1 / 22

APTs Are Not a New Type of Malware

APTs Are Not a New Type of Malware. Source: BC Labs Report: Advanced Persistent Threats. 1. The APT Attack Lifecycle. Research. Entry. Penetration. Harvest. 2. AGENDA. 3. Layered Defenses. APT. APT. Attackers use multiple tools, so should you Ensure overlap and avoid gaps. DLP.

trixie
Télécharger la présentation

APTs Are Not a New Type of Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. APTs Are Not a New Type of Malware Source: BC Labs Report: Advanced Persistent Threats 1

  2. The APT Attack Lifecycle Research Entry Penetration Harvest 2

  3. AGENDA 3

  4. Layered Defenses APT APT • Attackers use multiple tools, so should you • Ensure overlap and avoid gaps DLP APT SG PacketShaper IDS WebFilter w/ WebPulse APT Desktop AV ProxyAV APT APT APT Firewall ProxyClient/ Cloud Svc • The best attacks still leave tracks • Read and Correlate logs, identify anomalies and connect the dots 4

  5. Web Security Options Roles-based Administrative Controls Reporting Policy Management Web Filtering Rea • On Premise Web Security • Proxy • Antivirus • DLP • Web filter Cloud Intelligence Cloud Services (XaaS) Multi-function Cloud Security Real-Time Defense Services Multi-Layer SWG Real-time Web Protection Granular Policy Control Central Visibility Inline Malware Analysis Flexible Deployment Options 5

  6. Cloud Intelligence • Awareness from millions of users, feeds, etc. • Real-time inputs & content analysis • Malware, phishing and call-home web threat detection • Scalable • Minimize patches & downloads • Maintained by Security Experts Cloud Services Network Monitors SWG Consumer Mobile Workers XSPs 6

  7. Flexible, Hybrid Deployments Web Filtering Headquarters Data Center Antivirus Cloud Intelligence DLP Reporter Internet Branch Office Cloud Services (XaaS) Remote User Remote User 7

  8. AGENDA 8

  9. Granular Web Application Controls • Upload Video • Upload Photo • Post Message • Send Email • Download Attachment • Upload Attachment • Safe Search • Major Engines supported • Media Search engines as well • Keyword Searches • Social Networks • Regulate Operations • Restrict abuse • Multi-media • Publishing • Sharing • Web Mail 9

  10. AGENDA 17

  11. Packet Shaping Visibility 18

  12. Packet Shaping Visibility 19

  13. Video Optimization HTML5 Video Server DATA CENTER Branch Office Requirements Blue Coat Optimized Video Delivery WAN INTERNET Live Stream-splitting Video-on-Demand Caching with eCDN Adobe Flash, HTTP/SSL, HTML5, Windows Media, Silverlight Scale Video Bandwidth: 10x, 100x, 1000x Reduce Recreational Video by 30-80% Protect Critical Apps from Video Floods 20

  14. Application Utilization Trending • Top N Applications • Trended over time • Visually stacked • Identify spikes 21

  15. Comprehensive Reporting • Application Reports • Response time • Utilization • Site Reports • Response time • WAN utilization • Top users, apps, etc. • Host Reports • Top talkers, listeners, DSCPs, etc. • Advanced Protocol Support • VoIP Reporting • WAN Optimization 22

  16. AGENDA 23

  17. 24

More Related