Attacks and Threats are Getting - Exclusive...
Transcript of Attacks and Threats are Getting - Exclusive...
![Page 1: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/1.jpg)
![Page 2: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/2.jpg)
Attacks and Threats are Getting More Challenging!
• Advanced Persistent Threats (APTs)
– Often organisationally driven
• Zero Day Exploits
– Defending against the unknown
• Polymorphic Threats
– Ever changing
It’s inevitable that some of these threats will become successful ATTACKS!
![Page 3: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/3.jpg)
The True Cost of Breach
• Loss of revenue – From outage, no trading
• Damage to reputation – Negative Customer reaction
• Loss of data – Cost of replacement, repair and
compliance
• Interruption to business – Diverting resources will delay core
activity
• Damage to customer confidence – Loyalty & ongoing business delayed or lost
• Damage to investor confidence – Valuation can affect credit limits &
increase costs
• Loss of Intellectual property – Leadership position lost & margin impact
• Legal costs – See all the above!!!
![Page 4: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/4.jpg)
Customer Pain Points • Lack of Visibility
– Anomalies, behaviours, performance degradation
– Indicators of change
• Sheer Volume of Incidents
– Lateral spread
• Incident Response Processes
– Speed of response
• Time to Remediate
– Manpower, skills
• Why Did it Happen?
– Forensics
• Costs
. . . A New Approach is Needed!
![Page 5: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/5.jpg)
Why Exclusive Networks? Exclusive Networks, SuperVAD and trend seeker in the ICT market, proposes a new approach to the Security theme not strictly linked to the features and competencies of a single brand but to the INTEGRATION of different technologies in order to provide customers with protection and remediation solutions developed accordingly their needs and issues.
• Integrates Platform for the First Time
• Drove Development Work with API's
• First World Wide ‘Integrated/Interworking’ Solution Platform
• Use Exclusive Networks to Engineer Demo's and POC's
![Page 6: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/6.jpg)
Downgrades Attacks into known Threats!
![Page 7: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/7.jpg)
Benefits:
• Faster Notification
• Earlier Remediation – Find2Fix
• Improved Visibility & Intelligence
• Vastly Enhanced ‘Post Breach’ Response
• Minimising Damage - Cost/Reputation
• Efficient Use of Limited Resource
![Page 8: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/8.jpg)
VAR Benefits
• Post Breach – Big Issue
• Addresses a Real Need – NOW
• Good Reason for a Conversation with Customers
• Demo Facility can be Booked
• Incremental Revenue Opportunities
• Demonstrate Value to Customers
• Speak to your Account Manager for Further Information
![Page 9: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/9.jpg)
The webinar series we are proposing has the goal to present the NEW approach to the Security Issue. • The Past: Relying on the features and competencies of a single brand • The Future: taking advantage of the powerful INTEGRATION of different
technologies. In each webinar you will find out: • How different vendors can be integrated • How different venodrs can cooperate • How to develop and set up with EXN brands a new security SOLUTION, a relaible
platform able to provide customers with a 360 protection solution tailored on their needs and iusses
CARM Webinars
![Page 10: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/10.jpg)
CARM Webinars
Forescout - Palo Alto Networks –Aerohive An integrated security ecosystem with:
• Network Access Control • Cyber Security & Malware Protection • Wireless Solution
![Page 11: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/11.jpg)
![Page 12: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/12.jpg)
– 5th Generation – a fully distributed environment for the best reliability and performance
– Beyond Connectivity - Cloud-Enabled Services for the maximum onboard capacity
– Simple Deployment and Support Through a centralized dashboard
– Securely Connecting Corporate, BYO And Guest Devices
– PPSK – Private Preshared Secret
![Page 13: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/13.jpg)
Next Gen WLAN resiliency
![Page 14: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/14.jpg)
BYOD Policy
Restricted VLAN
Limit non-work apps
5Mbps per user
M-F 8am-9pm
CORP Policy
Corp VLAN
Prioritize Work Apps
10Mbps per user
24HR Access
GUEST Policy
Guest VLAN only
No Netflix or BitTorrent
1Mbps max per user
Restricted to 9-5 M-F
IoT Policy
Peripherals VLAN
Limited server access
2Mbps per sensors
24HR access
Policy Driven
![Page 15: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/15.jpg)
– Assures adequate visibility to the assets and risks on your network
– enforces network access based on user, device and security posture
– Manages effective mobile and BYOD security strategy
– Quickly respond to advanced threats and security breaches
– Collaborates with other security devices already in place on your network
– Continuously monitor your network
– Infrastructure agnostic, flexible
![Page 16: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/16.jpg)
The CounterACT continuos Monitor
![Page 17: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/17.jpg)
– Automatically Detect and Prevent Unknown Threats
– Granular malware detection across all protocols
– Automatically creates protections against new threats within 15 minutes
– Detailed forensics to easily prioritize and execute follow-on security actions
– Distribute intelligence and protection across multiple components
![Page 18: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/18.jpg)
Next-Generation Threat Cloud
Gathers potential threats from network and endpoints
Analyzes and correlates threat intelligence
Disseminates threat intelligence to network and endpoints
Inspects all processes and files
Prevents both known & unknown exploits
Integrates with cloud to prevent known & unknown malware
Next-Generation Endpoint
Next-Generation Firewall
Inspects all traffic
Blocks known threats
Sends unknown to cloud
Extensible to mobile & virtual networks
Next-Generation Firewall
Inspects all traffic
Blocks known threats
Sends unknown to cloud
Extensible to mobile & virtual networks
Distributed Protection against APT
![Page 19: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/19.jpg)
– A host connects to the Wireless Network via PPSK authentication
– CounterACT which monitor the network is aware of this host and knows where it is
– An infected object is downloaded by the client and analysed by WildFire which is in the middle
– As per WildFire decision, the object is classified as malicious
– Wildfire informs CounterACT about the security event
– CounterACT block the infected client by asking Aerohive to DEauthenticate its PPSK key.
![Page 20: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/20.jpg)
– The benefit of the integration of these three security platform explain the CARM concept
– Cyber Attack Remediation and Mitigation
– The attack has happened and the host was infected
– The network reacts to the malicious event
– The impact has been minimized
![Page 21: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies](https://reader033.fdocuments.us/reader033/viewer/2022051923/601106863a7f6138d24212ec/html5/thumbnails/21.jpg)
Thank you