Getting Beyond Standalone Antivirus to
Advanced Threat Protection
Eric Schwake
Sr. Product Marketing Manager
@lombar77
1
1
Targeted Attack Trends
2
Organizations Struggling to Keep Up
3
A Methodology for Better Protection
4
How Symantec Can Help
5
Q&A
2
Targeted Attacks
3
Targeted Attacks Defined
Broad term used to
characterize threats
targeted to a specific entity
or set of entities
Often crafted and executed
to purposely be covert and
evasive, especially to
traditional security controls
End goal is most commonly to capture and extract
high value information, to damage brand, or to
disrupt critical systems
4
How Targeted Attacks Happen
Spear Phishing
Watering Hole Attack
Send an email to a person
of interest
Infect a website and lie
in wait for them
5
Targeted Attack Trends
Top 10 Industries Targeted
Spear Phishing Attacks by Size of
Targeted Organization,
2011 - 2013
2013
2011
2012
in Spear-Phishing Attacks, 2013
Source: Symantec Source: Symantec
Public Administration (Gov.)
78
Email per Campaign
2,501+
Employees
Services – Professional
50%
2012
61
Services – Non-Traditional
Recipient/Campaign
111
50%
+91
165
Campaigns
1,001 to 1,500
Transportation, Gas,
Communications, Electric
501 to 1,000
5
50%
Wholesale
251 to 500
Retail
1 to 250
18%in
Duration
of Campaign
Increase
0
2011
408
%
Manufacturing
Finance, Insurance
& Real Estate
1,501 to 2,500
779
122
100%
2013
16%
39% 15 29
14
23
13
13
6
61%
50%
2
31%
30%
1 2012
2013
targeted
3 days
campaigns
8.3 days
4 days 1 attack
Mining
Construction
6
Organizations are Struggling to Keep Up
7
Reliance on Silver Bullet Technologies
• A single point product won’t
identify all threats
• Most frequent Silver Bullet
monitoring technologies:
– IDP / IPS
– Anomaly detection (on the rise)
32%
Average % of
incidents detected
by IDP / IPS
technologies
• Individual technologies lack a
comprehensive vantage point to
detect today’s threats.
8
Incomplete Enterprise Coverage
• Companies fail to effectively
assess (and update) the scope of
their Enterprise
• Enterprise technology trends
further challenge scope
– Mobile
– Cloud
– BYOD
9
Underestimate SIEM Complexity
• Companies frequently
underestimate effort and cost
to implement
– Technical architecture frequently
under scoped
– Time to implement can take year+
• Struggle to sustain capability
– Turnover of “the SIEM expert”
– Focus / Expertise Required
72%
Collect 1TB of security
data or more on a
monthly basis
35%
Too many false
positive responses
10
Lack of Sufficient Staff / Expertise
Increasing Sophistication ≠ More Resources
83%
of enterprise
organizations say it’s
extremely difficult
or somewhat
difficult to
recruit/hire security
professionals
“We’re at 100% employment
in IT security”
– Chief Security Officer
Health Care Organization
11
Can’t Keep up with Evolving Threats
• Detection program must be
evolve as threats evolves
– Analyst training / awareness
– SIEM tuning
– Detection methods
– Response tactics
• Varied tactics to keep up with
threats:
– Open source
– Working groups (ISACs)
– Commercial
28%
Sophisticated
security events have
become too hard to
detect for us
35%
Do not use external
threat intelligence
for security analytics
12
A Methodology for Better Protection
13
The Attack Waterfall
Readiness
Protection
Detection
Response
100+
Security
Ops staff
256 Billion
Attacks
350,000
Security Events
3,000
Incidents
The ‘Maybe’s
14
Identify
Protect
Detect
Respond
100+
Security
Staff
256B
attacks
350K
events
3000
incidents
Recover
15
Identify or Readiness
Asset Management
Policy
Threat Intelligence
Practice
16
Identify
Protect
Detect
Respond
100+
Security
Staff
256B
attacks
350K
events
3000
incidents
Recover
17
Proactive Protection Technologies
More than AV
Test URLs in Email
All Control Points
18
Identify
Protect
Detect
Respond
100+
Security
Staff
256B
attacks
350K
events
3000
incidents
Recover
19
Detect
Identify Anomalies
Monitor & Test Everything
Correlate Control Points
20
Identify
Protect
Detect
Respond
100+
Security
Staff
256B
attacks
350K
events
3000
incidents
Recover
21
Respond
Automate Correlation
Incident Response
22
How Symantec Can Help
23
Symantec Advanced Threat Protection
Readiness
Protection
Detection
Response
100+
Security
Ops staff
256 Billion
Attacks
350,000
Security Events
3,000
Incidents
Managed
Adversary
Service
Secure
App
Service
Security
Simulation
The ‘Maybe’s
Insight, SONAR,
Thread injection
protection
Disarm, Link
following,
Skeptic
Advanced Threat
Protection Solution
MSS-ATP
Synapse
Cynic
Synapse
Incident
Response
Service
24
Thank you!
Eric Schwake
Eric_schwake@symantec.com
+1 541 520 6015
@lombar77
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
25