cloud Integrations Flexible Licensing

WAN Networking 5+ years ago Centralized Internet Break Out Internet Servers & Apps @ HQ or DC Headquarters Central Policy Management @ Headquarters MPLS with VPN backup

WAN Networking in the Cloud Era: Today Internet SaaS IaaS Headquarters Most companies still have WAN by MPLS with VPN backup

Headquarters WAN Networking in the Cloud Era: Tomorrow Internet SaaS IaaS SDWAN to reduce MPLS cost

Where will your applications be in 2 years? Some SaaS Public Cloud & SaaS Public Cloud & SaaS HQ HQ HQ Apps On Premises Data Center Apps Hybrid Public Cloud all in

Public Cloud Service Responsibility Customer Cloud Access Network Security Customer Applications & Content Identity & Access Control Operating Systems / Platform Data Encryption Backup/Restore You define controls and security IN the Cloud Public Cloud Platform Physical Infrastructure Network Infrastructure Virtualization Layer Provider takes care of the Security OF the Cloud

Network Perimeter Email User Remote Access Web Applications Remote Users

Thank you