SlideShare a Scribd company logo
1 of 22
Download to read offline
Live Demonstration –
Ensure Data Protection
with Fidelis Network®
© Fidelis Cybersecurity
Agenda
Introductions
Fidelis Overview
Integrated DLP vs Enterprise DLP
Metadata for Detection & Response
Visibility, DSI, Content & Context
Network DLP Demonstration
Questions & Answers
Kevin Harvey, CISSP
Senior Principle Security Engineer
Federal/DoD
Fidelis Cybersecurity
Tom Clare
Product/Technical Marketing
Fidelis Cybersecurity
2
© Fidelis Cybersecurity
Leader inAutomated Detection & Response
3
GLOBAL PRESENCE
• Established 2002
• HQ in Washington, DC
• Fortune 100 & DoD enterprise proven
• 12 of the Fortune 50
• 24 of the Fortune 100
• Backed by Marlin Equity Partners
PATENTED INNOVATION
• Fidelis Elevate Platform
• Network Detection and Response
• Endpoint Detection and Response (EDR)
• Data Loss Prevention (DLP)
• Deception
• Discovery and Classification of
Data and Assets
• Gartner Cool Vendor 2017 for Deception
• Gartner Visionary 2017 for DLP
© Fidelis Cybersecurity
Automate Detection and Response
with The Fidelis Elevate™ Platform
4
Accuracy. Clarity. Certainty.
• Gain threat visibility into networks,
endpoints and cloud environments
• See north-south traffic, lateral movement,
and traffic going in and out of your
network
• Automate detection and response to
reduce exposure and risk to data
• Respond to threats at the endpoint
• Mitigate data leakage and exfiltration
• Reduce dwell time with an active post-
breach defense
© Fidelis Cybersecurity
Fidelis Network DLP Leadership
Rated 4.9 for Network DLP (1-5 scale, 5 the highest rating)
“Fidelis Network is one of the most fully featured network DLP products in the enterprise DLP
market and operates at speeds of 20 Gbps and above. The strength of this product is its wide
range of deployment and throughput options, as well as port and protocol independence, and
no reliance on a proxy architecture.”
”Fidelis Network covers a number of DLP detection methods and can also analyze metadata
content. Fidelis Network has additional features to better determine malicious content, such as
payload analysis and sandboxing of files.”
“Fidelis Network CommandPost (K2) is feature-rich, with advanced configuration options,
logical event tracking and alert options. Fidelis also offers the capability to split ownership on
rules, which can be valuable for change control management of authoring and editing of DLP
rules, particularly in very large organizations.”
Gartner: Critical Capabilities for Enterprise DLP, Published 10 April 2017 - ID G00308328
© Fidelis Cybersecurity
Shift to Integrated DLP Solutions
By 2022, 60% of organizations will involve line-of-business
owners when crafting their data loss prevention (DLP) strategy, up
from 15% today.
By 2020, 85% of organizations will implement at least one form of
integrated DLP, up from 50% today.
By 2022, a majority of DLP market revenue will be driven by
integrated DLP products, as opposed to enterprise DLP systems.
6
Source - Magic Quadrant for Enterprise Data Loss Prevention,
Published 16 February 2017 - ID G00300911
Authors - Brian Reed, Deborah Kish
© Fidelis Cybersecurity
Integrated DLP
7
Endpoint
EDR
Network
NTA
CASB
SWG
w/ICAP
SEG
Cloud
Platform
SaaS Apps
Native DLP
Features
Integrated
DLP
Compliance
IP Data Protection
Sensitive
Data Use
Monitoring
Integrated
DLP
© Fidelis Cybersecurity
Analyst Perspective
8
Network Endpoint Cloud Platform SaaS Apps Web, Email &
Cloud
Gateways
Operating
Systems
Compliance for
Data-in-Motion,
Final DLP Pass
IP Data
Protection in
Use, On/Off
Networks
First Pass DLP First Pass DLP First Pass DLP Encryption
TLS Encrypted
Traffic Visibility
Application
Conflicts,
Feature Parity,
Control Factor
28% of 2018
Workload,
Trending Down
(44% in 2013)
59% of 2018
Workload,
Trending Up
SWG + ICAP
CASB API &
Proxy, MTA,
Limited Vis.
Not Always MS
OS and Files
NTA Visibility
Metadata
All Ports &
Protocols
EDR Visibility
Metadata
Policy Control &
Scripts
TAPs coming
soon…MS
Azure first, then
AWS tbd
Uniformity
Challenge
TLS at SWG Data Migration
to Cloud
DLP needs content & context to determine risk and threats.
© Fidelis Cybersecurity
DLP + Detection & Response
9
Endpoint
EDR
Network
NTA
CASB
SWG
w/ICAP
SEG
Cloud
Platform
SaaS Apps
Native DLP
Features
Integrated
DLP
Network DLP w/Email & Web Sensors
Deep Session Inspection (DSI)
Sand Boxing & Payload Analysis
ML Anomaly Detection & Threat Intelligence
Threat Prevention & Detection
Real-time & Retrospective Analysis
Metadata
© Fidelis Cybersecurity
Metadata – Fidelis Collector
Have I seen this document of interest on the network before? Query: Search all network
sessions for the past three months for my document of interest based on hash, title, author,
create date or other attributes.
Who else has sent or received this document of interest? Query: Search all network
sessions for the past three months for my document of interest based on hash, title, author,
create date or other attributes.
What other data has this user sent? Query: Map out all data from this user, what was sent
and where it went.
Where has the phrase “Tractor Beam” been seen on the network within the last
month? Tag sessions containing phrase or keywords of interest. Query: Search for tagged
sessions.
What documents contain specific header/footer text? Query: List all network sessions in
the last 30 days that contained a document with a header/footer that contains specific text.
10
© Fidelis Cybersecurity
Key Requirements OfA Network DLP Solution
• Conduct session-level (not packet-level) inspection of network traffic
across all 65,535 network ports
• Provide network visibility into protocols, channels, and applications in use
• Be able to extract enterprise human-readable content and related
metadata contained in the session and any attachments and compressed
files for analysis
• Provide multiple sophisticated content analysis technologies to detect
sensitive and/or protected information
• Policy engine with rules to determine network sessions that violate policy
• Ability to prevent network sessions violating policy across all 65,535 ports.
11
© Fidelis Cybersecurity
Fidelis Network®
12
Gain visibility into CONTENT over ALL PORTS
& PROTOCOLS to DETECT
threats and PREVENT data loss.
© Fidelis Cybersecurity
Fidelis Network®
See Deeper into Applications and Content Flowing Over
the Network
• Patented Deep Session Inspection® as well as Deep Packet Inspection - across
all ports and protocols
• Capture and store all meta data traffic that is searchable by threat hunters or
automated analytics
• Automatically decode and analyze traffic to detect and prevent threats as well as
unauthorized data transfers
Automate Threat Detection and Mitigate Data Theft
• Real-time network analysis to uncover initial compromise, suspicious hosts,
malware, compromised host
• Retroactive analysis against stored meta data based on indicators derived from
threat intelligence, machine learning, sandbox results, and Fidelis research
• Confirm and stop data theft by content inspection of all outgoing network activity
13
© Fidelis Cybersecurity
Fidelis Network®
Eliminate Alert Fatigue
• Automatically validate, correlate, and consolidate network alerts against every
endpoint in your network
• Suspicious network data, rich content, and files analyzed by multiple defenses,
security analytics and rules are included as pre-staged evidence – in one view
Respond Faster to Breaches
• Gain more context around an investigation with real-time and retrospective
analysis across the kill chain to ensure a faster, more effective response
Prevent Threats and Data Leakage
• Gateway and internal sensor locations allow for the dropping of sessions
• Mail sensor allows you to quarantine, drop, re-route and remove attachments
• Web sensor enables you to redirect web pages and drop sessions
14
© Fidelis Cybersecurity
Deep Content Decoding and Analysis
Deep, Recursive Content Decoding and Analysis
Detects content-level threats that are invisible to other network security systems
Able to apply threat intelligence over a larger detection surface
15
Network
Packets
Session Buffers (RAM)
Content Buffers (RAM)
Content Buffers (RAM)
Non-Selectively “Exploding” Recursively
Embedded Content Objects in RAM
Session
Reassembly
Content Decoders
and Analyzers
Content Decoders
and Analyzers
Protocol and
Application Decoders
and Analyzers
© Fidelis Cybersecurity
Configuration, Investigation, Analysis, Response, Integration
Deep Session Inspection®
Metadata
and Tags
D E E P S E S S I O N I N S P E C T I O N ®
Content Analysis,
Malware Detection
Deep Content
Decoding
Protocol and
Application Decoding
Full Session
Reassembly
Real-Time
Threat
Detection
Network
Non-
Selective
Network
Memory
Fidelis K2
FidelisCollector
Fidelis
Sensors
16
© Fidelis Cybersecurity
Deep Content Visibility
Visibility into Deeply Embedded Network Content (Inbound and Outbound)
17
PDF
DeflateText
Malware
ExcelText
ZIP
PPT
MIME
HTTP
Text
Gmail
Malicious
Inbound
Content
Classified
Sensitive
Outbound
Content
© Fidelis Cybersecurity
Comprehensive Data Protection Across
Different Types of Traffic
18
Fidelis Network Direct Sensor
Fidelis Network Mail Sensor
Fidelis Network Internal Sensor
Fidelis Network Web Sensor
Gateway sensor, all port visibility
Datacenter sensor, handles
SMB, DB transactions
Enables graceful quarantine,
prevention of email traffic
Web traffic only, traffic fed
from Proxy via ICAP
© Fidelis Cybersecurity
Automated Endpoint Validation & Response
(With Fidelis Network® Integration)
• Highlight the importance of an alert with endpoint
activity validation
• Automatically prioritize important alerts
• Answer critical analytic questions ahead of time
(compared to non-validated alerts)
• Be certain that the alerts you are looking at are
actionable
• Automate response with playbooks and rapid,
surgical remediation capabilities
19
Demonstration
© Fidelis Cybersecurity
Questions and Next Steps
• Review the Product Web Page & Videos
https://www.fidelissecurity.com/products/network
• Request a Demonstration
• Network:
https://www.fidelissecurity.com/products/network/demo
• Elevate:
www.fidelissecurity.com/products/security-operations-platform/demo
• Free Elevate Assessment
www.fidelissecurity.com/fidelis-elevate-security-assessment
21
Thank You!

More Related Content

What's hot

What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASBAlberto Rivai
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsAleksandr Maklakov
 

What's hot (20)

What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
 

Similar to Secure Your Data with Fidelis Network® for DLP

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSFidelis Cybersecurity
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chainFidelis Cybersecurity
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionCloudera, Inc.
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptxssuser4c54af
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 

Similar to Secure Your Data with Fidelis Network® for DLP (20)

Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
You can't detect what you can't see illuminating the entire kill chain
You can't detect what you can't see   illuminating the entire kill chainYou can't detect what you can't see   illuminating the entire kill chain
You can't detect what you can't see illuminating the entire kill chain
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx01-Chapter 01-Introduction to CASB and Netskope.pptx
01-Chapter 01-Introduction to CASB and Netskope.pptx
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 

More from Fidelis Cybersecurity

Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensiveFidelis Cybersecurity
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchFidelis Cybersecurity
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureFidelis Cybersecurity
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Fidelis Cybersecurity
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology Fidelis Cybersecurity
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis Cybersecurity
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCFidelis Cybersecurity
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 

More from Fidelis Cybersecurity (12)

Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Threat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and ResearchThreat intelligence Primary Tradecraft and Research
Threat intelligence Primary Tradecraft and Research
 
Extend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in AzureExtend Network Visibility and Secure Applications and Data in Azure
Extend Network Visibility and Secure Applications and Data in Azure
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Fidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception SolutionFidelis - Live Demonstration of Deception Solution
Fidelis - Live Demonstration of Deception Solution
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Secure Your Data with Fidelis Network® for DLP

  • 1. Live Demonstration – Ensure Data Protection with Fidelis Network®
  • 2. © Fidelis Cybersecurity Agenda Introductions Fidelis Overview Integrated DLP vs Enterprise DLP Metadata for Detection & Response Visibility, DSI, Content & Context Network DLP Demonstration Questions & Answers Kevin Harvey, CISSP Senior Principle Security Engineer Federal/DoD Fidelis Cybersecurity Tom Clare Product/Technical Marketing Fidelis Cybersecurity 2
  • 3. © Fidelis Cybersecurity Leader inAutomated Detection & Response 3 GLOBAL PRESENCE • Established 2002 • HQ in Washington, DC • Fortune 100 & DoD enterprise proven • 12 of the Fortune 50 • 24 of the Fortune 100 • Backed by Marlin Equity Partners PATENTED INNOVATION • Fidelis Elevate Platform • Network Detection and Response • Endpoint Detection and Response (EDR) • Data Loss Prevention (DLP) • Deception • Discovery and Classification of Data and Assets • Gartner Cool Vendor 2017 for Deception • Gartner Visionary 2017 for DLP
  • 4. © Fidelis Cybersecurity Automate Detection and Response with The Fidelis Elevate™ Platform 4 Accuracy. Clarity. Certainty. • Gain threat visibility into networks, endpoints and cloud environments • See north-south traffic, lateral movement, and traffic going in and out of your network • Automate detection and response to reduce exposure and risk to data • Respond to threats at the endpoint • Mitigate data leakage and exfiltration • Reduce dwell time with an active post- breach defense
  • 5. © Fidelis Cybersecurity Fidelis Network DLP Leadership Rated 4.9 for Network DLP (1-5 scale, 5 the highest rating) “Fidelis Network is one of the most fully featured network DLP products in the enterprise DLP market and operates at speeds of 20 Gbps and above. The strength of this product is its wide range of deployment and throughput options, as well as port and protocol independence, and no reliance on a proxy architecture.” ”Fidelis Network covers a number of DLP detection methods and can also analyze metadata content. Fidelis Network has additional features to better determine malicious content, such as payload analysis and sandboxing of files.” “Fidelis Network CommandPost (K2) is feature-rich, with advanced configuration options, logical event tracking and alert options. Fidelis also offers the capability to split ownership on rules, which can be valuable for change control management of authoring and editing of DLP rules, particularly in very large organizations.” Gartner: Critical Capabilities for Enterprise DLP, Published 10 April 2017 - ID G00308328
  • 6. © Fidelis Cybersecurity Shift to Integrated DLP Solutions By 2022, 60% of organizations will involve line-of-business owners when crafting their data loss prevention (DLP) strategy, up from 15% today. By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. By 2022, a majority of DLP market revenue will be driven by integrated DLP products, as opposed to enterprise DLP systems. 6 Source - Magic Quadrant for Enterprise Data Loss Prevention, Published 16 February 2017 - ID G00300911 Authors - Brian Reed, Deborah Kish
  • 7. © Fidelis Cybersecurity Integrated DLP 7 Endpoint EDR Network NTA CASB SWG w/ICAP SEG Cloud Platform SaaS Apps Native DLP Features Integrated DLP Compliance IP Data Protection Sensitive Data Use Monitoring Integrated DLP
  • 8. © Fidelis Cybersecurity Analyst Perspective 8 Network Endpoint Cloud Platform SaaS Apps Web, Email & Cloud Gateways Operating Systems Compliance for Data-in-Motion, Final DLP Pass IP Data Protection in Use, On/Off Networks First Pass DLP First Pass DLP First Pass DLP Encryption TLS Encrypted Traffic Visibility Application Conflicts, Feature Parity, Control Factor 28% of 2018 Workload, Trending Down (44% in 2013) 59% of 2018 Workload, Trending Up SWG + ICAP CASB API & Proxy, MTA, Limited Vis. Not Always MS OS and Files NTA Visibility Metadata All Ports & Protocols EDR Visibility Metadata Policy Control & Scripts TAPs coming soon…MS Azure first, then AWS tbd Uniformity Challenge TLS at SWG Data Migration to Cloud DLP needs content & context to determine risk and threats.
  • 9. © Fidelis Cybersecurity DLP + Detection & Response 9 Endpoint EDR Network NTA CASB SWG w/ICAP SEG Cloud Platform SaaS Apps Native DLP Features Integrated DLP Network DLP w/Email & Web Sensors Deep Session Inspection (DSI) Sand Boxing & Payload Analysis ML Anomaly Detection & Threat Intelligence Threat Prevention & Detection Real-time & Retrospective Analysis Metadata
  • 10. © Fidelis Cybersecurity Metadata – Fidelis Collector Have I seen this document of interest on the network before? Query: Search all network sessions for the past three months for my document of interest based on hash, title, author, create date or other attributes. Who else has sent or received this document of interest? Query: Search all network sessions for the past three months for my document of interest based on hash, title, author, create date or other attributes. What other data has this user sent? Query: Map out all data from this user, what was sent and where it went. Where has the phrase “Tractor Beam” been seen on the network within the last month? Tag sessions containing phrase or keywords of interest. Query: Search for tagged sessions. What documents contain specific header/footer text? Query: List all network sessions in the last 30 days that contained a document with a header/footer that contains specific text. 10
  • 11. © Fidelis Cybersecurity Key Requirements OfA Network DLP Solution • Conduct session-level (not packet-level) inspection of network traffic across all 65,535 network ports • Provide network visibility into protocols, channels, and applications in use • Be able to extract enterprise human-readable content and related metadata contained in the session and any attachments and compressed files for analysis • Provide multiple sophisticated content analysis technologies to detect sensitive and/or protected information • Policy engine with rules to determine network sessions that violate policy • Ability to prevent network sessions violating policy across all 65,535 ports. 11
  • 12. © Fidelis Cybersecurity Fidelis Network® 12 Gain visibility into CONTENT over ALL PORTS & PROTOCOLS to DETECT threats and PREVENT data loss.
  • 13. © Fidelis Cybersecurity Fidelis Network® See Deeper into Applications and Content Flowing Over the Network • Patented Deep Session Inspection® as well as Deep Packet Inspection - across all ports and protocols • Capture and store all meta data traffic that is searchable by threat hunters or automated analytics • Automatically decode and analyze traffic to detect and prevent threats as well as unauthorized data transfers Automate Threat Detection and Mitigate Data Theft • Real-time network analysis to uncover initial compromise, suspicious hosts, malware, compromised host • Retroactive analysis against stored meta data based on indicators derived from threat intelligence, machine learning, sandbox results, and Fidelis research • Confirm and stop data theft by content inspection of all outgoing network activity 13
  • 14. © Fidelis Cybersecurity Fidelis Network® Eliminate Alert Fatigue • Automatically validate, correlate, and consolidate network alerts against every endpoint in your network • Suspicious network data, rich content, and files analyzed by multiple defenses, security analytics and rules are included as pre-staged evidence – in one view Respond Faster to Breaches • Gain more context around an investigation with real-time and retrospective analysis across the kill chain to ensure a faster, more effective response Prevent Threats and Data Leakage • Gateway and internal sensor locations allow for the dropping of sessions • Mail sensor allows you to quarantine, drop, re-route and remove attachments • Web sensor enables you to redirect web pages and drop sessions 14
  • 15. © Fidelis Cybersecurity Deep Content Decoding and Analysis Deep, Recursive Content Decoding and Analysis Detects content-level threats that are invisible to other network security systems Able to apply threat intelligence over a larger detection surface 15 Network Packets Session Buffers (RAM) Content Buffers (RAM) Content Buffers (RAM) Non-Selectively “Exploding” Recursively Embedded Content Objects in RAM Session Reassembly Content Decoders and Analyzers Content Decoders and Analyzers Protocol and Application Decoders and Analyzers
  • 16. © Fidelis Cybersecurity Configuration, Investigation, Analysis, Response, Integration Deep Session Inspection® Metadata and Tags D E E P S E S S I O N I N S P E C T I O N ® Content Analysis, Malware Detection Deep Content Decoding Protocol and Application Decoding Full Session Reassembly Real-Time Threat Detection Network Non- Selective Network Memory Fidelis K2 FidelisCollector Fidelis Sensors 16
  • 17. © Fidelis Cybersecurity Deep Content Visibility Visibility into Deeply Embedded Network Content (Inbound and Outbound) 17 PDF DeflateText Malware ExcelText ZIP PPT MIME HTTP Text Gmail Malicious Inbound Content Classified Sensitive Outbound Content
  • 18. © Fidelis Cybersecurity Comprehensive Data Protection Across Different Types of Traffic 18 Fidelis Network Direct Sensor Fidelis Network Mail Sensor Fidelis Network Internal Sensor Fidelis Network Web Sensor Gateway sensor, all port visibility Datacenter sensor, handles SMB, DB transactions Enables graceful quarantine, prevention of email traffic Web traffic only, traffic fed from Proxy via ICAP
  • 19. © Fidelis Cybersecurity Automated Endpoint Validation & Response (With Fidelis Network® Integration) • Highlight the importance of an alert with endpoint activity validation • Automatically prioritize important alerts • Answer critical analytic questions ahead of time (compared to non-validated alerts) • Be certain that the alerts you are looking at are actionable • Automate response with playbooks and rapid, surgical remediation capabilities 19
  • 21. © Fidelis Cybersecurity Questions and Next Steps • Review the Product Web Page & Videos https://www.fidelissecurity.com/products/network • Request a Demonstration • Network: https://www.fidelissecurity.com/products/network/demo • Elevate: www.fidelissecurity.com/products/security-operations-platform/demo • Free Elevate Assessment www.fidelissecurity.com/fidelis-elevate-security-assessment 21