Presentación del fundador y CTO de Palo Alto Networks, Nir Zuk, sobre las amenazas de seguridad actuales, como ha evolucionado el ciberterrorismo, y las formas de controlarlo con el FW de Nueva Generación de Palo Alto Networks.
36. need
to
protect
at
all
stages
back
bait
exploit
download
steal
channel
37. bait
protec>on
•
Block
unneeded
applica>ons
•
Control
file
transfers
by
user,
applica>on,
and
file
type
•
Block
access
to
Malware
URLs
38. exploit
protec>on
•
Discover
vulnerabili>es
before
the
bad
guys
•
IPS
signature
for
newly
iden>fied
vulnerabili>es
39. discovering
MicrosoN
vulnerabili>es
Palo
Alto
Tipping
Check
Point
Juniper
&
McAfee
Sourcefire
Networks
Point
So9ware
Cisco
20
7
7
3
1
0
number
of
vulnerability
discoveries
credited
to
each
vendor
over
the
last
4
years
Source:
OSVDB;
as
of
June
15th
2011
40. discovering
Adobe
Flash
vulnerabili>es
Palo
Alto
Tipping
Check
Point
Juniper
&
McAfee
Sourcefire
Networks
Point
So9ware
Cisco
12
1
1
0
0
0
number
of
vulnerability
discoveries
credited
to
each
vendor
over
the
last
4
years
Source:
OSVDB;
as
of
June
15th
2011
41. download
protec>on
• An>-‐Malware
signatures
available
to
the
en>re
par>cipant
base
within
one
hour
of
first
discovery
• Generic
drive-‐by-‐download
protec>on
for
HTTP/S
downloads
42. back-‐channel
protec>on
• Block
unknown
applica>on
traffic
• Use
heuris>cs
to
detect
back
channel
communica>on
• C&C
signatures
available
for
newly
discovered
malware