Information Security Specialist. IPS effectiveness

Similar documents
IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Five Critical Rules for Firewall Management: Lessons from the Field

TRUE SECURITY-AS-A-SERVICE

SIEM Solutions from McAfee

Symantec Security Monitoring Services

RSA INCIDENT RESPONSE SERVICES

The McGill University Health Centre (MUHC)

RSA INCIDENT RESPONSE SERVICES

RSA NetWitness Suite Respond in Minutes, Not Months

Sustainable Security Operations

GDPR: An Opportunity to Transform Your Security Operations

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

THE EVOLUTION OF SIEM

Protecting organisations from the ever evolving Cyber Threat

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Protection - Before, During And After Attack

Security by Default: Enabling Transformation Through Cyber Resilience

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

locuz.com SOC Services

Building Resilience in a Digital Enterprise

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

SIEMLESS THREAT DETECTION FOR AWS

CyberArk Privileged Threat Analytics

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Managed Endpoint Defense

with Advanced Protection

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

THE ACCENTURE CYBER DEFENSE SOLUTION

Combatting advanced threats with endpoint security intelligence

IBM Security Network Protection Solutions

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Office 365 Buyers Guide: Best Practices for Securing Office 365

Cyber Security Technologies

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

CYBER RESILIENCE & INCIDENT RESPONSE

External Supplier Control Obligations. Cyber Security

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Protect vital DNS assets and identify malware

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Aligning Agency Cybersecurity Practices with the Cybersecurity Framework

align security instill confidence

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

SECURITY SERVICES SECURITY

ForeScout Extended Module for Splunk

CYBER SOLUTIONS & THREAT INTELLIGENCE

IBM Next Generation Intrusion Prevention System

RiskSense Attack Surface Validation for IoT Systems

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Machine-Powered Learning for People-Centered Security

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

CA Security Management

securing your network perimeter with SIEM

Security in a Converging IT/OT World

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

AKAMAI CLOUD SECURITY SOLUTIONS

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Security Information & Event Management (SIEM)

Snort: The World s Most Widely Deployed IPS Technology

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

BUILDING A NEXT-GENERATION FIREWALL

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Imperva Incapsula Website Security

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Unlocking the Power of the Cloud

Are we breached? Deloitte's Cyber Threat Hunting

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

2018 Edition. Security and Compliance for Office 365

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

BUILDING AND MAINTAINING SOC

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Industry 4.0 = Security 4.0?

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Cisco Encrypted Traffic Analytics Security Performance Validation

SIEMLESS THREAT MANAGEMENT

Incident Response Agility: Leverage the Past and Present into the Future

Un SOC avanzato per una efficace risposta al cybercrime

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

CASE STUDY: REGIONAL BANK

Reduce Your Network's Attack Surface

Deception: Deceiving the Attackers Step by Step

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Transcription:

Information Security Specialist IPS effectiveness

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of defence that helps you protect your network from harmful traffic that has passed through or bypassed your firewall. It inspects Ethernet, IP and TCP layers which harbor attacks. Many IPS vendors differentiate their offerings with claims about high speed, low latency and maximum bandwidth supported. While packets processed per second is a valuable indicator of traffic volume and throughput, it is not a gauge for security effectiveness or the capacity to prevent cyber threats. The true measure of IPS security performance is the accuracy and effectiveness of identifying and blocking malicious traffic. During a recent six-month period, Dell SecureWorks reviewed IPS security effectiveness across leading IPS devices we manage and monitor for customers. We collected live data in the real-time threat defence environment of our Security Operations Centres, which provides more accurate results than reports produced from synthetic data created in a controlled lab setting. Because we manage and monitor more Dell SecureWorks isensor IPS devices, we normalised the findings specific to each vendor to produce a balanced view of each vendor s IPS security effectiveness. The results illustrated throughout this report verify that the Dell SecureWorks Intrusion Prevention Service with isensor delivers better threat protection and significantly strengthens our customers defensive posture. IPS Security Performance No. of rules Rules enabled by default Rules in block mode by default 25,000 20,000 15,000 10,000 5,000 0 isensor Sourcefire HP TippingPoint Cisco Juniper McAfee IBM ISS Check Point IPS with isensor blocks harmful and malicious traffic with more high-fidelity rules enabled and set to block by default.

Effective intrusion prevention IPS with isensor delivers fast and effective attack protection by performing in-line deep packet inspection of inbound and outbound network traffic using multiple integrated defense technologies to protect critical assets from known and emerging attacks. With more than 20,000 unique rules developed by our Counter Threat Unit SM (CTU) security intelligence experts to counter real threats to our customers, IPS with isensor outperforms leading IPS devices with: High-fidelity rules Periodic rule tuning and updates Real-time, intelligence-driven feedback loops Advanced analysis and blocking High-fidelity rules IPS devices pump out thousands of alerts daily, depending on how much traffic passes through your network. To prevent attacks and network compromise, rules are often written broadly and loosely. As a result, they tend to block and/ or alert on legitimate business traffic. Rules must be written with high fidelity and enabled to block, not simply alert, in order to provide the best security. Full context The most effective high-fidelity rules are written to avoid false positives, and block attacks and policy violations without interrupting legitimate True Positive traffic. isensor rules are written and managed based on the full context of vulnerabilities, exploits and malware behavior. This big picture approach helps minimise false positives, block attacks and policy violations without interrupting legitimate traffic, and mitigate damage if something malicious does enter your network. Generally, IPS rules are written to block attacks against software vulnerabilities. These rules address root causes and protect against both current and future exploits. Other rules are written specific to exploits. These rules produce fewer false positives but you need many of these rules to address the growing number and variations of exploits. Rules can also be behavior based, to prevent data exfiltration and propagation. Creating these rules requires a deep understanding of how malware behaves following an infection. They provide additional visibility and help to block suspicious activity in outbound traffic. They also catch new vulnerabilities and exploits that have not yet been publicly disclosed. 5% 95% False Positive 95 percent of the events we escalate to customers are real security events that require attention. No single method of rule development is perfect. Effective threat prevention requires the big picture: rules based on vulnerabilities, exploits and malware behavior. 99.3 percent of isensor rules are set to block and drop suspicious packets without interrupting traffic flow.

Block and drop Identifying an attack without blocking it means your team will spend more time addressing the impact of a successful attack instead of reviewing reports enumerating the unsuccessful attacks. High-fidelity rules must block, not simply alert. According to our research, only half the rules on leading IPS devices are enabled to block attacks; instead, they simply generate alerts while letting suspicious traffic pass through. On average, IPS with isensor blocks four times more potentially malicious traffic than other IPS devices. 70% 60% 50% 40% 30% 20% 10% 0% isensor Other IPS On average, IPS with isensor blocks four times more potentially malicious traffic. Rule tuning and updates Rules for your business must be optimised, updated and measured for effectiveness. With other IPS deployments, tuning can be timeconsuming and complicated. IPS with isensor, however, is configured and continually tuned by security experts to provide effective protection. IPS with isensor is configured and continually tuned by security experts to provide effective protection. Continual tuning and updates are imperative to ensure you are blocking the correct traffic as well as looking for the latest threats. According to industry surveys, only about 60 percent of rule updates are applied. Without the latest rule updates applied, IPS devices function at partial capacity and protection. IPS with isensor customers have the most up-to-date protection with: Daily audits of existing rule fidelity Rule updates deployed twice weekly Service Level Agreement (SLA) that guarantees protection against new, critical threats within 48 hours 99.9 percent of IPS with isensor rule updates are deployed automatically, without customer impact or business interruption. Our audit process enables us to continually fine-tune rules and ensure customers are protected with the latest countermeasures. Ultimately, our continual rule management and administration provides customer-specific protection with lower false positives and false negatives than other IPS devices. Real-time, intelligence-driven feedback loop Real-time intelligence and expert analysis underlie the accuracy and effectiveness of isensor rules. Dell SecureWorks is the only IPS provider that develops, fine-tunes and deploys rules based on a live feedback loop which we leverage across all our customers. The isensor provides a live feed of information to our security experts, who monitor attacks and identify suspicious activity and emerging threats 24x7. As a result, in real-time we create and modify countermeasures quickly and effectively.

GIAC GCIA certified security analysts in our integrated Security Operations Centres work closely with our CTU security research group, sharing information about anomalous activity and threat intelligence 24x7x365. This tight integration provides an early warning system and comprehensive context in which to analyse emerging threats and vulnerabilities. It also enables rapid deployment of finely tuned rules and defenses to protect our customers against the latest threats. We leverage intelligence and protections across our customer base. When we detect an incident impacting one of our customers, we identify the threat and notify the customer. Simultaneously, we use that information to protect our entire customer base from similar threats. We then build what we have learned into our technology to make it even more effective. This creates a continuously improving technology that adapts with the changing security landscape. Rule updates from other leading IPS device vendors are less effective because they are not based on live transmission of activity occurring in your environment. At best, they are 24-hour delayed responses to malicious activity which may have already compromised your network. Advanced analysis and blocking IPS with isensor provides real-time inspection of inbound and outbound network traffic using multiple, integrated defense technologies, including: Advanced statistical analysis Suspicious activity correlation Expert security analysis of patterns IPS with isensor protects our customers better by catching a wider array of attacks using high-fidelity IPS rules. On average, isensor IPS identifies nearly six times the number of distinct attacks as other IPS solutions. 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000 0 IPS with isensor identifies nearly six times as many distinct attack types Advanced statistical analytics We investigate, analyse and categorise significant events by criticality of risk, using advanced technologies and algorithms to mine and process IPS alerts across our entire customer base. Suspicious activity correlation & expert security analysis We filter, correlate and analyse billions of security events across our customers each and every day. We condense these events into meaningful security information that enables our expert security analysts to accurately assess risk in full context, in real time. Using advanced correlation and analysis techniques, we filter event noise down to positive and anomaly security events which our certified security analysts investigate and analyse further.

Advanced protection We see attacks sooner and protect our customers faster and more effectively. On average, we analyse billions of security events across our customer base every day and analyse information from thousands of sources worldwide. We leverage that information to discover new attack techniques, vulnerabilities and threats as they emerge, and develop preventative countermeasures to protect our customers before damage occurs. We routinely uncover threats and provide timely countermeasures with the information collected across our customer base, as well as insight from the visibility and information exchange across many elite threat research circles, including: Anti-Phishing Working Group (APWG) CyberCop Network Network Cyber Security Forum Initiative (CSFI) Federal Trade Commission (FTC) Financial Services Information Sharing and Analysis Centre (FS-ISAC) Forum of Incident Response & Security Teams (FIRST) Infragard Internet Security Alliance (ISA) Internet Systems Consortium (ISC) Microsoft Active Protections Program (MAPP) National Cyber-Forensics & Training Alliance (NCFTA) North Atlantic Treaty Organisation (NATO) SANS Institute Secret Service Electronic Crimes Task Force (USSS ECTF) U.S. Department of Defense U.S. Department of Energy Zero Day Initiative (ZDI) As a Microsoft Advanced Protections Program partner, we are able to release defenses for vulnerabilities at the same time they are publicly disclosed. We receive vulnerability information from Microsoft in advance of its monthly and ad hoc security update releases. This allows us to analyse vulnerabilities that might impact our customers earlier. In turn, we develop and deploy countermeasures to protect our customers faster and sooner. About Dell SecureWorks Dell Inc. (NASDAQ: DELL) listens to customers and delivers worldwide innovative technology and business solutions they trust and value. Recognised as an industry leader by top analysts, Dell SecureWorks provides world-class information security services to help organisations of all sizes protect their IT assets, comply with regulations and reduce security costs. For more information, visit http://www.secureworks.com/uk THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. Availability varies by country. 2011 Dell Inc. All rights reserved. Dell and the Dell logo, SecureWorks, Counter Threat Unit (CTU), isensor, iscanner, Sherlock, Inspector and LogVault are either registered trademarks or service marks, or other trademarks or service marks of Dell Inc. in the United States and in other countries. All other products and services mentioned are trademarks of their respective companies. This document is for illustration or marketing purposes only and is not intended to modify or supplement any Dell specifications or warranties relating to these products or services. April 2011.