• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 

Big Data Security Intelligence and Analytics for Advanced Threat Protection

on

  • 1,544 views

Solera Networks Presentation on Big Data Security Intelligence and Analytics for Advanced Threat Protection

Solera Networks Presentation on Big Data Security Intelligence and Analytics for Advanced Threat Protection

Statistics

Views

Total Views
1,544
Views on SlideShare
1,429
Embed Views
115

Actions

Likes
7
Downloads
0
Comments
0

1 Embed 115

http://www.soleranetworks.com 115

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Big Data Security Intelligence and Analytics for Advanced Threat Protection Big Data Security Intelligence and Analytics for Advanced Threat Protection Presentation Transcript

    • © 2013 Solera Networks1© 2013 Solera Networks. All information contained herein should be considered confidential, proprietary, and trade secretinformation of Solera Networks. Any use of this work without express written consent is strictly prohibited.Big Data Security Intelligence and Analytics forAdvanced Threat ProtectionSee everything. Know everything.™© 2013 Solera Networks
    • © 2013 Solera Networks2BackgroundGlobal Presence• Salt Lake City, UT (HQ)• San Francisco, CA• Washington, DC• London, UK• Tokyo, Japan• Sydney, Australia• Pune, IndiaInvestors Leadership and Innovation• 300+ G2000 & Federal customers• 14 patents awarded/pending• Threat Research Lab• FIPS and CC certification
    • © 2013 Solera Networks3The Threat Landscape Has Evolved…HACKTIVISTSSTATE-SPONSOREDATTACKERSCYBERCRIMINALSFINANCIALLYMOTIVATEDNATIONALISTICALLYMOTIVATEDPOLITICALLYMOTIVATEDATA/APTGRADEDDOSRansom& fraudGov’t, enterprise &infrastructuretargetsPublic dataleakageDefacement DATATHEFTMALWAREBADSTUFF INGOOD STUFFOUT
    • © 2013 Solera Networks4Breaches and attacksperpetrated by outsidersState-affiliated attacks thatemployed phishingBreaches discovered byexternal parties*2013 Verizon DBIRReality of Today’s Threat Landscape
    • © 2013 Solera Networks5Initial Attack toInitial Compromise [ 11% 13% 60%] 13% 2% 1% 0%74%Window of Opportunity for Advanced Threats*Seconds Minutes Hours Days Weeks Months YearsInitial Compromiseto Discovery 0% 1% 9% 11% [ 12% 62% 4% ]78%*2013 Verizon DBIR
    • © 2013 Solera Networks6Past 10 years: Deploying Layers of Countermeasures…Today’s footprint:Top security pointproducts deployed…URLFiltering
    • © 2013 Solera Networks7We liveWORLDPOST-PREVENTIONin ado we do what we do?
    • © 2013 Solera Networks8Most Dreaded Questions from the CISOWho did this to us?How did they do it?What systems and data were affected?Can we be sure it is over?Can it happen again?
    • © 2013 Solera Networks9Advanced PersistentSecurity™ that easilytells users what tolook for—and atwe deliver
    • As data is gathered andanalyzed, relationshipscan be found andpatterns appear…Turning Complexity into Context…you’ll know if it is athreat or not.ContextMetadataInferenceDataThrough…
    • Turning Complexity into ContextAs data is gathered, theelements aren’t alwayscoherent or revealing.But through analysis,relationships can befound and patternsappear.
    • Once pictures begin toemerge, it becomespossible to discern ifsomething is a threat, orif it’s benign.Turning Complexity into Context
    • © 2013 Solera Networks13Integration LayerThreatIntelligenceBig DataSecurityAnalyticsSecurityVisibilityFull Packet CaptureLayer 2 - 7 indexing & classificationVisual InsightContext, real-time awareness, alertsAdvanced Malware DetectionWhite/blacklists, sandboxing, feedsBig Data Security Intelligence & Analyticsfor Advanced Threat Protection
    • © 2013 Solera Networks14Integration LayerThreatIntelligenceBig DataSecurityAnalyticsSecurityVisibility• Telling users what to look for and at• Flexible architecture: HW/SW/Virtual• Scalable: 10Gbps, VM, Software• Advanced threat detection/analysis• Single ‘pane-of-glass’Big Data Security Intelligence & Analyticsfor Advanced Threat Protection
    • © 2013 Solera Networks15Integration LayerThreatIntelligenceBig DataSecurityAnalyticsSecurityVisibilitySecurity Ecosystem: IntegratedAdvanced Threat ProtectionContext-aware andadaptive security will bethe only way to securelysupport the dynamicbusiness and ITinfrastructures emergingduring the next 10 years.Neil MacDonald, Distinguished VPGARTNER“Integration LayerThreatIntelligenceBig DataSecurityAnalyticsSecurityVisibility”
    • © 2013 Solera Networks16Solera is the Security Camera for your NetworkRecords, classifies and indexes all packets and flows from L2 – L7On the wire, file-level visibility of data exfiltration & malware infiltrationActionable intelligence, forensics and situational awarenessUnmatched multi-dimensional flow enrichment & big data warehousingFlexible, open and easy-to-use platformdo we do what we do?Providing real-time analysis andfull visibility ofeverything goingin and out ofyour network
    • © 2013 Solera Networks17Solera DeepSee™The Most Comprehensive and Flexible SIA SolutionFlexible and easy-to-deploy on leadingplatforms.Comprehensive,pre-configured SIAappliances.Total network visibility.Branch/small-officedeployments.
    • © 2013 Solera Networks18Solera DeepSee Appliances SpecificationsDeepSee 2G DeepSee 10GThroughput 2 Gbps 10 GbpsStorage 6 TB to 66 TB 20 TB to 140 TBNICs 4 – 1 GbE 2 – 10 GbE & 8 – 1 GbERack Size 1 U 2 UDeepSee Central Manager• Manages up to 100 sensors• Up to 1.4 PB of managed Big DataDeepSee Storage Modules• 20 TB storage modules• With 2 SAS6 interfaces
    • © 2013 Solera Networks19An Example DeploymentTAP/SPAN+Root Cause Explorer+Threat Analysis+PCAP Import+Comparative Reporting+Reputation Services+more…DeepSee ApplianceManagementNetworkDeepSeeDashboard+Reports+ArtifactTimeline+AlertsOptional StorageApplication ServersMobile DevicesUsers
    • © 2013 Solera Networks20Real-World Use Cases with Solera DeepSeeSituationalAwarenessIncidentResponsePolicyComplianceData LossMonitoring& AnalysisAdvancedMalwareDetectionContinuousMonitoringWho? When? What?Where? How?Target(s)? Who Else? Is It Over? What Else? How Long?
    • © 2013 Solera Networks21Big DataAnalyticsDeepSee Big Data Security AnalyticsPartner IntegrationDeepSee® ApplicationsReports, GeoIP, Reconstruction,Packet AnalysisReputation, Threat Feeds,and File AnalysisThreatIntelligenceSensorsSolera DeepSee PlatformUse CasesIncidentResponseSituationalAwarenessPolicyComplianceContinuousMonitoringData LossMonitoring & AnalysisAdv. MalwareDetection
    • © 2013 Solera Networks22A Trusted Partner to Global At-Risk Customers
    • © 2013 Solera Networks23Try Big Data Security Intelligence and AnalyticsSolera DeepSee 30-Day Trialor…Free DeepSee Lab Editionwww.soleranetworks.com
    • © 2013 Solera Networks24Win an iPad MiniAnd don’t forget your BigData Security for DummiesNew!Tweet about Solera or apicture of you with Soleraswag and mention@SoleraNetworks in yourtweet
    • © 2013 Solera Networks25Security that MattersYou have been targeted. You will be hacked. Now what?Our advanced threat protection and security analyticssolutions help protect organizations from cyber attackers. Andby doing that, we are helping to protect our way of life…TM