C y b e r S e c u r i t y
Detection & Response
P r e s e n t e d B y
S . M . M u s t o f a K a u s e r
N e t w o r k S e c u r i t y E n g i n e e r
Top 15 Cybersecurity Threats
Types of threat Detection and response tools
Detection & Response Types
What is
Network Detection &
Response?
NDR solutions support rapid
investigation, internal visibility,
intelligent response, and enhanced
threat detection across on-
premises, cloud, and hybrid
environments. Detecting attacks at
the network layer works so well
because it's extremely difficult for
threat actors to hide their activity.
How NDR Works
Why NDR is Important?
Network Landscape is Changing
INTERNET
INTERNET
(WAN)
PUBLIC
SaaS
PRIVATE
More
Users
More
Devices
More
Consolidations
Everyone & Everything
Anywhere
Connected device
per person by 2025 1
Mobile devices
worldwide by 2025 2
Increased adoption
in datacenter
Workforce working
remotely in US 3
9.27
18.2B
100GbE
58%
Network Landscape is Changing
INTERNET
INTERNET
(WAN)
PUBLIC
SaaS
PRIVATE
More
Users
More
Devices
More
Consolidations
Everyone & Everything
Anywhere
Connected device
per person by 2025 1
Mobile devices
worldwide by 2025 2
Increased adoption
in datacenter
Hybrid working
model 3
9.27
18.2B
100GbE
33%
Network Landscape is Changing
INTERNET
INTERNET
(WAN)
PUBLIC
SaaS
PRIVATE Resiliency
(Continuous operation)
Scalability &
Performance
(more connections)
Flexibility
(Access from anywhere)
Visibility
(fragmented)
Network Team
Persistent Threats
(Continuous operation)
Expanded Attack
Surface
(more connections)
Access Control
(Access from anywhere)
Visibility
(fragmented)
Security Team
Ecosystem
Integration
Managed
Services
Email
Security
Endpoint
Security
Workload
Security
Cloud
Security
Network
Security
Orchestration & Automation
Zero Trust
Architecture
Extended Detection and Response (XDR)
User &
Identity
Endpoints
&
Servers
Emai
l
Cloud
Infra
Applications Code
Repo
Data Network 5G ICS/OT
Attack Surface Intelligence | Zero Day Initiative | Threat Research | AI/ML | Big Data Analytics
Global Threat Intelligence
Multi-tenancy | Role-based Access Control | Single Sign-On | Policy Decision Point
Platform Foundations
Network Security
Value Proposition of Network Security
Pillars Business Value Description Supported Products
Risk
mitigation
(prioritization)
Identify and mitigate risks more
efficiently with network controls
The more data in your data lake, the more optimized
your risk assessment Vison One (ASRM), XDR for Networks, ZTSA
Automation
(response)
Simplify your network and security
operational activities
Break the silos and bring these teams together via
common tools or automated response process Vision One (playbook), XDR for Networks
Visibility
(detection)
Get greater threat visibility by
extending into ecosystem controls
Correlate your network telemetry with others
(endpoint, cloud, 3rd
party, etc.) to get a better view of
your overall attack surface
Vision One (XDR), XDR for Networks
Discover hidden threats with
network controls
Fill the blind spots of your attack surface which others
miss
XDR for Networks, TippingPoint, ZTSA
Security
(protection)
Streamline regulatory compliance
Close your compliance gaps by finding cases of
employee misuse, addressing vulnerabilities from
human error or malicious insiders
XDR for Networks, TippingPoint, ZTSA, DDI
Keep pace with the security of your
high-performance network
Dealing with the security of your high-performance
data center, no problem! TippingPoint IDPS
Secure your network infrastructure
Protect everything and everyone in your remote,
campus, branch, edge and cloud network
TippingPoint, DDI, SWG, CASB, ZTNA,
Sandboxing
Foundation Keep your network and business up
Whether using a bypass technology or reduce MTTD
& MTTR, we make sure that your business is not get
disrupted
TippingPoint, DDI, XDR for Networks
Safe Malicious
files blocked
Network Content Correlation
Behavioral Analysis
Lateral Movement Detection
Custom Sandbox Analysis
Network Content Inspection
Intrusion Prevention (IPS)
Early Zero-Day Protection
Web Filtering & URL Reputation
Machine Learning
Network Security Goal – Optimize Risk Reduction
Not sure about
this slide
Some Forrester WAVE
Leader Products (Q2 2024):
- Ranked highest overall for product
offering.
- “Differentiated” from competition in
7 out of the 10 individual evaluation
categories.
- First Wave exclusive to XDR (and the
first of the main industry analyst firms
to have an XDR vendor evaluation)
Thanks
F o r Y o u r T i m e
Q & A

Detection & Response for Network Security.pptx

  • 1.
    C y be r S e c u r i t y Detection & Response P r e s e n t e d B y S . M . M u s t o f a K a u s e r N e t w o r k S e c u r i t y E n g i n e e r
  • 2.
  • 3.
    Types of threatDetection and response tools
  • 4.
  • 5.
    What is Network Detection& Response? NDR solutions support rapid investigation, internal visibility, intelligent response, and enhanced threat detection across on- premises, cloud, and hybrid environments. Detecting attacks at the network layer works so well because it's extremely difficult for threat actors to hide their activity.
  • 6.
  • 7.
    Why NDR isImportant?
  • 8.
    Network Landscape isChanging INTERNET INTERNET (WAN) PUBLIC SaaS PRIVATE More Users More Devices More Consolidations Everyone & Everything Anywhere Connected device per person by 2025 1 Mobile devices worldwide by 2025 2 Increased adoption in datacenter Workforce working remotely in US 3 9.27 18.2B 100GbE 58%
  • 9.
    Network Landscape isChanging INTERNET INTERNET (WAN) PUBLIC SaaS PRIVATE More Users More Devices More Consolidations Everyone & Everything Anywhere Connected device per person by 2025 1 Mobile devices worldwide by 2025 2 Increased adoption in datacenter Hybrid working model 3 9.27 18.2B 100GbE 33%
  • 10.
    Network Landscape isChanging INTERNET INTERNET (WAN) PUBLIC SaaS PRIVATE Resiliency (Continuous operation) Scalability & Performance (more connections) Flexibility (Access from anywhere) Visibility (fragmented) Network Team Persistent Threats (Continuous operation) Expanded Attack Surface (more connections) Access Control (Access from anywhere) Visibility (fragmented) Security Team
  • 11.
    Ecosystem Integration Managed Services Email Security Endpoint Security Workload Security Cloud Security Network Security Orchestration & Automation ZeroTrust Architecture Extended Detection and Response (XDR) User & Identity Endpoints & Servers Emai l Cloud Infra Applications Code Repo Data Network 5G ICS/OT Attack Surface Intelligence | Zero Day Initiative | Threat Research | AI/ML | Big Data Analytics Global Threat Intelligence Multi-tenancy | Role-based Access Control | Single Sign-On | Policy Decision Point Platform Foundations Network Security
  • 12.
    Value Proposition ofNetwork Security Pillars Business Value Description Supported Products Risk mitigation (prioritization) Identify and mitigate risks more efficiently with network controls The more data in your data lake, the more optimized your risk assessment Vison One (ASRM), XDR for Networks, ZTSA Automation (response) Simplify your network and security operational activities Break the silos and bring these teams together via common tools or automated response process Vision One (playbook), XDR for Networks Visibility (detection) Get greater threat visibility by extending into ecosystem controls Correlate your network telemetry with others (endpoint, cloud, 3rd party, etc.) to get a better view of your overall attack surface Vision One (XDR), XDR for Networks Discover hidden threats with network controls Fill the blind spots of your attack surface which others miss XDR for Networks, TippingPoint, ZTSA Security (protection) Streamline regulatory compliance Close your compliance gaps by finding cases of employee misuse, addressing vulnerabilities from human error or malicious insiders XDR for Networks, TippingPoint, ZTSA, DDI Keep pace with the security of your high-performance network Dealing with the security of your high-performance data center, no problem! TippingPoint IDPS Secure your network infrastructure Protect everything and everyone in your remote, campus, branch, edge and cloud network TippingPoint, DDI, SWG, CASB, ZTNA, Sandboxing Foundation Keep your network and business up Whether using a bypass technology or reduce MTTD & MTTR, we make sure that your business is not get disrupted TippingPoint, DDI, XDR for Networks
  • 13.
    Safe Malicious files blocked NetworkContent Correlation Behavioral Analysis Lateral Movement Detection Custom Sandbox Analysis Network Content Inspection Intrusion Prevention (IPS) Early Zero-Day Protection Web Filtering & URL Reputation Machine Learning Network Security Goal – Optimize Risk Reduction Not sure about this slide
  • 14.
    Some Forrester WAVE LeaderProducts (Q2 2024): - Ranked highest overall for product offering. - “Differentiated” from competition in 7 out of the 10 individual evaluation categories. - First Wave exclusive to XDR (and the first of the main industry analyst firms to have an XDR vendor evaluation)
  • 15.
    Thanks F o rY o u r T i m e Q & A