Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access...
Transcript of Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access...
![Page 1: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/1.jpg)
April 1st 2015
Cyber Security Intelligence & Threat Mitigation
Yaron BielousHead of Cloud
![Page 2: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/2.jpg)
2
About Allot Communications
![Page 3: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/3.jpg)
WAN
Enterprises migrated to Hybrid Cloud
3
Internet
Hybrid Cloud Users
Private Cloud On Campus
Public Cloud
In the Branch
At Home
On the Road
The Internet is the new IT
Ensuring Availability, Performance &
Security across Clouds
24/7
BYOD
ALWAYS CONNECTED
![Page 4: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/4.jpg)
Allot’s Solution Domains
4
Cloud Access Security
Threat DetectionDDoS ProtectionWeb Security
Cloud Access Optimization
Application AwarenessQoS
Policy ManagementTraffic Steering
Network Traffic AnalyticsDPI Technology Policy Control
Engines
Allot Service Gateway Allot NetEnforcer Allot NFVPlatforms
![Page 5: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/5.jpg)
Granular Web Analytics under encryption
12
Drill-down to Hosts and Apps is possible even when traffic is SSL encrypted
![Page 6: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/6.jpg)
The Anonymity Risks
6
• May indicate illegal activity
• DDoS attacks behind anonymizes
• Hacking activity behind anonymizes
• Malicious activity detection under the anonymize shield is a significant challenge
Allot Value Proposition:Delivers granular visibility into
a wide range of anonymity tools
![Page 7: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/7.jpg)
Targeting Illegal DestinationsHow FBI brought down cyber-underworld site Silk Road
8
![Page 8: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/8.jpg)
Richest Intelligence Directly from the Wire
8
Broadband
Experience Analytics User Control Regulatory Compliance
Security IntelligenceControl & Care
Mobile
SIEM
Operations Intelligence
Private Cloud
Public Cloud
Internet
Applications
Users
At Home
On the Road
In the Branch
On Campus
USER LOCATION ENDPOINT NETWORK CONTENT APPLICATION
![Page 9: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/9.jpg)
Proactive Web IntelligenceIndepth Analysis
17
![Page 10: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/10.jpg)
Individual User’s Activity
Which application are used? When? For how long? On which device?
![Page 11: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/11.jpg)
Actionable Security – DDoS Protection
11
DDoS/DoS/Scan attacks per Day
Anti-DDoS as a Service
Automatic/on-demand Mitigation action
Audit User Activity
![Page 12: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/12.jpg)
Actionable Security – Web & Mail Protection
HTTP \ WAP
2nd Filter
Full URL Categorization
1st Filter
URL Blacklist
12
URL Filtering – Black List, White List
Categorized Content Filtering
Anti Virus/Malware
Multi-tenancy
User
Access to this
website is forbidden!
www.illegalcontent.com
3rd Filter
Virus/MalwareProtection
![Page 13: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/13.jpg)
13
Allot Cyber Solutions for a Safer Internet
• Zero day DDoSMitigation
• 1st line of defense
• Leading anonymity and encryption awareness
• Highly Granular Transaction information at Scale
• Content filtering to illegal web services, and anti-malware protection
Network ProtectionCyber Intelligence Web Security
![Page 14: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application](https://reader034.fdocuments.us/reader034/viewer/2022042122/5e9c90067ca6ca414426bedb/html5/thumbnails/14.jpg)
THANK
Find out how Allot can help YOUR business to become a leading Digital Lifestyle Provider
Email [email protected]
U
• www.allot.com 14