Cisco Quick Hit Briefing Cisco Security: Sourcefire Deep Dive Brian Avery Territory Business Manager, Cisco This session was recorded via Cisco WebEx! You can watch the live session recording via the following URL: https://acecloud.webex.com/acecloud/lsr.php?RCID=48db1 13ab90b4883aef8d5641c47d8ca Thanks for your interest and participation! Cisco Quick Hit Briefing Cisco Security: Sourcefire Deep Dive Brian Avery Territory Business Manager, Cisco Connect using the audio conference box or you can call into the meeting: 1. Toll-Free: (866) 432-9903 2. Enter Meeting ID: 300 430 485 and your attendee ID number. 3. Press “1” to join the conference. Presentation Agenda ► Quick Hits and Customer Education ► Security in the 21st Century ► Cisco Security Overview ► Sourcefire Deep Dive About Your Host Brian Avery ► Conclusion Territory Business Manager, Cisco Systems, Inc. bravery@cisco.com What Is a Quick Hit Briefing? • A weekly partner briefing series designed for Cisco Commercial Territory partners • Concise, relevant updates on: • Cisco products and solutions • Partner programs and promotions • Partner Enablement – Demand Generation, Selling Skills, Closing Tools, etc. • Welcome to Quick Hit Briefing #137– 28,222 attendees and growing! C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 NEW! Cisco Customer Education Series (CCE) Customer-facing WebEx Events - Let us sell for you! Next event – Wednesday Nov 11th @ 1:30 p.m. You've Already Been Hacked. Now What? Cisco Next-Gen Security Can Help Registration link | Invitation Invite your customers to attend and we will notify you if they do! Access registration links, invites and replays at: http://cs.co/cisco101 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Security in the C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. st 21 Century Cisco Confidential 6 The Reality: Organizations Are Under Attack 95% of large companies targeted by malicious traffic 100% of organizations interacted with websites hosting malware Cybercrime is lucrative, barrier to entry is low Hackers are smarter and have the resources to compromise your organization Malware is more sophisticated Organizations face tens of thousands of new malware samples per hour Phishing, Low Sophistication 1990 1995 Hacking Becomes an Industry 2000 Source: 2014 Cisco Annual Security Report Sophisticated Attacks, Complex Landscape 2005 2010 2015 Viruses Worms Spyware and Rootkits APTs Cyberware 1990–2000 2000–2005 2005–Today Today + 2020 Dynamic Threat Landscape It is a Community that hides in plain sight avoids detection, and attacks swiftly 60% 54% 100% of data is stolen in hours of breaches remain undiscovered for months of companies connect to domains that host malicious files or services Your customer says… “I am just a small fish in a BIG pond.” C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Yet organizations of every size are targets Adversaries are attacking you And using you By targeting your organization’s: To attack your enterprise customers and partners: Customer data 41% of targeted attacks are against organizations with fewer than 500 employees (July 2014 The National Cyber Security Alliance (NCSA) Intellectual property 60% of UK small businesses were compromised in 2014 (2014 Information Security Breaches Survey) Company secrets 100% of corporate networks examined had malicious traffic (Cisco 2014 Annual Security Report) If you knew you were going to be compromised, would you do security differently? Cisco Security Overview Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum Attack Continuum Network Endpoint After Scope Contain Remediate During Detect Block Defend Before Discover Enforce Harden Mobile Virtual Point in Time Cloud Continuous Email & Web Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum Attack Continuum Before Discover Enforce Harden During Detect Block Defend After Scope Contain Remediate ASA VPN NGIPS Advanced Malware Protection NGFW Meraki ESA/WSA Network as Enforcer CWS ThreatGRID Secure Access + Identity Services FireSIGHT and pxGrid Comprehensive Security Requires Breach Prevention Rapid Breach Detection, Response, Remediation Threat Intelligence Source: http://www.pcworld.com/article/2109210/report-average-of-82-000-new-malware-threats-per-day-in-2013.html Cisco Sourcefire Advanced Malware Protection Cisco Advanced Malware Protection Built on unmatched collective security intelligence Cisco® 1001 1101 1110011 0110011 101000 0110 00 1001 1101 1110011 0110011 101000 0110 00 Collective 101000 0110 00 0111000 111010011 101 1100001 110 101000 0110 00 0111000 111010011 101 1100001 Security Cisco Collective 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 1100001110001110 1001 1101 1110011 0110011 10100 Intelligence Security Intelligence Cloud WWW Email Endpoints Web Networks 1.6 million global sensors 13 billion web requests 100 TB of data received per day 24x7x365 operations 150 million+ deployed endpoints 4.3 billion web blocks per day 600 engineers, technicians, and researchers 35% worldwide email traffic 40+ languages 1.1 million incoming malware samples per day IPS Automatic Updates in real time Devices Talos Security Intelligence AMP Threat Grid Intelligence AMP Threat Grid Dynamic Analysis 10 million files/month Advanced Microsoft and Industry Disclosures AMP Community Snort and ClamAV Open Source Communities Private/Public Threat Feeds AEGIS Program AMP Advanced Malware Protection Cisco AMP Threat Grid Feeds Dynamic Malware Analysis and Threat Intelligence to the AMP Solution 1001 1101 1110011 0110011 101000 01101001 00 1101 1110011 0110011 101000 0110 00 AMP Threat Gridcontent platform Actionable threat Actionable Intelligence Low Prevalence Files 101000 0110 00 0111000 110 101000 0110 00 0111000 111010011 101 1100001 110and 111010011 101 1100001 correlates the sample intelligence is generated that can 1100001110001110 Analyst or system (API) submits suspicious sample to Threat Grid result millions111010011 be packaged and integrated in to 1001 1101 101000 1110011 0110 0110011 00 with 0111000 101000 0110 00 a variety of existing systems of other samples and or used independently. billions of artifacts 101 1100001 110 Threat Score/Behavioral Indicators Big Data Correlation Threat Feeds An automated engine observes, deconstructs, and analyzes using multiple techniques Cisco® AMP Threat Grid platform correlates the sample result with millions of other samples and billions of artifacts Proprietary techniques for static and dynamic analysis “Outside looking in” approach 350 Behavioral Indicators Sample and Artifact Intelligence Database Actionable threat content and intelligence is generated that can be utilized by AMP, or packaged and integrated into a variety of existing systems or used independently. Cisco AMP Delivers a Better Approach Point-in-Time Protection Retrospective Security File Reputation, Sandboxing, and Behavioral Detection Continuous Analysis Unique to Cisco® AMP Point-in-Time Detection Cisco AMP Defends With Reputation Filtering And Behavioral Detection Continuous Protection Reputation Filtering One-to-One Signature Fuzzy Finger-printing Retrospective Security Cisco Collective Security Intelligence Behavioral Detection Machine Learning Indications of Compromise Dynamic Analysis Advanced Analytics Device Flow Correlation Point-in-Time Detection Reputation Filtering Is Built On Three Features Reputation Filtering Unknown file is encountered, 1 One-to-One Signature File is not known to be malicious and is admitted 3 Unknown file is encountered, signature is analyzed, sent to cloud 4 Behavioral Detection signature is analyzed, sent to cloud 2 Fuzzy Finger-printing Retrospective Security Cisco Collective Security Intelligence Machine Learning Indications of Compromise File signature is known to be malicious and is prevented from entering the system Collective Security Intelligence Cloud Dynamic Analysis Advanced Analytics Device Flow Correlation Point-in-Time Detection Reputation Filtering Is Built On Three Features One-to-One Signature 1 Fingerprint of file is analyzed and determined to be malicious 2 Malicious file is not allowed entry 3 Polymorphic form of the same file tries to enter the system 4 The fingerprints of the two files are compared and found to be similar to oneMachine another Indications Fuzzy Finger-printing 5 Learning of Compromise Polymorphic malware is denied entry based on its similarity to known malware Retrospective Security Cisco Collective Security Intelligence Collective Security Intelligence Cloud Dynamic Analysis Advanced Analytics Device Flow Correlation Point-in-Time Detection Reputation Filtering Is Built On Three Features ne-to-One Signature Fuzzy Finger-printing 1 Metadata of unknown file is sent to the cloud to be analyzed 2 Metadata is recognized as possible malware 3 File is compared to known malware and is confirmed as malware 4 Metadata of a second unknown file is sent to cloud to be analyzed Machine 5 Learning 6 Metadata is similar to known Indications clean file, possibly cleanDynamic of Compromise Analysis File is confirmed as a clean file after being compared to a similarly clean file Retrospective Security Cisco Collective Security Intelligence Collective Security Intelligence Cloud Machine Learning Decision Tree Possible malware Advanced Analytics Possible clean file Flow Device Correlation Confirmed malware Confirmed clean file Confirmed malware Confirmed clean file Point-in-Time Detection Behavioral Detection Is Built On Four Features Fuzzy ger-printing Machine Learning 1 File of unknown disposition is encountered 2 File replicates itself and this information is communicated to the cloud 3 File communicates with malicious IP addresses or starts downloading files with known malware disposition 4 Combination of activities indicates a compromise and the behavior is reported to the cloud and AMP Advanced Dynamic client Indications of Compromise 5 Analysis Analytics These indications are prioritized and reported to security team as possible compromise Device Flow Correlation Retrospective Security Cisco Collective Security Intelligence Collective Security Intelligence Cloud achine earning Point-in-Time Detection Behavioral Detection Is Built On Four Features 1 Dynamic Analysis Engine executes unknown files in on-premises or cloud sandboxes powered by Cisco® AMP Threat Grid 2 Two files are determined to be malware, one is confirmed as clean Collective Security Intelligence Cloud Indications of Compromise Dynamic Analysis 3 AdvancedCloud isDevice Flow Intelligence Analytics updated with analysisCorrelation results, and retrospective alerts are broadcast to users Retrospective Security Cisco Collective Security Intelligence AMP Threat Grid Sandbox Collective User Base Point-in-Time Detection Behavioral Detection Is Built On Four Features cations mpromise 1 Receives information regarding software unidentified by Reputation Filtering appliances 2 Receives context regarding unknown software from Collective User Base 3 Analyzes file in light of the information and context provided 4 Dynamic Analysis Advanced Analytics Identifies the advanced malware and communicates the new signature to the user base Device Flow Correlation Retrospective Security Cisco Collective Security Intelligence Collective Security Intelligence Cloud Cisco® AMP Threat Grid Analysis Collective User Base namic alysis Point-in-Time Detection Behavioral Detection Is Built On Four Features Advanced Analytics 1 Device Flow Correlation monitors communications of a host on the network 2 Two unknown files are seen communicating with a particular IP address 3 One is sending information to the IP address, the other is receiving commands from the IP address 4 Collective Security Intelligence Cloud recognizes the external IP as a confirmed, malicious site 5 Unknown files are identified as malware because of the association Device Flow Correlation Retrospective Security Cisco Collective Security Intelligence IP: 64.233.160.0 Collective Security Intelligence Cloud Cisco AMP Delivers A Better Approach Point-in-Time Protection Retrospective Security File Reputation, Sandboxing, and Behavioral Detection Continuous Analysis Unique to Cisco® AMP Point-in-Time Detection Cisco AMP Defends With Retrospective Security To be effective, you have to be everywhere Continuously Retrospective Security Cisco Collective Security Intelligence Point-in-Time Detection Why Continuous Protection Is Necessary Retrospective Security Cisco Collective Security Intelligence Breadth and Control points: WWW Email Endpoints Web Network Gateways Devices Telemetry Stream File Fingerprint and Metadata Continuous feed 1000111010011101 1100001110001110 File and Network I/O 0001110 1001 1101 1110011 0110011 101000 0110 00 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 0100001100001 1100 0111010011101 1100001110001110 Process Information 101 1100001 110 1001 1101 1110011 0110011 101000 0110 00 Continuous analysis Talos + Threat Grid Intelligence Point-in-Time Detection Why Continuous Protection Is Necessary Retrospective Security Cisco Collective Security Intelligence Event History Who What Where When Collective Security Intelligence How Context Enforcement Continuous Analysis Point-in-Time Detection Why Continuous Protection Is Necessary Retrospective Security Cisco Collective Security Intelligence Event History Who What Where When Collective Security Intelligence How Context Enforcement Continuous Analysis Point-in-Time Detection Cisco AMP Defends With Retrospective Security Continuous Analysis Attack Chain Weaving Behavioral Indications of Compromise Retrospective Security Cisco Collective Security Intelligence Trajectory Elastic Search Point-in-Time Detection Retrospective Security Is Built On… Continuous Analysis Persistently Performs analysis analyzes the file the Chain first time a file is Behavioral over time to Trajectory see if 1 Attack 2 Weaving Indicationsthe disposition is seen of Compromise changed Retrospective Security Cisco Collective Security Intelligence 3 Giving unmatched visibility into the path, actions, or Breach communications that are Hunting associated with a particular piece of software Point-in-Time Detection Retrospective Security Is Built On… Uses retrospective capabilities in three ways: 1 File Trajectory 2 Process Monitoring 3 Communications Monitoring Attack Chain Weaving Continuous Analysis Attack Chain Weaving analyzes the data collected by File Behavioral Trajectory, Process, Indications and Communication of Compromise Monitoring to provide a new level of threat intelligence File Trajectory Communications Monitoring Process Monitoring Retrospective Security Cisco Collective Security Intelligence records the trajectoryBreach of the software from device to Trajectory monitors which performing the I/Oapplications activity of allare devices on theactions system device Hunting nuous ysis Point-in-Time Detection Retrospective Security Is Built On… Retrospective Security Cisco Collective Security Intelligence Behavioral Indications of Compromise uses continuous analysis and retrospection to monitor systems for suspicious and unexplained activity… not just signatures! Attack Chain Weaving Behavioral Trajectory An unknown file Indications 1 is admitted into of Compromise the network 2 Breachfile The unknown copies Hunting itself to multiple machines Duplicates 3 content from the hard drive Sends duplicate 4 content to an unknown IP address Using the power of Attack Chain Weaving, Cisco® AMP is able to recognize patterns and activities of a given file, and identify an action to look for across your environment rather than a file fingerprint or signature ck Chain eaving Point-in-Time Detection Retrospective Security Is Built On… 1 Unknown file is downloaded to device 2 Fingerprint is recorded and sent to cloud for analysis The unknown file travels across the network to different devices 3 Behavioral Indications of Compromise Retrospective Security Cisco Collective Security Intelligence File Trajectory Collective Security Intelligence Cloud Mobile Network Mobile Virtual Machine File trajectory automatically records propagation of the file across the network Sandbox analytics determines 4 the file is malicious and notifies all devices Trajectory Breach Hunting 5 If file is deemed malicious, file trajectory can provide insight into which hosts are infected, and it provides greater visibility into the extent of an infection Computer Mobile Computer Mobile Virtual Machine Point-in-Time Detection Retrospective Security Is Built On… havioral cations mpromise Retrospective Security Cisco Collective Security Intelligence Device Trajectory 1 Unknown file is downloaded to a particular device 2 The file executes Drive #1 3 Trajectory Drive #2 Device trajectory records this, the parent processes lineage and all actions performed by the file Breach Hunting 4 File is convicted as malicious and the user is alerted to the root cause and extent of the compromise Computer Drive #3 Point-in-Time Detection Retrospective Security Is Built On… havioral cations mpromise Trajectory Elastic Search 1 Elastic Search is the ability to use the indicators generated by Behavioral IoCs to monitor and search for threats across an environment 2 When a threat is identified, it can be used to search for and identify if that threat exists anywhere else Retrospective Security Cisco Collective Security Intelligence 3 This function enables quick searches to aid in the detection of files that remain unknown but are malicious Cisco AMP Provides Contextual Awareness and Visibility That Allows You to Take Control of an Attack Before It Causes Damage Focus on these users first Who These applications are affected What The breach affected these areas Where This is the scope of exposure over time When How Here is the origin and progression of the threat Cisco AMP Everywhere Strategy Means Protection Across the Extended Network *AMP for Endpoints can be launched from AnyConnect Virtual Windows OS Android Mobile MAC OS AMP for Networks AMP for Endpoints AMP AMP on Cisco® ASA Firewall with FirePOWER Services Advanced Malware Protection AMP Private Cloud Virtual Appliance CWS AMP on Web & Email Security Appliances AMP for Cloud Web Security & Hosted Email AMP Threat Grid Malware Analysis + Threat Intelligence Engine Appliance or Cloud There Are Several Ways You Can Deploy AMP Deployment Options Windows/MAC AMP on Email and Web; Cisco® ASA; CWS Method License with ESA, WSA, CWS, or ASA customers Ideal for New or existing Cisco CWS, Email /Web Security, ASA customers Details ESA/WSA: Prime visibility into email/web CWS: web and advanced malware protection in a clouddelivered service AMP capabilities on ASA with FirePOWER Services AMP for Networks AMP Advanced Malware Protection Mobile Virtual AMP for Endpoints (AMP on FirePOWER Network Appliance) AMP Private Cloud Virtual Appliance Snap into your network Install lightweight connector on endpoints On-premises Virtual Appliance IPS/NGFW customers Windows, Windows OS for POS, Mac, Android, virtual machines; can also deploy from AnyConnect client High-Privacy Environments Wide visibility inside network Broad selection of features- before, during, and after an attack Comprehensive threat protection and response Granular visibility and control Widest selection of AMP features Private Cloud option for those with highprivacy requirements Can deploy full airgapped mode or cloud proxy mode For endpoints and networks Protection Across Networks Network Endpoint WWW Content The Network platform uses indications of compromise, file analysis, and in this example file trajectory to show you exactly how malicious files have moved across the environment Protection Across Endpoints Network Endpoint WWW Content The Endpoint platform has device trajectory, elastic search, and outbreak control, which in this example is shown quarantining recently detected malware on a device that has the AMP for Endpoints connector installed Protection Across Web and Email Network Endpoint WWW Content Cisco® AMP for Web and Email protects against malware threats in web and email traffic by blocking known malware and issuing retrospective alerts when unknown files are convicted Conclusion Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum Attack Continuum Network Endpoint After Scope Contain Remediate During Detect Block Defend Before Discover Enforce Harden Mobile Virtual Point in Time Cloud Continuous Email & Web Only Cisco Security Can Deliver… Visibility and Control Across the Full Attack Continuum Attack Continuum Before Discover Enforce Harden During Detect Block Defend After Scope Contain Remediate ASA VPN NGIPS Advanced Malware Protection NGFW Meraki ESA/WSA Network as Enforcer CWS ThreatGRID Secure Access + Identity Services FireSIGHT and pxGrid Are You Able to Defend Against Advanced Malware? 1 Can your customers detect advanced malware in web and email? 2 Assess your customers’ current level of network protection 3 Assess your customers’ current level of endpoint protection Get Started Now 1 Offer your customers a Proof-of-Value (POV) deployment 2 Establish a timeframe and installation date for POV 3 Determine hardware requirements and configuration changes 4 Select POV length and delivery 5 Schedule kick-off meeting http://www.cisco.com/web/partners/specializations/security-arch.html Need Assistance Getting Cisco Express Security Specialized? http://www.cisco.com/web/partners/specializations/expresssecurity/index.html They will navigate with you, through the specialization requirements They host/sponsor the required AM & SE specialization classes Offering FREE* ASA 5506 Enable you to complete Security Network Assessments –$1,500 spiff available Call your Cisco Distributor Sourcefire Resources • Advanced Malware Protection • Cisco AMP Threat Grid - Appliances • Cisco AMP Threat Grid - Cloud • Cisco Advanced Malware Protection Virtual Private Cloud Appliance • Cisco Advanced Malware Protection for Endpoints • Cisco Advanced Malware Protection for Networks Sourcefire Resources Customer Case Studies • Playlist of all Customer Testimonials on AMP • John Chambers on Cisco Security and AMP • SHSU.uses AMP for Endpoints • Gartner Video-on-Demand: Strategies to Combat Advanced Threats featuring Cisco AMP • ADP uses ThreatGrid https://www.youtube.com/watch?v=x7c21CgyH3o&feature=youtu.be Sourcefire Resources AMP Demos /Videos • AMP + Threat Grid External Launch Video • AMP for Endpoints Overview Video • NSS Labs Breach Detection System test • AMP for Networks Overview Video • AMP on Techwise TV June 2015 • AMP Threat Grid Overview Video • AMP Overview in 4 Minutes: Meet Tom, the IT Security Guy Sourcefire Resources Updated Data Sheets, At-a-Glances, Infographic, Whitepapers • AMP Solution Overview • AMP Solution AAG • AMP for Networks: Data Sheet | AAG • AMP for Endpoints: Data Sheet | AAG • Security Everywhere Whitepaper (direct link) • AMP Threat Grid Solution Overview • AMP Threat Grid – Appliance: Data Sheet | AAG • AMP Threat Grid – Cloud: Data Sheet • Malware Infographic Call to Action Invite Your Customers to the next CCE Event Next event – Wednesday Nov 11th @ 1:30 p.m. You've Already Been Hacked. Now What? Cisco Next-Gen Security Can Help Registration link | Invitation Invite your customers to attend and we will notify you if they do! Access registration links, replays at: http://cs.co/cisco101 © 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Join Us Next Week! Next Quick Hit Briefing Big Data = Big $$$$ - Learn how to Monetize Big Data with Cisco Thursday Nov 5th, 2015 at 9:30 ET Check http://cs.co/quickhit for registration links and replays C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Thank you. Appendix: How AMP Works How Cisco AMP Works: Network File Trajectory Use Case An unknown file is present on IP: 10.4.10.183, having been downloaded from Firefox At 10:57, the unknown file is from IP 10.4.10.183 to IP: 10.5.11.8 Seven hours later the file is then transferred to a third device (10.3.4.51) using an SMB application The file is copied yet again onto a fourth device (10.5.60.66) through the same SMB application a half hour later The Cisco® Collective Security Intelligence Cloud has learned this file is malicious and a retrospective event is raised for all four devices immediately. At the same time, a device with the AMP for Endpoints connector reacts to the retrospective event and immediately stops and quarantines the newly detected malware Eight hours after the first attack, the Malware tries to re-enter the system through the original point of entry but is recognized and blocked.