SlideShare a Scribd company logo
1 | © 2013 Infoblox Inc. All Rights Reserved.1 | © 2016 Infoblox Inc. All Rights Reserved.
Infoblox Threat Intelligence Webinar
Sam Kumarsamy and Jon Abbe | March 23, 2017
2 | © 2013 Infoblox Inc. All Rights Reserved.2 | © 2016 Infoblox Inc. All Rights Reserved.
Agenda
• Infoblox ActiveTrust
• Optimizing Threat Intel
• Security Challenges
• Next Steps
3 | © 2013 Infoblox Inc. All Rights Reserved.3 | © 2016 Infoblox Inc. All Rights Reserved.
Cyber Threats
The industry is witnessing a paradigm
shift:
• Increase in digital economy
• Increase of digital channels
This translates into higher risks of cyber
threats and attacks.
60% Compound Annual Growth in
Cyber crimes, despite of increased
spend in security solutions and
products
Source: PwC Global State of Information Security Survey 2015 &
2016
4 | © 2013 Infoblox Inc. All Rights Reserved.4 | © 2016 Infoblox Inc. All Rights Reserved.
Today’s Security Landscape
400+
VENDORS
5 | © 2013 Infoblox Inc. All Rights Reserved.5 | © 2016 Infoblox Inc. All Rights Reserved.
The Disconnect..
Security You Often GetSecurity You Want
6 | © 2013 Infoblox Inc. All Rights Reserved.6 | © 2016 Infoblox Inc. All Rights Reserved.
Leads to Ineffective Threat Intelligence
1. Source: Ponemon Institute, 2015 Second Annual Study on Exchange Cyber Threat Intelligence: There Has to Be a Better Way
Poor incident
response and
manual processes
70% 46% 45%
% of survey respondents
unable to prioritize the
threat by category1
% of survey respondents
lacked context for threat intel to
make it actionable1
of survey respondents
that felt Threat Intel is
not timely1
Lack of prioritization and context slows
remediation
Siloed Threat Intelligence impacts effectiveness &
trust
7 | © 2013 Infoblox Inc. All Rights Reserved.7 | © 2016 Infoblox Inc. All Rights Reserved.
Gartner’s View on Silos
Silos between network, edge, endpoint and
data security systems and processes can
restrict an organization’s ability to prevent,
detect and respond to advanced attacks.
Best Practices for Detecting and Mitigating
Advanced Threats, 2016 Update 29 March 2016
8 | © 2013 Infoblox Inc. All Rights Reserved.8 | © 2016 Infoblox Inc. All Rights Reserved.
Enforce policy using timely, consolidated & high quality
threat intelligence data
Improve incident response with consolidate threat
intelligence from multiple sources
Eliminate silos and accelerate remediation by centralizing
threat intelligence and sharing DNS IoCs with security
ecosystem
Investigate threats faster to free up security personnel
Timely access to context for threat indicators
Prioritize with network context
Optimize Your Threat Intelligence Operations with
Threat Intelligence Data Exchange (TIDE)
Threat Intelligence
Optimization
9 | © 2013 Infoblox Inc. All Rights Reserved.9 | © 2016 Infoblox Inc. All Rights Reserved.
High Quality Threat Intelligence Data
• Timely
• Reliable
• Accurate
• Contextual
• Easy-to-use
10 | © 2013 Infoblox Inc. All Rights Reserved.10 | © 2016 Infoblox Inc. All Rights Reserved.
Marketplace Data
• Single vendor
management
• Normalized content
11 | © 2013 Infoblox Inc. All Rights Reserved.11 | © 2016 Infoblox Inc. All Rights Reserved.
RBL Zone File
Deploying Threat Intel Across Your Security Infrastructure
Infoblox
Marketplace
Custom TI
Single-source of TI management Faster triage Threat PrioritizationRESULT:
C2 IP List
Spambot IPs
C2 & Malware
Host/Domain
CSV File
JSON
Phishing &
Malware URLs
RPZ
WWW
DNS
SIEM
TIDE
Define Data
Policy,
Governance &
Translation
Dossier
Investigate
Threats
12 | © 2013 Infoblox Inc. All Rights Reserved.12 | © 2016 Infoblox Inc. All Rights Reserved.
TIDE is bundled with ActiveTrust®
Proactively protect users against cyberattacks
Early detection and
prevention of
malicious
communications
Ecosystem
integrations
Rapid threat
investigation through
Infoblox Dossier
Threat Intelligence
Data Exchange
(TIDE)
Data exfiltration
detection and
prevention
Proactively Contain
Malware and Stop Data
Exfiltration using DNS
Collect and distribute threat Intel and
hasten threat investigation
Improved Visibility
and Context
13 | © 2013 Infoblox Inc. All Rights Reserved.13 | © 2016 Infoblox Inc. All Rights Reserved.
ActiveTrust Standard ActiveTrust Plus ActiveTrust Advanced
Annual Subscription
Licensed By
Appliance by model Organization by
protected user
Organization by protected user
Zones (RPZs) – Infoblox
Infrastructure only
Standard (4) Standard (4) + Advanced
(5) + SURBL (2)
Standard (4) + Advanced (5) +
SURBL (2)
Infoblox Data via TIDE –
Third party infrastructure
No ONE of
 Hostnames or
 IP Addresses or
 URLs
ALL of
 Hostnames
 IP Addresses
 URLs
Dossier No (Cloud Services Portal
with threat lookup only)
32,000 queries/year 65,000 queries/year
ActiveTrust Tiers
14 | © 2013 Infoblox Inc. All Rights Reserved.14 | © 2016 Infoblox Inc. All Rights Reserved.
Next Steps
Path to Engagement
• Learn more go to: ActiveTrust
Product Page
• Try Our Product – Free of
Cost & Risk
• ActiveTrust eval
• Download ActiveTrust Plus or
Advanced only to evaluate
TIDE
• For additional information
engage with your Infoblox
Account Manager
15 | © 2013 Infoblox Inc. All Rights Reserved.15 | © 2016 Infoblox Inc. All Rights Reserved.
Q&A
16 | © 2013 Infoblox Inc. All Rights Reserved.16 | © 2016 Infoblox Inc. All Rights Reserved.
Thank You
18 | © 2013 Infoblox Inc. All Rights Reserved.18 | © 2016 Infoblox Inc. All Rights Reserved.
Infoblox ActiveTrust Standard – data sets
• Base – known malicious threats that are dangerous as destinations
• Malware – can take action/control of a system
• Ransomware – restricts access to system it infects and demands ransom be paid
for restriction to be removed
• Bogon – Bogon IPs are commonly found as source addresses of DDoS attacks,
have no legitimate use, and usually result of accidental or malicious
misconfiguration
19 | © 2013 Infoblox Inc. All Rights Reserved.19 | © 2016 Infoblox Inc. All Rights Reserved.
Infoblox ActiveTrust Plus and Advanced –
additional data sets
• Malware - malicious or compromised IPs known to host threats that can take action on or control of system (e.g., malware
C&C, malware download, and active phishing sites)
• Bots - self-propagating malware designed to infect a host and connect it back to C&C/botnet
• Exploit Kit - distributable packs that contain malicious programs used to execute "drive-by download" attacks in order to
infect users with malware; target vulnerabilities in user’s machine (usually due to unpatched versions of Java, Adobe
Reader, Adobe Flash, IE, etc.) to load malware onto victim’s system
• Malware DGA – DGAs seen in various families of malware used to periodically generate large number of domain names
that can be used as rendezvous points with their C&C servers; examples (Ramnit, Conficker, and Banjori)
• TOR Exit Node – block entry/gateways to the TOR network (darknet) because many company network/security admins
believe these gateways (exit nodes) represents a risk worthy of blocking because of criminal activity associated with darknet
and since criminals have started using Tor as a malware C&C channel
• SURBL – see details on next slide
20 | © 2013 Infoblox Inc. All Rights Reserved.20 | © 2016 Infoblox Inc. All Rights Reserved.
SURBL (partner) Threat Intelligence Feed
• Infoblox and SURBL data complementary and when used together, can
enable increased threat coverage
• SURBL data
̶ Multi domains - blacklist of roughly 800k+ malicious domains including up-to-
date intelligence on active malware, phishing, botnet, and spam domains
̶ Fresh domains - Newly Observed Domains (NOD); provides critical, accurate,
information on the time new domains are placed into service
• SURBL OEM license bundled with Infoblox ActiveTrust Plus and
ActiveTrust Advanced products for usage by Infoblox DNS Firewall (RPZ)
• SURBL Enterprise license available on Infoblox 3rd Party Threat Indicator
Feed Data Marketplace

More Related Content

What's hot

Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
Radware
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
TicTac Data Recovery
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
Kaspersky
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Jason Trost
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Fidelis Cybersecurity
 
WhyNormShield
WhyNormShieldWhyNormShield
WhyNormShield
Candan BOLUKBAS
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
Cybersecurity Education and Research Centre
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
Martin Opsahl
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
Fidelis Cybersecurity
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
FireEye, Inc.
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
ClearDATACloud
 

What's hot (20)

Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar The Threat Landscape in the Era of Directed Attacks - Webinar
The Threat Landscape in the Era of Directed Attacks - Webinar
 
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
Lessons Learned from Building and Running MHN, the World's Largest Crowdsourc...
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
WhyNormShield
WhyNormShieldWhyNormShield
WhyNormShield
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 

Viewers also liked

Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
Srikrupa Srivatsan
 
Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017
APL - Administração do Porto de Lisboa
 
Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017
Vincent Laberge
 
C All 2008 7 26
C All 2008 7 26C All 2008 7 26
C All 2008 7 26
Donna Davidson
 
Lil bibby
Lil bibbyLil bibby
Lil bibby
Kroy Create
 
Pierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV ConferencePierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV Conference
Robert Huyck
 
Do work
Do workDo work
Do work
Shasi Panda
 
N2W Partnership overview
N2W Partnership overviewN2W Partnership overview
N2W Partnership overview
Tara Jones
 
Sosiale media vir klein sake
Sosiale media vir klein sakeSosiale media vir klein sake
Sosiale media vir klein sake
Chris Vermeulen
 
Alzheimer 03-2017
Alzheimer 03-2017Alzheimer 03-2017
B2B Marketing Disruption
B2B Marketing DisruptionB2B Marketing Disruption
B2B Marketing Disruption
George Giles
 
Ecopol tech portfolio construction polymers
Ecopol tech portfolio construction polymersEcopol tech portfolio construction polymers
Ecopol tech portfolio construction polymers
Pau Rocas, PhD
 
Newington
NewingtonNewington
Newington
Jared Clegg
 
Ecopol tech portfolio fabric coatings
Ecopol tech portfolio fabric coatingsEcopol tech portfolio fabric coatings
Ecopol tech portfolio fabric coatings
Pau Rocas, PhD
 
Research about the sustainable model and religious practices of Sustainable E...
Research about the sustainable model and religious practices of Sustainable E...Research about the sustainable model and religious practices of Sustainable E...
Research about the sustainable model and religious practices of Sustainable E...
Andy Lai
 
Boletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
Boletín audiovisuais marzo_2017. Biblioteca Provincial da CoruñaBoletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
Boletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
Bibliotecadicoruna
 

Viewers also liked (16)

Infoblox Secure DNS Solution
Infoblox Secure DNS SolutionInfoblox Secure DNS Solution
Infoblox Secure DNS Solution
 
Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017Carta Náutica do Porto de Lisboa - março de 2017
Carta Náutica do Porto de Lisboa - março de 2017
 
Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017Vincent Laberge colloque EDUlib 2017
Vincent Laberge colloque EDUlib 2017
 
C All 2008 7 26
C All 2008 7 26C All 2008 7 26
C All 2008 7 26
 
Lil bibby
Lil bibbyLil bibby
Lil bibby
 
Pierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV ConferencePierce Transit White Paper Summary for 25th ESV Conference
Pierce Transit White Paper Summary for 25th ESV Conference
 
Do work
Do workDo work
Do work
 
N2W Partnership overview
N2W Partnership overviewN2W Partnership overview
N2W Partnership overview
 
Sosiale media vir klein sake
Sosiale media vir klein sakeSosiale media vir klein sake
Sosiale media vir klein sake
 
Alzheimer 03-2017
Alzheimer 03-2017Alzheimer 03-2017
Alzheimer 03-2017
 
B2B Marketing Disruption
B2B Marketing DisruptionB2B Marketing Disruption
B2B Marketing Disruption
 
Ecopol tech portfolio construction polymers
Ecopol tech portfolio construction polymersEcopol tech portfolio construction polymers
Ecopol tech portfolio construction polymers
 
Newington
NewingtonNewington
Newington
 
Ecopol tech portfolio fabric coatings
Ecopol tech portfolio fabric coatingsEcopol tech portfolio fabric coatings
Ecopol tech portfolio fabric coatings
 
Research about the sustainable model and religious practices of Sustainable E...
Research about the sustainable model and religious practices of Sustainable E...Research about the sustainable model and religious practices of Sustainable E...
Research about the sustainable model and religious practices of Sustainable E...
 
Boletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
Boletín audiovisuais marzo_2017. Biblioteca Provincial da CoruñaBoletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
Boletín audiovisuais marzo_2017. Biblioteca Provincial da Coruña
 

Similar to Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updated
Denim Group
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Network security
Network securityNetwork security
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PROIDEA
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
Allot Communications
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
Biznes to Rozmowy
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
EhabRushdy1
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
petchphumsanit40
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
APNIC
 

Similar to Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar (20)

Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updated
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Network security
Network securityNetwork security
Network security
 
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei.Analityka w służbie jej DN...
PLNOG16: DNS – przyjaciel e-szpiegów i e-złodziei. Analityka w służbie jej DN...
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar

  • 1. 1 | © 2013 Infoblox Inc. All Rights Reserved.1 | © 2016 Infoblox Inc. All Rights Reserved. Infoblox Threat Intelligence Webinar Sam Kumarsamy and Jon Abbe | March 23, 2017
  • 2. 2 | © 2013 Infoblox Inc. All Rights Reserved.2 | © 2016 Infoblox Inc. All Rights Reserved. Agenda • Infoblox ActiveTrust • Optimizing Threat Intel • Security Challenges • Next Steps
  • 3. 3 | © 2013 Infoblox Inc. All Rights Reserved.3 | © 2016 Infoblox Inc. All Rights Reserved. Cyber Threats The industry is witnessing a paradigm shift: • Increase in digital economy • Increase of digital channels This translates into higher risks of cyber threats and attacks. 60% Compound Annual Growth in Cyber crimes, despite of increased spend in security solutions and products Source: PwC Global State of Information Security Survey 2015 & 2016
  • 4. 4 | © 2013 Infoblox Inc. All Rights Reserved.4 | © 2016 Infoblox Inc. All Rights Reserved. Today’s Security Landscape 400+ VENDORS
  • 5. 5 | © 2013 Infoblox Inc. All Rights Reserved.5 | © 2016 Infoblox Inc. All Rights Reserved. The Disconnect.. Security You Often GetSecurity You Want
  • 6. 6 | © 2013 Infoblox Inc. All Rights Reserved.6 | © 2016 Infoblox Inc. All Rights Reserved. Leads to Ineffective Threat Intelligence 1. Source: Ponemon Institute, 2015 Second Annual Study on Exchange Cyber Threat Intelligence: There Has to Be a Better Way Poor incident response and manual processes 70% 46% 45% % of survey respondents unable to prioritize the threat by category1 % of survey respondents lacked context for threat intel to make it actionable1 of survey respondents that felt Threat Intel is not timely1 Lack of prioritization and context slows remediation Siloed Threat Intelligence impacts effectiveness & trust
  • 7. 7 | © 2013 Infoblox Inc. All Rights Reserved.7 | © 2016 Infoblox Inc. All Rights Reserved. Gartner’s View on Silos Silos between network, edge, endpoint and data security systems and processes can restrict an organization’s ability to prevent, detect and respond to advanced attacks. Best Practices for Detecting and Mitigating Advanced Threats, 2016 Update 29 March 2016
  • 8. 8 | © 2013 Infoblox Inc. All Rights Reserved.8 | © 2016 Infoblox Inc. All Rights Reserved. Enforce policy using timely, consolidated & high quality threat intelligence data Improve incident response with consolidate threat intelligence from multiple sources Eliminate silos and accelerate remediation by centralizing threat intelligence and sharing DNS IoCs with security ecosystem Investigate threats faster to free up security personnel Timely access to context for threat indicators Prioritize with network context Optimize Your Threat Intelligence Operations with Threat Intelligence Data Exchange (TIDE) Threat Intelligence Optimization
  • 9. 9 | © 2013 Infoblox Inc. All Rights Reserved.9 | © 2016 Infoblox Inc. All Rights Reserved. High Quality Threat Intelligence Data • Timely • Reliable • Accurate • Contextual • Easy-to-use
  • 10. 10 | © 2013 Infoblox Inc. All Rights Reserved.10 | © 2016 Infoblox Inc. All Rights Reserved. Marketplace Data • Single vendor management • Normalized content
  • 11. 11 | © 2013 Infoblox Inc. All Rights Reserved.11 | © 2016 Infoblox Inc. All Rights Reserved. RBL Zone File Deploying Threat Intel Across Your Security Infrastructure Infoblox Marketplace Custom TI Single-source of TI management Faster triage Threat PrioritizationRESULT: C2 IP List Spambot IPs C2 & Malware Host/Domain CSV File JSON Phishing & Malware URLs RPZ WWW DNS SIEM TIDE Define Data Policy, Governance & Translation Dossier Investigate Threats
  • 12. 12 | © 2013 Infoblox Inc. All Rights Reserved.12 | © 2016 Infoblox Inc. All Rights Reserved. TIDE is bundled with ActiveTrust® Proactively protect users against cyberattacks Early detection and prevention of malicious communications Ecosystem integrations Rapid threat investigation through Infoblox Dossier Threat Intelligence Data Exchange (TIDE) Data exfiltration detection and prevention Proactively Contain Malware and Stop Data Exfiltration using DNS Collect and distribute threat Intel and hasten threat investigation Improved Visibility and Context
  • 13. 13 | © 2013 Infoblox Inc. All Rights Reserved.13 | © 2016 Infoblox Inc. All Rights Reserved. ActiveTrust Standard ActiveTrust Plus ActiveTrust Advanced Annual Subscription Licensed By Appliance by model Organization by protected user Organization by protected user Zones (RPZs) – Infoblox Infrastructure only Standard (4) Standard (4) + Advanced (5) + SURBL (2) Standard (4) + Advanced (5) + SURBL (2) Infoblox Data via TIDE – Third party infrastructure No ONE of  Hostnames or  IP Addresses or  URLs ALL of  Hostnames  IP Addresses  URLs Dossier No (Cloud Services Portal with threat lookup only) 32,000 queries/year 65,000 queries/year ActiveTrust Tiers
  • 14. 14 | © 2013 Infoblox Inc. All Rights Reserved.14 | © 2016 Infoblox Inc. All Rights Reserved. Next Steps Path to Engagement • Learn more go to: ActiveTrust Product Page • Try Our Product – Free of Cost & Risk • ActiveTrust eval • Download ActiveTrust Plus or Advanced only to evaluate TIDE • For additional information engage with your Infoblox Account Manager
  • 15. 15 | © 2013 Infoblox Inc. All Rights Reserved.15 | © 2016 Infoblox Inc. All Rights Reserved. Q&A
  • 16. 16 | © 2013 Infoblox Inc. All Rights Reserved.16 | © 2016 Infoblox Inc. All Rights Reserved. Thank You
  • 17. 18 | © 2013 Infoblox Inc. All Rights Reserved.18 | © 2016 Infoblox Inc. All Rights Reserved. Infoblox ActiveTrust Standard – data sets • Base – known malicious threats that are dangerous as destinations • Malware – can take action/control of a system • Ransomware – restricts access to system it infects and demands ransom be paid for restriction to be removed • Bogon – Bogon IPs are commonly found as source addresses of DDoS attacks, have no legitimate use, and usually result of accidental or malicious misconfiguration
  • 18. 19 | © 2013 Infoblox Inc. All Rights Reserved.19 | © 2016 Infoblox Inc. All Rights Reserved. Infoblox ActiveTrust Plus and Advanced – additional data sets • Malware - malicious or compromised IPs known to host threats that can take action on or control of system (e.g., malware C&C, malware download, and active phishing sites) • Bots - self-propagating malware designed to infect a host and connect it back to C&C/botnet • Exploit Kit - distributable packs that contain malicious programs used to execute "drive-by download" attacks in order to infect users with malware; target vulnerabilities in user’s machine (usually due to unpatched versions of Java, Adobe Reader, Adobe Flash, IE, etc.) to load malware onto victim’s system • Malware DGA – DGAs seen in various families of malware used to periodically generate large number of domain names that can be used as rendezvous points with their C&C servers; examples (Ramnit, Conficker, and Banjori) • TOR Exit Node – block entry/gateways to the TOR network (darknet) because many company network/security admins believe these gateways (exit nodes) represents a risk worthy of blocking because of criminal activity associated with darknet and since criminals have started using Tor as a malware C&C channel • SURBL – see details on next slide
  • 19. 20 | © 2013 Infoblox Inc. All Rights Reserved.20 | © 2016 Infoblox Inc. All Rights Reserved. SURBL (partner) Threat Intelligence Feed • Infoblox and SURBL data complementary and when used together, can enable increased threat coverage • SURBL data ̶ Multi domains - blacklist of roughly 800k+ malicious domains including up-to- date intelligence on active malware, phishing, botnet, and spam domains ̶ Fresh domains - Newly Observed Domains (NOD); provides critical, accurate, information on the time new domains are placed into service • SURBL OEM license bundled with Infoblox ActiveTrust Plus and ActiveTrust Advanced products for usage by Infoblox DNS Firewall (RPZ) • SURBL Enterprise license available on Infoblox 3rd Party Threat Indicator Feed Data Marketplace