html5
1 / 15

Context-aware Security from the Core

Context-aware Security from the Core. Agenda. Changing Network Dynamics Closing the DNS Gap Infoblox Solutions Why Infoblox Hands on lab introduction. Evolving Network Environment and Paradigm Shifts. Active Internet Users. Connected Devices. Network Evolution. Digital Transformation.

scala
Télécharger la présentation

Context-aware Security from the Core

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Context-aware Security from the Core

  2. Agenda Changing Network Dynamics Closing the DNS Gap Infoblox Solutions Why Infoblox Hands on lab introduction

  3. Evolving Network Environment and Paradigm Shifts... Active Internet Users Connected Devices Network Evolution Digital Transformation Internetof Things 3.4 Billion1 Active internet users worldwide in 2016, +25% over last year 21 Billion2 Connected devices by 2020, +30% over last year Networks are being transformed – Cloud, SDN, others Digital transformation is happening faster than you think New trends like IoT are increasing the attack surface • Internet Live Stats (http://www.internetlivestats.com/internet-users/) • http://www.cnbc.com/2016/02/01/an-internet-of-things-that-will-number-ten-billions.html • https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf

  4. ...Are Leading to Increased Exposure to Cyber Threats Organizations are facing an unprecedented challenge of data breaches

  5. Products Galore: Solutions Missing 400+ VENDORS

  6. DNS – The Critical Yet Vulnerable Asset

  7. The DNS Gap –A Multi Dimensional Threat Vector $4M 46% 45% The Leading Culprit in Data Exfiltration Average consolidated cost of a data breach3 % of survey respondents that experienced DNS data exfiltration4 % of survey respondents that experienced DNS tunneling4 91% 431M #1 78% 84% >$500 $1.5M Making Your Infrastructure Work Against You APT/Malware Proliferation Rooted in DNS Of malware uses DNS to carry out campaigns5 New unique pieces ofmalware in 20156 Malware C&C is #1 responsible vector for crimeware7 DNS: most common application layer attacks1 Of reflection/amplification attacks use DNS1 Per min cost of downtime due to DDoS attack2 Average cost per year to deal with DNS attacks2 70% 46% 45% Ineffective Threat Intelligence of survey respondents that felt Threat Intel is not timely8 % of survey respondents unableto prioritize the threat by category8 % of survey respondents lacked context for threat intel to make it actionable8 • Arbor WISR2016 Report • Ponemon Institute Study – The Cost of Denial-of-Service Attacks. March 2015 • Source: Ponemon Institute, 2016 Cost of Data Breach Study • Source: SC Magazine, Dec 2014, “DNS attacks putting organizations at risk, survey finds” • Source: Cisco 2016 Annual Security Report • Symantec 2016 Internet Security Threat Report • Verizon 2016 Data Breach Investigations Report • Source: Ponemon Institute, 2015 Second Annual Study on Exchange Cyber Threat Intelligence

  8. Three Aspects of Security #1 Infrastructure Protection #2 Data Protection and Malware Mitigation #3 Threat Containment and Operations Better Application and Service Availability Protect Users and Data Efficiency & Optimization of Security Operations

  9. WhyInfoblox?

  10. Multipronged Approach to Threat Detection Detect & Prevent communications to malware, C2, Ransomware Government-grade Threat Intelligence Ecosystem Infrastructure protection for critical core services Carrier-grade deep packet inspection Instant identification of popular tunneling tools • Signature • Reputation • Behavior Patented Streaming Analytics Technology Detect & Prevent Data Exfiltration “Machine Learning”

  11. Leverage Threat Intel Across Entire Security Infrastructure • Infoblox • C&C IP List • CSV File • Phishing & Malware URLs • SURBL • JSON TIDE Define Data Policy, Governance & Translation • Spambot IPs • Marketplace • RBL Zone File • C&C & Malware Host/Domain • Custom TI • RPZ Dossier Investigate Threats Faster triage Threat Prioritization Single-source of TI management RESULT:

  12. Importance of a Robust, Scalable & Hybrid Architecture Your Public Cloud IaaS Infoblox Cloud Your Private Cloud IaaS ActiveTrust Threat Intel HQ Grid Master (HA pair) Grid Master Candidate@Recovery Site Grid Member with DNS Firewall Infoblox Grid Grid Member DNS / DHCP Network Insight Grid Member Reporting & Analytics Branch Office Grid Member DNS / DHCP Microsoft DNS, DHCP Edge Network/ Remote Office DHCP

  13. Let’s see it in action…Welcome to the hands-on-lab

  14. Next Steps Path to Engagement • Try Our Products – Free of Cost & Risk • ActiveTrust Cloud eval • ActiveTrust (on-premises) eval • Security(PCAP) assessment • Engage with Infoblox to discuss your security architectures

  15. Next Steps

More Related