SlideShare a Scribd company logo
1 of 33
Download to read offline
.
Cloud Security for AWS
Preventing the Vicious Cycle of Security Failure
Protecting Your Cloud from Advanced Targeted Attacks
Andrew Hurren, Senior Regional Solution Architect, ANZ,
Intel Security
.
2
Data Center Client Wearables/IoT
Intel’s Vision
If it is smart and connected, it is best with Intel
.
• Creating differentiated and open platforms for innovation
• Protecting digital identities for personal and transaction security
• Delivering Security Connected at optimal TCO
• Safeguarding our operations, our products and our customers
Consumer Endpoint Corporate Endpoint Network Security Management/Analytics
Network &
Gateway Security
Consumer
Endpoint
Corporate
Endpoint
Management/Analytics
Intel Security Group
Delivering ubiquitous security to individuals and business on all computing
devices
.
The Need for Efficiency
The fundamental security challenge
Time Imperative Resource ConstraintsIncreasing Complexity
Resolve more risk, faster and with fewer resources
Growing IoT Devices, Cloud Adoption and Evolving Threats
.
Threat Defense Lifecycle
Continuous, Automated, and Shared Threat Intelligence
Detect – Illuminate low-threshold maneuvering through
advanced intelligence and analytics.
Protect – Stop pervasive attack vectors while also
disrupting never-before-seen techniques and payloads.
Adapt – Apply insights immediately throughout an
integrated security system.
Correct – Improve triage and prioritize response as part of
a fluid investigation.
Cloud Security is a Shared Responsibility
https://aws.amazon.com/security/sharing-the-security-responsibility/
.
.
McAfee Management Platform
On-premises security Private cloud security Public cloud security
Protection and Detection Controls
Security Analytics and Corrective Controls
Scalable, Comprehensive, Easy-to-use Solution
Consolidated Management and Security Tools
Intel Security
Architecture
.
Neutralize Emerging Threats
Safeguard Vital Data Optimize Security Operations
Fortify Critical Environments
Intel Security: Capability Offerings
Endpoint
Protection
Network
Security
Data
Security
Web
Security
Security
Management
Endpoint
Detection &
Response
Server
Security
Threat
Sandboxing
Security
Services
Threat
Intelligence
.
McAfee Public Cloud Server Security Suite
Secure AWS EC2 Workloads
.
Visibility into Cloud Infrastructure
• Gain insights of cloud
infrastructure
• Manage cloud and on-
premises security needs from
one console
• Identify and respond to
security issues
• Save time with automated
workflows
• AWS hierarchy of systems are
logically grouped under region
.
#1 Workload Discovery
.
#2 Security Posture Assessment
.
#3 Firewall Audit & Hardening
.
#4 Traffic Visibility & Threat Insights
.
Comprehensive Host-Based Security Controls
DevOps-friendly deployment
INTEGRITY
MONITORING
ENCRYPTION
MANAGEMENT
APPLICATION
WHITELISTING
INTRUSION
PREVENTION
HOST
FIREWALL
ANTI
MALWARE
THREAT
INTELLIGENCE
EXCHANGE
For Windows and Linux
.
Reduce Operational Overhead in Orchestrated Environment
Dynamic Application Whitelisting
Locked down with
Whitelisting
Whitelist automatically
updated
Trusted
Processes
Trusted
Directories
Trusted
Certificates
Trusted
Users
RA
M
Rated #1 capability in
ASD Top 4 Mitigation
Strategies
.
Auto-scaling security for public cloud
Autoscale Demonstration
.
Intel Security on AWS Marketplace
https://aws.amazon.com/marketplace
Flexible Licensing
Models
• $ per hr
• BYOL
.
Defense Against The
Unknown
Defending against APTs
.
Traditional Endpoint Protection Approaches
Blacklisting
Known bad files
Anti-virus technology
Intelligence is global
Daily updates
Whitelisting
Known good files
Application whitelisting
Intelligence is manual
Ad-hoc updates
What about
everything else?
.
Advanced Reputation-Based Inspection
Unknown
Author? Suspicious
attributes?
Global, local, 3rd
party knowledge?
Connected
countermeasures?
Endpoint, Network,
Gateway, Cloud
McAfee or
3rd Party
Connected
countermeasures?
Known Bad Known Good
File Is
New
Packed
Suspiciously
Low
Prevalence
!
.
McAfee
TIE Endpoint
Module
McAfee
TIE Endpoint
Module
McAfee
ATD
McAfee
Web Gateway
Enhanced Protection for Workloads
Data
Exchange
Layer
McAfee
Global Threat
Intelligence
3rd Party
Solutions
McAfee
TIE Server
 File age hidden
 Signed with a
revoked certificate
 Created by an untrusted
process
Trust Level: Low
Action: Block
Threat Intelligence Exchange (TIE)
.
McAfee
ESM
McAfee
TIE Endpoint
Module
McAfee
TIE Endpoint
Module
McAfee
ePO
Advanced Threat Defense
Data
Exchange
Layer
McAfee
MOVE
McAfee
Application
Control
McAfee
DLP Endpoint
McAfee
Global Threat
Intelligence
Unknown files are sent
to ATD for static and
dynamic analysis
Updated file
information is shared
instantly to all
connected solutions,
providing real-time
protection
McAfee
ATD
McAfee
Web Gateway
McAfee
NSP
3rd Party
Solutions
McAfee
TIE Server
ATD determines
file to be malicious
Other Solutions
Other Solutions
Value of TIE + ATD
.
AWS Security Analytics
Accelerate Discovery and Response
.
A challenging and stressful environment
Security’s Perfect Storm
*Source: SANS IR Survey, August 2015
Many Tools and
Limited Expertise
Masses of
Security Data
1
0
1
0
1
1
1
0
0
0
1
0
0
1
1
0
1
1
1
0
0
0
1
0
1
0
1
1
0
1
0
1
1
1
0
0
0
1
0
Time to Detect
and Respond
1
1
0
0
0
1
0
1
0
0
0
1
0
1
0
1
1
0
1
1
0!
Just how mature are security operations teams today?
Over 44% say they are immature, sharing incident response teams with IT and having limited tools.
Another 24.6% say they are still maturing, but at least they have a full SOC and expansive tools.
.
Identity Hidden Threats across Multiple Vectors
Value of Log Analysis
• Turn Security Data into Actionable Intelligence
• REDUCE Detection Time
• Identify Malware, Malicious Activity, Unauthorised behaviour, Fraud…
• Correlation and Patterns
• Behavioural Baselines and Anomalies
• Risk Correlation
• Address Agentless / Server-Less Environments
Masses of
Security Information
1
0
1
0
1
1
1
0
0
0
1
0
0
1
1
0
1
1
1
0
0
0
1
0
1
0
1
1
0
1
0
1
1
1
0
0
0
1
0
.
Real Time Advanced Analytics
Automated rule, risk/behavior, and statistical correlation
Threat Prioritization
Turns billions of “so what” events into actionable information
INTELLIGENT
Optimized threat and compliance management
Intel Security SIEM Solutions
INTEGRATED
ACTIONABLE
Comprehensive Security
Broad data collection of devices, including cloud support
Security Connected integrations to enable efficient and effective response
Active and Customizable Dashboards
Make threat investigation and response easy
High Performance Data Management Engine
Fast response to data collection, analytics, and threat analysis
Ease of Operation
Hundreds of out-of-the-box rules & reports; A unified compliance framework
!
.
Integrate with Logging Services
Amazon
CloudWatch
AWS
CloudTrail
AWS
Config
McAfee
AWS Infrastructure Log Sources
EC2 Instance Log Sources
Log Indexing Layer
Automate
Control
Enforcement
Security Event
Collection
instances
• ESM Collection Agent
• Native Capabilities – SYSLOG, SNMP…
Other…
Leveraging SIEM for AWS
.
Centralise Security Analysis – Collect at the Source
McAfee ESM
Components
AWS Service Log Sources
Private, Cloud and Hybrid Deployment Models
• ESM Management
• ESM Log Collectors
• ESM Advanced Correlation Engine
• ESM Raw Log Storage
McAfee ESM
Components
On-Premise/Private Log Sources
• ESM Management
• ESM Log Collectors
• ESM Advanced Correlation Engine
• ESM Raw Log Storage
Amazon
EC2Physical and/or Virtual
corporate data center AWS cloud
Direct Connect/VPN
.
Incident Identification, Forensics and Response
Use Cases
• Detect a slow bruteforce of a web application user account
• Identify the geo-location of the adversary and reputation of their source network
• Identify all subsequent activities carried out by that user throughout your environment
• Identify any risky or anomalous behaviour associated with that user, or the assets that
that user has interacted with
• REACT and block associated indicators such as geo-location, user, process, network…
directly from the SIEM platform
• Create watchlists (alerts) for similar behaviours
.
Summary
.
Fewer resource
constraints
Integrate, streamline, and
automate processes to
improve operational
efficiency.
Solving security’s most acute pain points
Delivering Business and Security OutcomesProblemSolution
Complexity Time Constraints
Respond
rapidly
Deliver automated
detection and
correction; operate
as a security system.
Resolve more threats
Extend beyond discrete and
siloed security. Move to a
cohesive threat lifecycle
defense; “Cloudify,” and
“mobilize” protection.
.

More Related Content

What's hot

Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloudPassage
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security ModelAlert Logic
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0Rasmi Swain
 
Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoAkash Mahajan
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSAmazon Web Services
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...www.securitysystems.best
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does ItRightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does ItRightScale
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Alert Logic
 

What's hot (20)

Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
 
SAP Cloud security overview 2.0
SAP Cloud security overview 2.0SAP Cloud security overview 2.0
SAP Cloud security overview 2.0
 
Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demo
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does ItRightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 

Similar to AWS Summit Auckland Sponsor Presentation - Intel

FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Amazon Web Services
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Amazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterMicrosoft Österreich
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAmazon Web Services
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...Amazon Web Services
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 

Similar to AWS Summit Auckland Sponsor Presentation - Intel (20)

FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Nicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security CenterNicholas DiCola | Secure your IT resources with Azure Security Center
Nicholas DiCola | Secure your IT resources with Azure Security Center
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

AWS Summit Auckland Sponsor Presentation - Intel

  • 1. . Cloud Security for AWS Preventing the Vicious Cycle of Security Failure Protecting Your Cloud from Advanced Targeted Attacks Andrew Hurren, Senior Regional Solution Architect, ANZ, Intel Security
  • 2. . 2 Data Center Client Wearables/IoT Intel’s Vision If it is smart and connected, it is best with Intel
  • 3. . • Creating differentiated and open platforms for innovation • Protecting digital identities for personal and transaction security • Delivering Security Connected at optimal TCO • Safeguarding our operations, our products and our customers Consumer Endpoint Corporate Endpoint Network Security Management/Analytics Network & Gateway Security Consumer Endpoint Corporate Endpoint Management/Analytics Intel Security Group Delivering ubiquitous security to individuals and business on all computing devices
  • 4. . The Need for Efficiency The fundamental security challenge Time Imperative Resource ConstraintsIncreasing Complexity Resolve more risk, faster and with fewer resources Growing IoT Devices, Cloud Adoption and Evolving Threats
  • 5. . Threat Defense Lifecycle Continuous, Automated, and Shared Threat Intelligence Detect – Illuminate low-threshold maneuvering through advanced intelligence and analytics. Protect – Stop pervasive attack vectors while also disrupting never-before-seen techniques and payloads. Adapt – Apply insights immediately throughout an integrated security system. Correct – Improve triage and prioritize response as part of a fluid investigation.
  • 6. Cloud Security is a Shared Responsibility https://aws.amazon.com/security/sharing-the-security-responsibility/ .
  • 7. . McAfee Management Platform On-premises security Private cloud security Public cloud security Protection and Detection Controls Security Analytics and Corrective Controls Scalable, Comprehensive, Easy-to-use Solution Consolidated Management and Security Tools Intel Security Architecture
  • 8. . Neutralize Emerging Threats Safeguard Vital Data Optimize Security Operations Fortify Critical Environments Intel Security: Capability Offerings Endpoint Protection Network Security Data Security Web Security Security Management Endpoint Detection & Response Server Security Threat Sandboxing Security Services Threat Intelligence
  • 9. . McAfee Public Cloud Server Security Suite Secure AWS EC2 Workloads
  • 10. . Visibility into Cloud Infrastructure • Gain insights of cloud infrastructure • Manage cloud and on- premises security needs from one console • Identify and respond to security issues • Save time with automated workflows • AWS hierarchy of systems are logically grouped under region
  • 12. . #2 Security Posture Assessment
  • 13. . #3 Firewall Audit & Hardening
  • 14. . #4 Traffic Visibility & Threat Insights
  • 15. . Comprehensive Host-Based Security Controls DevOps-friendly deployment INTEGRITY MONITORING ENCRYPTION MANAGEMENT APPLICATION WHITELISTING INTRUSION PREVENTION HOST FIREWALL ANTI MALWARE THREAT INTELLIGENCE EXCHANGE For Windows and Linux
  • 16. . Reduce Operational Overhead in Orchestrated Environment Dynamic Application Whitelisting Locked down with Whitelisting Whitelist automatically updated Trusted Processes Trusted Directories Trusted Certificates Trusted Users RA M Rated #1 capability in ASD Top 4 Mitigation Strategies
  • 17. . Auto-scaling security for public cloud Autoscale Demonstration
  • 18. . Intel Security on AWS Marketplace https://aws.amazon.com/marketplace Flexible Licensing Models • $ per hr • BYOL
  • 20. . Traditional Endpoint Protection Approaches Blacklisting Known bad files Anti-virus technology Intelligence is global Daily updates Whitelisting Known good files Application whitelisting Intelligence is manual Ad-hoc updates What about everything else?
  • 21. . Advanced Reputation-Based Inspection Unknown Author? Suspicious attributes? Global, local, 3rd party knowledge? Connected countermeasures? Endpoint, Network, Gateway, Cloud McAfee or 3rd Party Connected countermeasures? Known Bad Known Good File Is New Packed Suspiciously Low Prevalence !
  • 22. . McAfee TIE Endpoint Module McAfee TIE Endpoint Module McAfee ATD McAfee Web Gateway Enhanced Protection for Workloads Data Exchange Layer McAfee Global Threat Intelligence 3rd Party Solutions McAfee TIE Server  File age hidden  Signed with a revoked certificate  Created by an untrusted process Trust Level: Low Action: Block Threat Intelligence Exchange (TIE)
  • 23. . McAfee ESM McAfee TIE Endpoint Module McAfee TIE Endpoint Module McAfee ePO Advanced Threat Defense Data Exchange Layer McAfee MOVE McAfee Application Control McAfee DLP Endpoint McAfee Global Threat Intelligence Unknown files are sent to ATD for static and dynamic analysis Updated file information is shared instantly to all connected solutions, providing real-time protection McAfee ATD McAfee Web Gateway McAfee NSP 3rd Party Solutions McAfee TIE Server ATD determines file to be malicious Other Solutions Other Solutions Value of TIE + ATD
  • 24. . AWS Security Analytics Accelerate Discovery and Response
  • 25. . A challenging and stressful environment Security’s Perfect Storm *Source: SANS IR Survey, August 2015 Many Tools and Limited Expertise Masses of Security Data 1 0 1 0 1 1 1 0 0 0 1 0 0 1 1 0 1 1 1 0 0 0 1 0 1 0 1 1 0 1 0 1 1 1 0 0 0 1 0 Time to Detect and Respond 1 1 0 0 0 1 0 1 0 0 0 1 0 1 0 1 1 0 1 1 0! Just how mature are security operations teams today? Over 44% say they are immature, sharing incident response teams with IT and having limited tools. Another 24.6% say they are still maturing, but at least they have a full SOC and expansive tools.
  • 26. . Identity Hidden Threats across Multiple Vectors Value of Log Analysis • Turn Security Data into Actionable Intelligence • REDUCE Detection Time • Identify Malware, Malicious Activity, Unauthorised behaviour, Fraud… • Correlation and Patterns • Behavioural Baselines and Anomalies • Risk Correlation • Address Agentless / Server-Less Environments Masses of Security Information 1 0 1 0 1 1 1 0 0 0 1 0 0 1 1 0 1 1 1 0 0 0 1 0 1 0 1 1 0 1 0 1 1 1 0 0 0 1 0
  • 27. . Real Time Advanced Analytics Automated rule, risk/behavior, and statistical correlation Threat Prioritization Turns billions of “so what” events into actionable information INTELLIGENT Optimized threat and compliance management Intel Security SIEM Solutions INTEGRATED ACTIONABLE Comprehensive Security Broad data collection of devices, including cloud support Security Connected integrations to enable efficient and effective response Active and Customizable Dashboards Make threat investigation and response easy High Performance Data Management Engine Fast response to data collection, analytics, and threat analysis Ease of Operation Hundreds of out-of-the-box rules & reports; A unified compliance framework !
  • 28. . Integrate with Logging Services Amazon CloudWatch AWS CloudTrail AWS Config McAfee AWS Infrastructure Log Sources EC2 Instance Log Sources Log Indexing Layer Automate Control Enforcement Security Event Collection instances • ESM Collection Agent • Native Capabilities – SYSLOG, SNMP… Other… Leveraging SIEM for AWS
  • 29. . Centralise Security Analysis – Collect at the Source McAfee ESM Components AWS Service Log Sources Private, Cloud and Hybrid Deployment Models • ESM Management • ESM Log Collectors • ESM Advanced Correlation Engine • ESM Raw Log Storage McAfee ESM Components On-Premise/Private Log Sources • ESM Management • ESM Log Collectors • ESM Advanced Correlation Engine • ESM Raw Log Storage Amazon EC2Physical and/or Virtual corporate data center AWS cloud Direct Connect/VPN
  • 30. . Incident Identification, Forensics and Response Use Cases • Detect a slow bruteforce of a web application user account • Identify the geo-location of the adversary and reputation of their source network • Identify all subsequent activities carried out by that user throughout your environment • Identify any risky or anomalous behaviour associated with that user, or the assets that that user has interacted with • REACT and block associated indicators such as geo-location, user, process, network… directly from the SIEM platform • Create watchlists (alerts) for similar behaviours
  • 32. . Fewer resource constraints Integrate, streamline, and automate processes to improve operational efficiency. Solving security’s most acute pain points Delivering Business and Security OutcomesProblemSolution Complexity Time Constraints Respond rapidly Deliver automated detection and correction; operate as a security system. Resolve more threats Extend beyond discrete and siloed security. Move to a cohesive threat lifecycle defense; “Cloudify,” and “mobilize” protection.
  • 33. .