SlideShare a Scribd company logo
1 of 9
ECAT – Enterprise Compromise Assessment




                      Chad Loeven, VP Sales and Marketing
                      Pascal Longpre, Founder and CTO
Enterprise security today
                       AV on desktop and server
            Firewall




                        •   Bluetooth and WiFi can
                            bypass in-line devices
                        •   Inline devices can’t
                            identify what
                            happened on the host
                            in a compromise



                 IPS                                 SIEM
Kaspersky – Rated #1 AV overall

                          >42% of all new
                          malware passed
                        through undetected
ECAT fills the detection gap




  Incident ->   Rapid breach detection   Recovery   Forensics
The ECAT solution: no signatures
                              • Host-based Deep Scan

                              • Network traffic



                              • Live Memory
                                Analysis

                              • Machine
                                Suspect Level
ECAT Overview – server and agent




                  Server-side analysis
                    of the endpoint
ECAT – Baselines and whitelists
             Whitelisting:
             •   Bit9 Global Software Registry (GSR)
             •   NIST database of known-good hashes
             •   ECAT whitelist including Microsoft MSDN
             •   Server-side Cert validation




             •   Opswat Metascan scans against 6 or more AV engines
ECAT – Enterprise Compromise Assessment

       Network Traffic analysis
        Multi-engine AV scan
       Application Whitelisting
        Certificate Validation        •   Rapid Breach Detection
    Direct physical disk inspection   •   Signature-less
        Live Memory Analysis          •   Fills the gap in desktop defense
        Full System Inventory         •   Actionable information -fast
                                      •   Remediation
ECAT – Enterprise Compromise Assessment

Finding an evil
    in a
 haystack
                        www.siliciumsecurity.com

More Related Content

What's hot

BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 

What's hot (20)

Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)
 
The Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise SecurityThe Impact of Digital Transformation on Enterprise Security
The Impact of Digital Transformation on Enterprise Security
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Recover Multi-Vendor Network Infrastructure in minutes
Recover Multi-Vendor Network Infrastructure in minutesRecover Multi-Vendor Network Infrastructure in minutes
Recover Multi-Vendor Network Infrastructure in minutes
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
 
checkpoint
checkpointcheckpoint
checkpoint
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
LTE Testing
LTE TestingLTE Testing
LTE Testing
 

Viewers also liked

Viewers also liked (20)

Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
CSS3 notes
CSS3 notesCSS3 notes
CSS3 notes
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
CSS
CSSCSS
CSS
 
HTML5 &CSS: Chapter 08
HTML5 &CSS: Chapter 08HTML5 &CSS: Chapter 08
HTML5 &CSS: Chapter 08
 
HTML & CSS: Chapter 07
HTML & CSS: Chapter 07HTML & CSS: Chapter 07
HTML & CSS: Chapter 07
 
HTML: Chapter 01
HTML: Chapter 01HTML: Chapter 01
HTML: Chapter 01
 
HTML & CSS: Chapter 03
HTML & CSS: Chapter 03HTML & CSS: Chapter 03
HTML & CSS: Chapter 03
 
Html and CSS: Chapter 02
Html and CSS: Chapter 02Html and CSS: Chapter 02
Html and CSS: Chapter 02
 
HTML & CSS: Chapter 06
HTML & CSS: Chapter 06HTML & CSS: Chapter 06
HTML & CSS: Chapter 06
 
CSS - Basics
CSS - BasicsCSS - Basics
CSS - Basics
 
HTML & CSS: Chapter 04
HTML & CSS: Chapter 04HTML & CSS: Chapter 04
HTML & CSS: Chapter 04
 
Unit 6, Lesson 3 - Vectors
Unit 6, Lesson 3 - VectorsUnit 6, Lesson 3 - Vectors
Unit 6, Lesson 3 - Vectors
 
Bread board
Bread boardBread board
Bread board
 
Breadboard
BreadboardBreadboard
Breadboard
 
Basic css
Basic cssBasic css
Basic css
 
Web Engineering - Basic CSS Properties
Web Engineering - Basic CSS PropertiesWeb Engineering - Basic CSS Properties
Web Engineering - Basic CSS Properties
 
Vernier caliper
Vernier caliperVernier caliper
Vernier caliper
 
Spline Interpolation
Spline InterpolationSpline Interpolation
Spline Interpolation
 

Similar to Intro To ECAT

CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Demystifying Visual Studio 2012 Performance Tools
Demystifying Visual Studio 2012 Performance ToolsDemystifying Visual Studio 2012 Performance Tools
Demystifying Visual Studio 2012 Performance Tools
Martin Kulov
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
 
Ball Systems Capabilities
Ball Systems CapabilitiesBall Systems Capabilities
Ball Systems Capabilities
amhoff
 

Similar to Intro To ECAT (20)

CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Demystifying Visual Studio 2012 Performance Tools
Demystifying Visual Studio 2012 Performance ToolsDemystifying Visual Studio 2012 Performance Tools
Demystifying Visual Studio 2012 Performance Tools
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Enterprise Cyber-Physical Edge Virtualization Engine (EVE) Project.pdf
Enterprise Cyber-Physical Edge Virtualization Engine (EVE) Project.pdfEnterprise Cyber-Physical Edge Virtualization Engine (EVE) Project.pdf
Enterprise Cyber-Physical Edge Virtualization Engine (EVE) Project.pdf
 
Web Based Security
Web Based SecurityWeb Based Security
Web Based Security
 
Towards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloudTowards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloud
 
Zero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xenZero footprint guest memory introspection from xen
Zero footprint guest memory introspection from xen
 
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORING
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Quick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, OpengearQuick wins in the NetOps Journey by Vincent Boon, Opengear
Quick wins in the NetOps Journey by Vincent Boon, Opengear
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Ball Systems Capabilities
Ball Systems CapabilitiesBall Systems Capabilities
Ball Systems Capabilities
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Integrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing InfrastructureIntegrating OpenStack To Existing Infrastructure
Integrating OpenStack To Existing Infrastructure
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
CloudStack Secured
CloudStack SecuredCloudStack Secured
CloudStack Secured
 
The Age of Network Operations Management in Software Defined Data Centers
The Age of Network Operations Management in Software Defined Data CentersThe Age of Network Operations Management in Software Defined Data Centers
The Age of Network Operations Management in Software Defined Data Centers
 

Intro To ECAT

  • 1. ECAT – Enterprise Compromise Assessment Chad Loeven, VP Sales and Marketing Pascal Longpre, Founder and CTO
  • 2. Enterprise security today AV on desktop and server Firewall • Bluetooth and WiFi can bypass in-line devices • Inline devices can’t identify what happened on the host in a compromise IPS SIEM
  • 3. Kaspersky – Rated #1 AV overall >42% of all new malware passed through undetected
  • 4. ECAT fills the detection gap Incident -> Rapid breach detection Recovery Forensics
  • 5. The ECAT solution: no signatures • Host-based Deep Scan • Network traffic • Live Memory Analysis • Machine Suspect Level
  • 6. ECAT Overview – server and agent Server-side analysis of the endpoint
  • 7. ECAT – Baselines and whitelists Whitelisting: • Bit9 Global Software Registry (GSR) • NIST database of known-good hashes • ECAT whitelist including Microsoft MSDN • Server-side Cert validation • Opswat Metascan scans against 6 or more AV engines
  • 8. ECAT – Enterprise Compromise Assessment Network Traffic analysis Multi-engine AV scan Application Whitelisting Certificate Validation • Rapid Breach Detection Direct physical disk inspection • Signature-less Live Memory Analysis • Fills the gap in desktop defense Full System Inventory • Actionable information -fast • Remediation
  • 9. ECAT – Enterprise Compromise Assessment Finding an evil in a haystack www.siliciumsecurity.com

Editor's Notes

  1. Welcome to Silicium Security, the makers of ECAT, an Enterprise Compromise Assessment Tool for signature-less malware detection.We’ve been delivering security solutions to large enterprises, government and military for over a decade and work with a global network of partners to deploy and support ECAT worldwide.In this brief video we’ll explain why current signature-based security solutions come up short and how ECAT can bridge the detection gap.
  2. Virtually every enterprise today has in-line and host based security solutions blocking, monitoring and remediating threats at multiple levels. However, most of these solutions share one common trait in that they overwhelmingly rely on signatures. In other words, they can only block or detect what they already know about. In line and network-based solutions also have major blind spots. Laptops and remote workstations are often invisible. Bluetooth and WiFi can be hijacked to bypass network controls.
  3. So what’s the problem with signatures?An advertised 99% detection rate sounds great, but that stat is measured over an entire body of mostly old threats. The 1% not detected is overwhelmingly new, and targeted, attacks. Even minor variants of existing threats can bypass AV, IPS.As an example, let’s take a closer look at the best AV on the market and see how it fares…..Kaspersky was recently ranked as the Product of the Year by a respected independent testing agency – but what does that mean? Unfortunately, when we drill down into the details of the report, ‘winning’ meant only failing 42% of the time on new threats. Which was still better than virtually all other AV products on the market!
  4. ECAT fills the gap between traditional signature-based security tools and forensics, delivering rapid breach detection and compromise assessment.
  5. The solution is not to depend on signatures, but rather do a deep analysis of the endpoint combining multiple technologies and approaches. Host-based analysis is key, signature-less network-based solutions will not identify what process is infected or how. No assumptions can be made about the integrity of the endpoint prior to a scan, and analysis must be independent of the end user and done on the server, not the target machine. By assigning a suspect level to each component of the machine, we can build an overall Machine Suspect Level to determine if there has been a compromise and take action.
  6. ECAT can be deployed as an incident response tool, as part of a security audit or for ongoing monitoring of the enterprise machines.Each ECAT server can handle up to 20K agents. Each agent scans silently in the background with no user interaction. The load is minimal as all information is gathered and sent back to the server, where the analysis is done. The ECAT server verifies the system integrity, and builds a holistic view of the endpoint.
  7. An important feature of ECAT is the ability to set an enterprise-wide baseline from a clean machine. This process eliminates background noise and false positives, and means truly suspect behaviour will be highlighted.As a 1st step, ECAT conducts server-side Certificate validation to avoid any possible compromise of the cert validation process on the endpoint. Next, ECAT compares every file against 3 powerful whitelists from NIST, Microsoft and Bit9. Combined, every file found is scanned against a database of billions of files. Custom homegrown applications can also be whitelisted system-wide.Finally, each file can be run against OpswatMetascan’smuti-AV scanner to quickly identify known bad files that the desktop AV may have missed. By quickly sorting found files into known good, and known bad, ECAT brings to the fore in the console machines that need immediate attention.
  8. To summarise, ECAT fills the gap between existing solutions. It delivers accurate, actionable information quickly to the people that need it. ECAT does this by layering on multiple approaches and technologies, starting with aFull system inventory,Live memory analysisPhysical disk analysisCertificate validationWhitelistingMulti-AV scansNetwork Traffic monitoring and statistical Analysis.No other approach delivers detection results like ECAT can.
  9. Thank you for watching. Consult our website or youtube channel to view ECAT in action, or contact us for more information.