Solera Networks - Security Innovation Network

advertisement
Security Intelligence and Analytics
See everything. Know everything.™
Steve Shillingford, President and CEO
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
The Threat Landscape Has Evolved…
CYBERCRIMINALS
FINANCIALLY
MOTIVATED
Ransom
& fraud
DDOS
Defacement
HACKTIVISTS
POLITICALLY
MOTIVATED
Public data
leakage
ATA/APT
GRADE
BAD
DATA
STUFF
THEFTIN
GOOD STUFF
MALWARE
OUT
NATIONALISTICALLY
MOTIVATED
STATESPONSORED
ATTACKERS
Gov’t, enterprise &
infrastructure
targets
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
2
The Malware Problem – Overwhelming Odds
1/3
85%
91%
of malware is customized
(no signature available at
time of exploit)
of breaches took weeks
or more to discover (+6%)
of organizations believe
exploits bypassing their
IDS and AV systems
(VzB, 2012)
(VzB, 2012)
(Ponemon)
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
3
Finding Answers to Dreaded Post-breach Questions
Who did this to us?
?
How did they do it?
What systems and data were affected?
Can we be sure it is over?
Can it happen again?
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
4
do we do what we do?
Solera Networks is the Security Camera for
your Enterprise Network
Records, classifies and indexes all packets, flows, and files from L2–L7
On the wire, file-level visibility of data exfiltration and malware infiltration
Unmatched multi-dimensional flow enrichment and Big Data warehousing
Actionable intelligence, forensics and situational awareness
Providing real-time
analysis and full
visibility of everything
going in and out of
your network
Flexible, open and easy-to-use platform-Hardware, Software, and VM
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
5
Solera is Solving the Visibility Gap in Today’s Tools
TCP/IP
Model
Time
7
6
NGFW
DPI
5
IDS/IPS
CONTENT
TODAY’S
CONTEXT
SECURITY
GAP
VISIBILITY
2006
PREVENTION
• Malware Analysis
• Application-Based Blocking
Security
Intelligence and
Analytics
• Signature-Based Blocking
1999
Stateful Firewalls
• Deep Packet Inspection
• Log Analysis & Aggregation
2002
Flow Analysis
• Real-Time File Extraction
• Real-Time Analytics
BIG DATA SECURITY
4
3
2012
• L2-L7 Indexing
• Storage
2
ACLs
1997
• Full Packet Capture
Coverage
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
6
we deliver
Advanced Persistent
Security that easily
tells users what to
look for—and at
™
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
7
Solera DeepSee
™
The Most Scalable and Flexible Big Data Security Solution
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
8
Big Data Security Intelligence and
Analytics for Visibility of Today’s
Advanced Threats
Goes beyond traditional approaches to deliver 20/20 visibility of advanced
malware, APTs and ATAs—for every packet, flow and file
Automatically and accurately tells enterprises and organizations what zero-day
threats and attacks to look for—instead of the other way around
Seamlessly integrates with best-of-breed 3rd party security tools to provide a
single, correlated event view
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
9
Security Intelligence & Analytics
“
Context-aware and
adaptive security will be
the only way to securely
support the dynamic
business and IT
infrastructures emerging
during the next 10 years.
”
—Neil MacDonald, Distinguished VP
GARTNER
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
10
What We Do Matters
We help protect companies and
government agencies from those who
want to do them harm. And, by doing that,
we are helping to protect our way of life…
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly
Download
Related flashcards

Computer security

25 cards

Spyware removal

22 cards

Backup software

62 cards

Authentication methods

31 cards

Create Flashcards