SlideShare a Scribd company logo
CONTENT ANALYSIS SYSTEM
AND
ADVANCED THREAT PROTECTION

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

1
EVOLVING LANDSCAPE
OF MODERN THREATS

TODAY’S
ADVANCED
THREAT
LANDSCAPE

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

2
ADVANCED THREAT PROTECTION
LIFECYCLE DEFENSE

STAGE 3

STAGE 1

Resolve &
Remediate
Threats
Discovered on
the Network

Block &
Enforce
All Known Threats
GLOBAL
INTELLIGENCE
NETWORK

STAGE 2
Detect &
Analyze
Unknown Threats

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

3
BUSINESS ASSURANCE TECHNOLOGY

Security and
Policy Enforcement
Center

Mobility
Empowerment
Center

Trusted
Applications
Center

Performance
Center

Resolution
Center

SG & SG-VA
Web Security Service
WebFilter
SSL Visibility
CAS, MAA, DLP
FW/IDS on X-Series

Mobile Device
Security Service

App Classification
Service
Web App Reverse
Proxy

MACH5
CacheFlow
PacketShaper

Reporter SW
Reporter Service
Intelligence Center
DeepSee Analytics
Appliance

BUSINESS ASSURANCE PLATFORM
• Open Environment for Best-of-Breed Solutions

• Threat, Web & Application Intelligence

• Proxy-Based Architecture

• Scalable Virtualization Platform

• Global Cloud Infrastructure

• Rich Security Analytics

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

4
CONTENT ANALYSIS SYSTEM
&
ADVANCED THREAT PROTECTION

What problems are we solving?
Average cost per lost data record from advanced attack is $222.
This is 27% more than cost from incidents of insider negligence
Average time to discover an advanced persistent threat is 80
days for a malicious breach
Average time to resolution is 123 days for a malicious breach

Current solutions try and solve the ATP problem via silos of
technology

Security defenses must align with each other, share
information and be adaptive
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

5
THE NEED FOR
NETWORK-CENTRIC CONTENT ANALYSIS

SANS Institute
“Utilize network-based anti-malware tools to analyze
all inbound traffic and filter out malicious content
before it arrives at the endpoint.”
Critical Controls For Effective Cyber Defense
- SANS Institute, March 2013

Network World
“So ultimately enterprise organizations need both
network and host-based advanced malware
defenses. Yeah, it's a lot of work but it's inevitable.”
Advanced Malware Protection: Network or Host?
- Network World, July 2012
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

6
CONTENT ANALYSIS SYSTEM

AntiMalware

WhiteListing

Sophos
Kaspersky
McAfee

Bit 9

Sand-Boxing
Off-Box
Local

Sand-Boxing
On-Box
& Cloud

Static Code
Analysis

On-Box
DRTR

Future

Future

Future

Norman

Content Analysis System
Expandable, Best of Breed, High Performance, Integrated Security Platform

Blue Coat Confidential
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

7
CONTENT ANALYSIS SYSTEM

Content
Analysis
System

CA-S400-A1

CAS Appliance
50 Mbps

CAS Appliance
100Mbps

CA--S400-A3

CA-S400-A4

CAS APPLIANCE

CAS SW LICENSE

Key
Components
and
Packaging

CA-S400-A2

MALWARE ANALYSIS
APPLIANCE
(Sandbox)

MALWARE ANALYSIS
NW LICENSE

LICENSE A
Single AV + Bit 9 license
(by user )

CAS Appliance CAS Appliance
500 Mbps
250 Mbps

or

LICENSE B
Dual AV + Bit 9 license
(by user )

or
MalwareAnalysis Appliance
MAA-S500-10

MalwareAnalysis Appliance
MAA-S400-10

Annual Subscription and Update Service @ 20% of HW List

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

8
CONTENT ANALYSIS SYSTEM
FLEXIBLE CHOICES

Choose Content
Analysis device

Content
Analysis
System

CA-S400-A1
CA-S400-A2
CA-S400-A3
CA-S400-A4

– 50Mbps
– 100Mbps
– 250Mbps
– 500Mbps

+
Select single or dual AV from
Kaspersky, McAfee or Sophos

Subscription
Services

Single AV + Bit 9 Whitelisting
Dual AV + Bit 9 Whitelisting

+
Select
Malware Analysis
Appliance

Malware
Analysis

Malware Analysis Appliance MAA-S400
Malware Analysis Appliance MAA-S500

Cloud & On-Box Sandboxing
Available Mid-2014
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

9
WHY SANDBOXING?
 Traditional network defenses are
great at dealing with knownthreats, terrible at dealing with
unknown-threats
 Unknown threats require dynamic
analysis (aka detonation) in the
form of a virtual machine and/or
bare-metal or emulation sandbox
 By year-end 2016, 20% of
enterprises will implement
Windows containment
mechanisms for end users
handling untrusted content and
code, up from less than 1% in
2013. Gartner
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

10
MALWARE APPLIANCE
CORE TECHNOLOGY
Hybrid Analysis
Unmatched intelligence


Emulation



IntelliVM virtualization

Behavioral Patterns
Expose targeted attacks


Detection patterns



Open source patterns



Custom patterns

Plug-in Architecture
Extend detection and processing


Interact with running malware



Click-through dialogs and installers

SandBox

IntelliVM

Software x86
emulator

Full Windows XP or
Win 7 licensed
software

Hardware emulation

Hardware virtualization

Generates numerous
low-level events –
page faults,
exceptions, etc.

Generates high-level
events – file, registry,
network, process, etc.

Emulated network
access and services

Real network access
and services

Hook-based event
introspection

KernelScout filter
driver captures lowlevel events

Add your own
patterns

Add your own patterns

Supports EXEs and
DLLs

Wide range of file
support

Portable executable
memory dumps

Extend processing
with plugins

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

11
INTELLI-VM PROFILES AND PLUG-INS
 Supports multiple profiles for AND analysis
INTELLIVM PROFILESpowerfulPLUGINS
• Windows 7 SP1 and Windows XP SP3

 Customize to closely match production environments
• Pilot patches, software rollouts, and O/S upgrades
• Test with exact application versions, browsers, add-ons, etc.

 Flexibility to detect non-traditional threats
• VM kernel and application-level event monitoring
• Supports EXE, DLL, PDF, JAR, BAT, and Office Docs “out of the box”

Extend custom processing with plugins
• Interact with malware before, during, and after execution

• Hook detection, memory dumps, click-through dialogs and installers

Exercise malware within precisely tailored virtual
environments to see its real effects on operations
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

12
BEHAVIORAL DETECTION PATTERNS

INTELLIVM PROFILES AND PLUGINS
 Generic and malware campaign specific patterns
• Trojan, spyware, worm, ransomware

 Extensive pattern library
•
•
•
•

Core patterns (incl. WebPulse info)
Create your own patterns
All matching patterns will trigger
Global and user-specific patterns

 Risk scoring
• Set by highest matched pattern
• Scores update with new patterns
• Script notification triggers for further action

Patterns can detect targeted and single-use
malware, and do not rely on signature-based
detection methodologies
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

13
MALWARE APPLIANCE
KEY FEATURES
Malware Appliance
Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance
– Automated bulk sample processing and risk scoring
– Parallel processing on up to 40 virtual machines per appliance
Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM
IntelliVMs – Replicate actual production environments including custom applications
Plugins – Interact with malware, click through installers, extend custom processing
Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining
Open Patterns – Detection criteria is never hidden; Users can add custom patterns
Powerful RESTful API – Full programmatic access for integration and automation
Pub-Sub API – Secure notifications of analysis task status and task completion
Remote management, security, and health status monitoring eases deployment

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

14
BUSINESS CASE

ProxySG+ CAS + Malware Appliance

Proxy SG

Content Analysis System
Malware Analysis Appliance

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

15
CONTENT ANALYSIS SYSTEM:
MULTI-LAYERED SECURITY
FOR KNOWN & UNKNOWN THREATS
Unencypted
& Encrypted
ProxySG
Traffic

Not From Known
Malicious
Site/Malnet

Content Analysis System

ALLOW Further
Inspection

Application
Whitelist

Not On Whitelist
Send To Malware
Signature Databases

Known Malware
BLOCK
& UPDATE

WebPulse
BLOCK
Known Malicious
Site/Malnet

On Whitelist
ALLOW
DELIVERY

Slide under revision

BlueCoat
Malware
Appliance
Sandbox

Not
Malicious
ALLOW
DELIVERY

Malicious
UPDATE &
ALERT

Malware
Signature
Databases
Not On Malware
Signature
Databases
Allow Further
Inspection

Non-BlueCoat
Sandbox

Not
Malicious
ALLOW
DELIVERY

Malicious
ALERT

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

16
BLUECOAT NETWORK EFFECT

Benefits Of BlueCoat System
- Subsequent requests/lures
are blocked before download
- Performance improvements
for CAS and Malware Appliance
as further scans are not needed.
- False positives are reduced as filtering
occurs prior to the sandbox
- Webpulse updates all BlueCoat
SWG s for improved efficiency
on ALL devices

Able to feed information TO and collect
information FROM other vendor’s devices
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

17
COMPLETE
ADVANCED THREAT PROTECTION

ProxySG+ CAS + Malware Appliance + Solera Analytics

Security Analytics
Platform

Proxy SG

Content Analysis System
Malware Analysis Appliance

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

18
ADVANCED THREAT PROTECTION SOLUTION
LIFECYCLE DEFENSE
The Blue Coat ATP solution delivers the
industry’s most comprehensive
protection through the following:
1) Lifecycle Defense: Protection that
maps to three threat stages: Realtime blocking for known threats and
malware sources (malnets);
Advanced threat analysis for
unknown threats; and Dwell time
reduction for latent threats
2) Adaptive Malware Analysis:
Dynamic APT protection that
analyzes unknown threats and
shares information with other
systems in the security infrastructure
to increase protection efficiency for
unknown and latent threats
3) Network Effect: APT information
sharing between 75M users in
15,000 organizations through a
feedback loop into the Blue Coat
Global Intelligence Network

STAGE 3

STAGE 1

Resolve &
Remediate
Threats
Discovered on
the Network

Block &
Enforce
All Known Threats
GLOBAL
INTELLIGENCE
NETWORK

STAGE 2
Detect &
Analyze
Unknown Threats

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

19
CAS

COMPLETE
ADVANCED THREAT PROTECTION

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

20
BLUE COAT
ADVANCED THREAT PROTECTION
A Complete and Integrated
Portfolio of Advanced Threat
Protection Technologies
(need to add CAS & MAA pics)
Blocking and Prevention

SSL Visibility
Blue Coat SSL
Visibility
Appliance

Sandbox
Malware Analysis
Appliance

Blue Coat ProxySG

Content Analysis System

Security Analytics Platform by Solera

Solera
Appliances

Solera Storage
Appliances

ThreatBLADES

Solera Central
Manager
Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

21
END

KEVIN FLYNN
PRODUCT MARKETING

OCTOBER, 2013

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

22

More Related Content

What's hot

Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
David Perkins
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Andy Ellis
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
Andris Soroka
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
xband
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
David Sweigert
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
Cisco Canada
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
Cisco Canada
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
Deivid Toledo
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
Sophos Benelux
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
Deivid Toledo
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations
IndicThreads
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
ClusterCba
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
Radware
 

What's hot (20)

Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWAREAttack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 
Cloud Security:Threats & Mitgations
Cloud Security:Threats & MitgationsCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 

Viewers also liked

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
Blue Coat
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus NetworkBlue Coat
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
Takeo Sakaguchi ,CISSP,CISA
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-idsecconf
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat ServicesChessBall
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
Takayoshi Takaoka
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
InvestorSymantec
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
InvestorSymantec
 

Viewers also liked (10)

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
How to master Blue Coat Proxy SG
How to master Blue Coat Proxy SGHow to master Blue Coat Proxy SG
How to master Blue Coat Proxy SG
 
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
 
Bluecoat Services
Bluecoat ServicesBluecoat Services
Bluecoat Services
 
Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1Bc threat intelligence_rev2.1
Bc threat intelligence_rev2.1
 
Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016Symantec Investor Presentation November 2016
Symantec Investor Presentation November 2016
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 

Similar to Content Analysis System and Advanced Threat Protection

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
AWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutAWS Lambda Security Inside & Out
AWS Lambda Security Inside & Out
PureSec
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surface
Avi Shulman
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)Sam Kumarsamy
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex
 
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Inman News
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
NGINX, Inc.
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
cynapspro GmbH
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
Adam Faeder
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cSam Kumarsamy
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 

Similar to Content Analysis System and Advanced Threat Protection (20)

클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
AWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutAWS Lambda Security Inside & Out
AWS Lambda Security Inside & Out
 
Serverless - minimizing the attack surface
Serverless - minimizing the attack surfaceServerless - minimizing the attack surface
Serverless - minimizing the attack surface
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt CohenEvaluating Web App, Mobile App, and API Security - Matt Cohen
Evaluating Web App, Mobile App, and API Security - Matt Cohen
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1cbcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
bcs_sb_TechPartner_SSLVisibility_Lastline_EN_v1c
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Content Analysis System and Advanced Threat Protection

  • 1. CONTENT ANALYSIS SYSTEM AND ADVANCED THREAT PROTECTION Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 1
  • 2. EVOLVING LANDSCAPE OF MODERN THREATS TODAY’S ADVANCED THREAT LANDSCAPE Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 2
  • 3. ADVANCED THREAT PROTECTION LIFECYCLE DEFENSE STAGE 3 STAGE 1 Resolve & Remediate Threats Discovered on the Network Block & Enforce All Known Threats GLOBAL INTELLIGENCE NETWORK STAGE 2 Detect & Analyze Unknown Threats Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 3
  • 4. BUSINESS ASSURANCE TECHNOLOGY Security and Policy Enforcement Center Mobility Empowerment Center Trusted Applications Center Performance Center Resolution Center SG & SG-VA Web Security Service WebFilter SSL Visibility CAS, MAA, DLP FW/IDS on X-Series Mobile Device Security Service App Classification Service Web App Reverse Proxy MACH5 CacheFlow PacketShaper Reporter SW Reporter Service Intelligence Center DeepSee Analytics Appliance BUSINESS ASSURANCE PLATFORM • Open Environment for Best-of-Breed Solutions • Threat, Web & Application Intelligence • Proxy-Based Architecture • Scalable Virtualization Platform • Global Cloud Infrastructure • Rich Security Analytics Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 4
  • 5. CONTENT ANALYSIS SYSTEM & ADVANCED THREAT PROTECTION What problems are we solving? Average cost per lost data record from advanced attack is $222. This is 27% more than cost from incidents of insider negligence Average time to discover an advanced persistent threat is 80 days for a malicious breach Average time to resolution is 123 days for a malicious breach Current solutions try and solve the ATP problem via silos of technology Security defenses must align with each other, share information and be adaptive Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 5
  • 6. THE NEED FOR NETWORK-CENTRIC CONTENT ANALYSIS SANS Institute “Utilize network-based anti-malware tools to analyze all inbound traffic and filter out malicious content before it arrives at the endpoint.” Critical Controls For Effective Cyber Defense - SANS Institute, March 2013 Network World “So ultimately enterprise organizations need both network and host-based advanced malware defenses. Yeah, it's a lot of work but it's inevitable.” Advanced Malware Protection: Network or Host? - Network World, July 2012 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 6
  • 7. CONTENT ANALYSIS SYSTEM AntiMalware WhiteListing Sophos Kaspersky McAfee Bit 9 Sand-Boxing Off-Box Local Sand-Boxing On-Box & Cloud Static Code Analysis On-Box DRTR Future Future Future Norman Content Analysis System Expandable, Best of Breed, High Performance, Integrated Security Platform Blue Coat Confidential Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 7
  • 8. CONTENT ANALYSIS SYSTEM Content Analysis System CA-S400-A1 CAS Appliance 50 Mbps CAS Appliance 100Mbps CA--S400-A3 CA-S400-A4 CAS APPLIANCE CAS SW LICENSE Key Components and Packaging CA-S400-A2 MALWARE ANALYSIS APPLIANCE (Sandbox) MALWARE ANALYSIS NW LICENSE LICENSE A Single AV + Bit 9 license (by user ) CAS Appliance CAS Appliance 500 Mbps 250 Mbps or LICENSE B Dual AV + Bit 9 license (by user ) or MalwareAnalysis Appliance MAA-S500-10 MalwareAnalysis Appliance MAA-S400-10 Annual Subscription and Update Service @ 20% of HW List Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 8
  • 9. CONTENT ANALYSIS SYSTEM FLEXIBLE CHOICES Choose Content Analysis device Content Analysis System CA-S400-A1 CA-S400-A2 CA-S400-A3 CA-S400-A4 – 50Mbps – 100Mbps – 250Mbps – 500Mbps + Select single or dual AV from Kaspersky, McAfee or Sophos Subscription Services Single AV + Bit 9 Whitelisting Dual AV + Bit 9 Whitelisting + Select Malware Analysis Appliance Malware Analysis Malware Analysis Appliance MAA-S400 Malware Analysis Appliance MAA-S500 Cloud & On-Box Sandboxing Available Mid-2014 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 9
  • 10. WHY SANDBOXING?  Traditional network defenses are great at dealing with knownthreats, terrible at dealing with unknown-threats  Unknown threats require dynamic analysis (aka detonation) in the form of a virtual machine and/or bare-metal or emulation sandbox  By year-end 2016, 20% of enterprises will implement Windows containment mechanisms for end users handling untrusted content and code, up from less than 1% in 2013. Gartner Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 10
  • 11. MALWARE APPLIANCE CORE TECHNOLOGY Hybrid Analysis Unmatched intelligence  Emulation  IntelliVM virtualization Behavioral Patterns Expose targeted attacks  Detection patterns  Open source patterns  Custom patterns Plug-in Architecture Extend detection and processing  Interact with running malware  Click-through dialogs and installers SandBox IntelliVM Software x86 emulator Full Windows XP or Win 7 licensed software Hardware emulation Hardware virtualization Generates numerous low-level events – page faults, exceptions, etc. Generates high-level events – file, registry, network, process, etc. Emulated network access and services Real network access and services Hook-based event introspection KernelScout filter driver captures lowlevel events Add your own patterns Add your own patterns Supports EXEs and DLLs Wide range of file support Portable executable memory dumps Extend processing with plugins Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 11
  • 12. INTELLI-VM PROFILES AND PLUG-INS  Supports multiple profiles for AND analysis INTELLIVM PROFILESpowerfulPLUGINS • Windows 7 SP1 and Windows XP SP3  Customize to closely match production environments • Pilot patches, software rollouts, and O/S upgrades • Test with exact application versions, browsers, add-ons, etc.  Flexibility to detect non-traditional threats • VM kernel and application-level event monitoring • Supports EXE, DLL, PDF, JAR, BAT, and Office Docs “out of the box” Extend custom processing with plugins • Interact with malware before, during, and after execution • Hook detection, memory dumps, click-through dialogs and installers Exercise malware within precisely tailored virtual environments to see its real effects on operations Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 12
  • 13. BEHAVIORAL DETECTION PATTERNS INTELLIVM PROFILES AND PLUGINS  Generic and malware campaign specific patterns • Trojan, spyware, worm, ransomware  Extensive pattern library • • • • Core patterns (incl. WebPulse info) Create your own patterns All matching patterns will trigger Global and user-specific patterns  Risk scoring • Set by highest matched pattern • Scores update with new patterns • Script notification triggers for further action Patterns can detect targeted and single-use malware, and do not rely on signature-based detection methodologies Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 13
  • 14. MALWARE APPLIANCE KEY FEATURES Malware Appliance Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance – Automated bulk sample processing and risk scoring – Parallel processing on up to 40 virtual machines per appliance Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM IntelliVMs – Replicate actual production environments including custom applications Plugins – Interact with malware, click through installers, extend custom processing Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining Open Patterns – Detection criteria is never hidden; Users can add custom patterns Powerful RESTful API – Full programmatic access for integration and automation Pub-Sub API – Secure notifications of analysis task status and task completion Remote management, security, and health status monitoring eases deployment Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 14
  • 15. BUSINESS CASE ProxySG+ CAS + Malware Appliance Proxy SG Content Analysis System Malware Analysis Appliance Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 15
  • 16. CONTENT ANALYSIS SYSTEM: MULTI-LAYERED SECURITY FOR KNOWN & UNKNOWN THREATS Unencypted & Encrypted ProxySG Traffic Not From Known Malicious Site/Malnet Content Analysis System ALLOW Further Inspection Application Whitelist Not On Whitelist Send To Malware Signature Databases Known Malware BLOCK & UPDATE WebPulse BLOCK Known Malicious Site/Malnet On Whitelist ALLOW DELIVERY Slide under revision BlueCoat Malware Appliance Sandbox Not Malicious ALLOW DELIVERY Malicious UPDATE & ALERT Malware Signature Databases Not On Malware Signature Databases Allow Further Inspection Non-BlueCoat Sandbox Not Malicious ALLOW DELIVERY Malicious ALERT Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 16
  • 17. BLUECOAT NETWORK EFFECT Benefits Of BlueCoat System - Subsequent requests/lures are blocked before download - Performance improvements for CAS and Malware Appliance as further scans are not needed. - False positives are reduced as filtering occurs prior to the sandbox - Webpulse updates all BlueCoat SWG s for improved efficiency on ALL devices Able to feed information TO and collect information FROM other vendor’s devices Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 17
  • 18. COMPLETE ADVANCED THREAT PROTECTION ProxySG+ CAS + Malware Appliance + Solera Analytics Security Analytics Platform Proxy SG Content Analysis System Malware Analysis Appliance Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 18
  • 19. ADVANCED THREAT PROTECTION SOLUTION LIFECYCLE DEFENSE The Blue Coat ATP solution delivers the industry’s most comprehensive protection through the following: 1) Lifecycle Defense: Protection that maps to three threat stages: Realtime blocking for known threats and malware sources (malnets); Advanced threat analysis for unknown threats; and Dwell time reduction for latent threats 2) Adaptive Malware Analysis: Dynamic APT protection that analyzes unknown threats and shares information with other systems in the security infrastructure to increase protection efficiency for unknown and latent threats 3) Network Effect: APT information sharing between 75M users in 15,000 organizations through a feedback loop into the Blue Coat Global Intelligence Network STAGE 3 STAGE 1 Resolve & Remediate Threats Discovered on the Network Block & Enforce All Known Threats GLOBAL INTELLIGENCE NETWORK STAGE 2 Detect & Analyze Unknown Threats Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 19
  • 20. CAS COMPLETE ADVANCED THREAT PROTECTION Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 20
  • 21. BLUE COAT ADVANCED THREAT PROTECTION A Complete and Integrated Portfolio of Advanced Threat Protection Technologies (need to add CAS & MAA pics) Blocking and Prevention SSL Visibility Blue Coat SSL Visibility Appliance Sandbox Malware Analysis Appliance Blue Coat ProxySG Content Analysis System Security Analytics Platform by Solera Solera Appliances Solera Storage Appliances ThreatBLADES Solera Central Manager Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 21
  • 22. END KEVIN FLYNN PRODUCT MARKETING OCTOBER, 2013 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 22

Editor's Notes

  1. The SANS Institute is one of the world’s most respected cyber security organizations. Their March 2013 report includes their recommendations for creating an effective cyber defense and the importance of network based anti-malware.http://www.sans.org/critical-security-controls/cag4-1.pdf --- Page 28.