SlideShare a Scribd company logo
1 of 1
Download to read offline
TRADITIONAL
BREACH DETECTION
NEXT GENERATIONVS.
>>
Query-based tools
require a knowledge
of what to look for
Labor intensive
incident response
process
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
SEARCH FOR SIGNALS
IN THE NOISE
BREACH PREVENTION WITH
COMMUNICATION BEHAVIOR ANALYTICS
106 A V E R A G E
N U M B E R O F
NOTIFICATIONS
Generated by security infrastructures per day
APPROACH
>>
Store Now,
Analyze Later
Off-line Data Analysis Wire-Speed Streaming Analytics
CRITICAL ASSET
"Data lakes" quickly become "data swamps." Traditional security
infrastructure generates millions of alerts, without context.
MISSING VISIBILITY INTO
TYPICAL BEHAVIORS
OF CRITICAL ASSETS
OVER TIME
FORENSIC ANALYSIS BEHAVIORAL TRIPWIRE
Reporting on correlations and signature
matches does not indicate who is
behaving badly and what assets
are compromised.
Behaviors evaluated in real time to
effectively lock-down assets and stop
workarounds. Ability to “look back” over
time to identify periodicity.
HIGH
BELATED PROACTIVE
False Positives
DIFFICULT Prioritize Alerts Manually
Breach Awareness
ZERO
550 S Winchester Blvd., Suite 300
San Jose, CA 95128
info@sidebandnetworks.com
Devices, Users
and Nodes
Critical Data
Assets
East-West Network Communications
P E R
D A Y
A t t h e f r o n t l i n e t o g e n e r a t e
POSITIVE MAN-IN-THE-MIDDLE
P E R F O R M I N G A N A L Y T I C S
5 ALERTS
DATA
Data
Correlation
Noise
Features
Machine Learning
Signal
By looking at what matters the most – your keys to the
kingdom, we naturally reduce noise.
N E A R
Level of false positives alerts
Profiling & DetectionAUTOMATIC
Threat identification
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
RECEIVE PREMIUM
CONTEXTUAL ALERTS
R E S U L T I N G LOST IN ALL
THE NOISE.
COMPROMISED ENTITY ACTS BADLY
SIGNALS
WITH NO BEHAVIORAL CONTEXT
CONTEXT
AWARE!!
COMMUNICATION ANALYTICS
D E T E C T S B A D B E H AV I O R
W I T H I N S E C O N D S
TO STOPL O S S O F C R I T I C A L D A T A
C a t c h bad actors b e f o r e a b r e a c h !
FOCUSIMPACT
S O U R C E S
S i d e b a n d N e t w o r k s L a b Te s t R e s u l t s

More Related Content

Viewers also liked

John_Easton-resume
John_Easton-resumeJohn_Easton-resume
John_Easton-resume
unhr
 

Viewers also liked (20)

Actividad 4 - Radiopropagacion
Actividad 4 - RadiopropagacionActividad 4 - Radiopropagacion
Actividad 4 - Radiopropagacion
 
Linea del tiempo
Linea del tiempoLinea del tiempo
Linea del tiempo
 
Dr.motley lor 4 me
Dr.motley lor 4 meDr.motley lor 4 me
Dr.motley lor 4 me
 
John_Easton-resume
John_Easton-resumeJohn_Easton-resume
John_Easton-resume
 
Training and Enrichment: Designing and Implementing A Four-Year Developmental...
Training and Enrichment: Designing and Implementing A Four-Year Developmental...Training and Enrichment: Designing and Implementing A Four-Year Developmental...
Training and Enrichment: Designing and Implementing A Four-Year Developmental...
 
Gebrauchte Schuhe aus Deutschland
Gebrauchte Schuhe aus DeutschlandGebrauchte Schuhe aus Deutschland
Gebrauchte Schuhe aus Deutschland
 
ExpoPrint2014 infographic
ExpoPrint2014 infographicExpoPrint2014 infographic
ExpoPrint2014 infographic
 
Plano de Negócio Polishop
Plano de Negócio Polishop Plano de Negócio Polishop
Plano de Negócio Polishop
 
Logo pmi pole savoie
Logo pmi pole savoieLogo pmi pole savoie
Logo pmi pole savoie
 
sarah recom
sarah recomsarah recom
sarah recom
 
Presentatio333
Presentatio333Presentatio333
Presentatio333
 
Cooper Law Partners
Cooper Law Partners	Cooper Law Partners
Cooper Law Partners
 
República bolivariana de venezuela
República bolivariana de venezuelaRepública bolivariana de venezuela
República bolivariana de venezuela
 
resume2016
resume2016resume2016
resume2016
 
Como recuperar espacio de tu disco duro
Como recuperar espacio de tu disco duroComo recuperar espacio de tu disco duro
Como recuperar espacio de tu disco duro
 
A Conversation About the WordPress JSON REST API
A Conversation About the WordPress JSON REST APIA Conversation About the WordPress JSON REST API
A Conversation About the WordPress JSON REST API
 
HM1 WD MODIFIED FOOD SAFETY
HM1 WD MODIFIED FOOD SAFETYHM1 WD MODIFIED FOOD SAFETY
HM1 WD MODIFIED FOOD SAFETY
 
Farmacopea fitofarmacos 1
Farmacopea fitofarmacos 1Farmacopea fitofarmacos 1
Farmacopea fitofarmacos 1
 
Metrología (1)
Metrología (1)Metrología (1)
Metrología (1)
 
Trends: Loreal - Maybelline - Revlon.
Trends: Loreal - Maybelline - Revlon.Trends: Loreal - Maybelline - Revlon.
Trends: Loreal - Maybelline - Revlon.
 

Similar to Infographic_v5

Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
University of Hertfordshire
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Mehrdad Jingoism
 

Similar to Infographic_v5 (20)

Cyber Portents and Precursors
Cyber Portents and PrecursorsCyber Portents and Precursors
Cyber Portents and Precursors
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren'tLa Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren't
 
Unravelling The World of Viruses.pdf
Unravelling The World of Viruses.pdfUnravelling The World of Viruses.pdf
Unravelling The World of Viruses.pdf
 
Anonymity
AnonymityAnonymity
Anonymity
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
 
Securing The Neighbourhood
Securing The NeighbourhoodSecuring The Neighbourhood
Securing The Neighbourhood
 
Malware Most Wanted: Security Ecosystem
Malware Most Wanted: Security EcosystemMalware Most Wanted: Security Ecosystem
Malware Most Wanted: Security Ecosystem
 

Infographic_v5

  • 1. TRADITIONAL BREACH DETECTION NEXT GENERATIONVS. >> Query-based tools require a knowledge of what to look for Labor intensive incident response process • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • SEARCH FOR SIGNALS IN THE NOISE BREACH PREVENTION WITH COMMUNICATION BEHAVIOR ANALYTICS 106 A V E R A G E N U M B E R O F NOTIFICATIONS Generated by security infrastructures per day APPROACH >> Store Now, Analyze Later Off-line Data Analysis Wire-Speed Streaming Analytics CRITICAL ASSET "Data lakes" quickly become "data swamps." Traditional security infrastructure generates millions of alerts, without context. MISSING VISIBILITY INTO TYPICAL BEHAVIORS OF CRITICAL ASSETS OVER TIME FORENSIC ANALYSIS BEHAVIORAL TRIPWIRE Reporting on correlations and signature matches does not indicate who is behaving badly and what assets are compromised. Behaviors evaluated in real time to effectively lock-down assets and stop workarounds. Ability to “look back” over time to identify periodicity. HIGH BELATED PROACTIVE False Positives DIFFICULT Prioritize Alerts Manually Breach Awareness ZERO 550 S Winchester Blvd., Suite 300 San Jose, CA 95128 info@sidebandnetworks.com Devices, Users and Nodes Critical Data Assets East-West Network Communications P E R D A Y A t t h e f r o n t l i n e t o g e n e r a t e POSITIVE MAN-IN-THE-MIDDLE P E R F O R M I N G A N A L Y T I C S 5 ALERTS DATA Data Correlation Noise Features Machine Learning Signal By looking at what matters the most – your keys to the kingdom, we naturally reduce noise. N E A R Level of false positives alerts Profiling & DetectionAUTOMATIC Threat identification • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • RECEIVE PREMIUM CONTEXTUAL ALERTS R E S U L T I N G LOST IN ALL THE NOISE. COMPROMISED ENTITY ACTS BADLY SIGNALS WITH NO BEHAVIORAL CONTEXT CONTEXT AWARE!! COMMUNICATION ANALYTICS D E T E C T S B A D B E H AV I O R W I T H I N S E C O N D S TO STOPL O S S O F C R I T I C A L D A T A C a t c h bad actors b e f o r e a b r e a c h ! FOCUSIMPACT S O U R C E S S i d e b a n d N e t w o r k s L a b Te s t R e s u l t s