© 2013 Solera Networks1
© 2013 Solera Networks. All information contained herein should be considered confidential, proprietary, and trade secret
information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Big Data Security Intelligence and Analytics for
Advanced Threat Protection
See everything. Know everything.™
© 2013 Solera Networks
© 2013 Solera Networks2
Background
Global Presence
• Salt Lake City, UT (HQ)
• San Francisco, CA
• Washington, DC
• London, UK
• Tokyo, Japan
• Sydney, Australia
• Pune, India
Investors Leadership and Innovation
• 300+ G2000 & Federal customers
• 14 patents awarded/pending
• Threat Research Lab
• FIPS and CC certification
© 2013 Solera Networks3
The Threat Landscape Has Evolved…
HACKTIVISTS
STATE-
SPONSORED
ATTACKERS
CYBERCRIMINALS
FINANCIALLY
MOTIVATED
NATIONALISTICALLY
MOTIVATED
POLITICALLY
MOTIVATED
ATA/APT
GRADE
DDOS
Ransom
& fraud
Gov’t, enterprise &
infrastructure
targets
Public data
leakage
Defacement DATA
THEFT
MALWARE
BAD
STUFF IN
GOOD STUFF
OUT
© 2013 Solera Networks4
Breaches and attacks
perpetrated by outsiders
State-affiliated attacks that
employed phishing
Breaches discovered by
external parties
*2013 Verizon DBIR
Reality of Today’s Threat Landscape
© 2013 Solera Networks5
Initial Attack to
Initial Compromise [ 11% 13% 60%] 13% 2% 1% 0%
74%
Window of Opportunity for Advanced Threats*
Seconds Minutes Hours Days Weeks Months Years
Initial Compromise
to Discovery 0% 1% 9% 11% [ 12% 62% 4% ]
78%
*2013 Verizon DBIR
© 2013 Solera Networks6
Past 10 years: Deploying Layers of Countermeasures…
Today’s footprint:
Top security point
products deployed…
URL
Filtering
© 2013 Solera Networks7
We live
WORLD
POST-PREVENTION
in a
do we do what we do?
© 2013 Solera Networks8
Most Dreaded Questions from the CISO
Who did this to us?
How did they do it?
What systems and data were affected?
Can we be sure it is over?
Can it happen again?
© 2013 Solera Networks9
Advanced Persistent
Security™ that easily
tells users what to
look for—and at
we deliver
As data is gathered and
analyzed, relationships
can be found and
patterns appear…
Turning Complexity into Context
…you’ll know if it is a
threat or not.
Context
Metadata
Inference
Data
Through…
Turning Complexity into Context
As data is gathered, the
elements aren’t always
coherent or revealing.
But through analysis,
relationships can be
found and patterns
appear.
Once pictures begin to
emerge, it becomes
possible to discern if
something is a threat, or
if it’s benign.
Turning Complexity into Context
© 2013 Solera Networks13
Integration Layer
Threat
Intelligence
Big Data
Security
Analytics
Security
Visibility
Full Packet Capture
Layer 2 - 7 indexing & classification
Visual Insight
Context, real-time awareness, alerts
Advanced Malware Detection
White/blacklists, sandboxing, feeds
Big Data Security Intelligence & Analytics
for Advanced Threat Protection
© 2013 Solera Networks14
Integration Layer
Threat
Intelligence
Big Data
Security
Analytics
Security
Visibility
• Telling users what to look for and at
• Flexible architecture: HW/SW/Virtual
• Scalable: 10Gbps, VM, Software
• Advanced threat detection/analysis
• Single ‘pane-of-glass’
Big Data Security Intelligence & Analytics
for Advanced Threat Protection
© 2013 Solera Networks15
Integration Layer
Threat
Intelligence
Big Data
Security
Analytics
Security
Visibility
Security Ecosystem: Integrated
Advanced Threat Protection
Context-aware and
adaptive security will be
the only way to securely
support the dynamic
business and IT
infrastructures emerging
during the next 10 years.
Neil MacDonald, Distinguished VP
GARTNER
“
Integration Layer
Threat
Intelligence
Big Data
Security
Analytics
Security
Visibility
”
© 2013 Solera Networks16
Solera is the Security Camera for your Network
Records, classifies and indexes all packets and flows from L2 – L7
On the wire, file-level visibility of data exfiltration & malware infiltration
Actionable intelligence, forensics and situational awareness
Unmatched multi-dimensional flow enrichment & big data warehousing
Flexible, open and easy-to-use platform
do we do what we do?
Providing real-
time analysis and
full visibility of
everything going
in and out of
your network
© 2013 Solera Networks17
Solera DeepSee™
The Most Comprehensive and Flexible SIA Solution
Flexible and easy-to-
deploy on leading
platforms.
Comprehensive,
pre-configured SIA
appliances.
Total network visibility.
Branch/small-office
deployments.
© 2013 Solera Networks18
Solera DeepSee Appliances Specifications
DeepSee 2G DeepSee 10G
Throughput 2 Gbps 10 Gbps
Storage 6 TB to 66 TB 20 TB to 140 TB
NICs 4 – 1 GbE 2 – 10 GbE & 8 – 1 GbE
Rack Size 1 U 2 U
DeepSee Central Manager
• Manages up to 100 sensors
• Up to 1.4 PB of managed Big Data
DeepSee Storage Modules
• 20 TB storage modules
• With 2 SAS6 interfaces
© 2013 Solera Networks19
An Example Deployment
TAP/SPAN
+Root Cause Explorer
+Threat Analysis
+PCAP Import
+Comparative Reporting
+Reputation Services
+more…
DeepSee Appliance
Management
Network
DeepSee
Dashboard
+Reports
+Artifact
Timeline
+Alerts
Optional Storage
Application Servers
Mobile Devices
Users
© 2013 Solera Networks20
Real-World Use Cases with Solera DeepSee
Situational
Awareness
Incident
Response
Policy
Compliance
Data Loss
Monitoring
& Analysis
Advanced
Malware
Detection
Continuous
Monitoring
Who? When? What?Where? How?
Target(s)? Who Else? Is It Over? What Else? How Long?
© 2013 Solera Networks21
Big Data
Analytics
DeepSee Big Data Security Analytics
Partner IntegrationDeepSee® Applications
Reports, GeoIP, Reconstruction,
Packet Analysis
Reputation, Threat Feeds,
and File AnalysisThreat
Intelligence
Sensors
Solera DeepSee Platform
Use Cases
Incident
Response
Situational
Awareness
Policy
Compliance
Continuous
Monitoring
Data Loss
Monitoring & Analysis
Adv. Malware
Detection
© 2013 Solera Networks22
A Trusted Partner to Global At-Risk Customers
© 2013 Solera Networks23
Try Big Data Security Intelligence and Analytics
Solera DeepSee 30-Day Trial
or…
Free DeepSee Lab Edition
www.soleranetworks.com
© 2013 Solera Networks24
Win an iPad Mini
And don’t forget your Big
Data Security for Dummies
New!
Tweet about Solera or a
picture of you with Solera
swag and mention
@SoleraNetworks in your
tweet
© 2013 Solera Networks25
Security that Matters
You have been targeted. You will be hacked. Now what?
Our advanced threat protection and security analytics
solutions help protect organizations from cyber attackers. And
by doing that, we are helping to protect our way of life…
TM

Big Data Security Intelligence and Analytics for Advanced Threat Protection

  • 1.
    © 2013 SoleraNetworks1 © 2013 Solera Networks. All information contained herein should be considered confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Big Data Security Intelligence and Analytics for Advanced Threat Protection See everything. Know everything.™ © 2013 Solera Networks
  • 2.
    © 2013 SoleraNetworks2 Background Global Presence • Salt Lake City, UT (HQ) • San Francisco, CA • Washington, DC • London, UK • Tokyo, Japan • Sydney, Australia • Pune, India Investors Leadership and Innovation • 300+ G2000 & Federal customers • 14 patents awarded/pending • Threat Research Lab • FIPS and CC certification
  • 3.
    © 2013 SoleraNetworks3 The Threat Landscape Has Evolved… HACKTIVISTS STATE- SPONSORED ATTACKERS CYBERCRIMINALS FINANCIALLY MOTIVATED NATIONALISTICALLY MOTIVATED POLITICALLY MOTIVATED ATA/APT GRADE DDOS Ransom & fraud Gov’t, enterprise & infrastructure targets Public data leakage Defacement DATA THEFT MALWARE BAD STUFF IN GOOD STUFF OUT
  • 4.
    © 2013 SoleraNetworks4 Breaches and attacks perpetrated by outsiders State-affiliated attacks that employed phishing Breaches discovered by external parties *2013 Verizon DBIR Reality of Today’s Threat Landscape
  • 5.
    © 2013 SoleraNetworks5 Initial Attack to Initial Compromise [ 11% 13% 60%] 13% 2% 1% 0% 74% Window of Opportunity for Advanced Threats* Seconds Minutes Hours Days Weeks Months Years Initial Compromise to Discovery 0% 1% 9% 11% [ 12% 62% 4% ] 78% *2013 Verizon DBIR
  • 6.
    © 2013 SoleraNetworks6 Past 10 years: Deploying Layers of Countermeasures… Today’s footprint: Top security point products deployed… URL Filtering
  • 7.
    © 2013 SoleraNetworks7 We live WORLD POST-PREVENTION in a do we do what we do?
  • 8.
    © 2013 SoleraNetworks8 Most Dreaded Questions from the CISO Who did this to us? How did they do it? What systems and data were affected? Can we be sure it is over? Can it happen again?
  • 9.
    © 2013 SoleraNetworks9 Advanced Persistent Security™ that easily tells users what to look for—and at we deliver
  • 10.
    As data isgathered and analyzed, relationships can be found and patterns appear… Turning Complexity into Context …you’ll know if it is a threat or not. Context Metadata Inference Data Through…
  • 11.
    Turning Complexity intoContext As data is gathered, the elements aren’t always coherent or revealing. But through analysis, relationships can be found and patterns appear.
  • 12.
    Once pictures beginto emerge, it becomes possible to discern if something is a threat, or if it’s benign. Turning Complexity into Context
  • 13.
    © 2013 SoleraNetworks13 Integration Layer Threat Intelligence Big Data Security Analytics Security Visibility Full Packet Capture Layer 2 - 7 indexing & classification Visual Insight Context, real-time awareness, alerts Advanced Malware Detection White/blacklists, sandboxing, feeds Big Data Security Intelligence & Analytics for Advanced Threat Protection
  • 14.
    © 2013 SoleraNetworks14 Integration Layer Threat Intelligence Big Data Security Analytics Security Visibility • Telling users what to look for and at • Flexible architecture: HW/SW/Virtual • Scalable: 10Gbps, VM, Software • Advanced threat detection/analysis • Single ‘pane-of-glass’ Big Data Security Intelligence & Analytics for Advanced Threat Protection
  • 15.
    © 2013 SoleraNetworks15 Integration Layer Threat Intelligence Big Data Security Analytics Security Visibility Security Ecosystem: Integrated Advanced Threat Protection Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years. Neil MacDonald, Distinguished VP GARTNER “ Integration Layer Threat Intelligence Big Data Security Analytics Security Visibility ”
  • 16.
    © 2013 SoleraNetworks16 Solera is the Security Camera for your Network Records, classifies and indexes all packets and flows from L2 – L7 On the wire, file-level visibility of data exfiltration & malware infiltration Actionable intelligence, forensics and situational awareness Unmatched multi-dimensional flow enrichment & big data warehousing Flexible, open and easy-to-use platform do we do what we do? Providing real- time analysis and full visibility of everything going in and out of your network
  • 17.
    © 2013 SoleraNetworks17 Solera DeepSee™ The Most Comprehensive and Flexible SIA Solution Flexible and easy-to- deploy on leading platforms. Comprehensive, pre-configured SIA appliances. Total network visibility. Branch/small-office deployments.
  • 18.
    © 2013 SoleraNetworks18 Solera DeepSee Appliances Specifications DeepSee 2G DeepSee 10G Throughput 2 Gbps 10 Gbps Storage 6 TB to 66 TB 20 TB to 140 TB NICs 4 – 1 GbE 2 – 10 GbE & 8 – 1 GbE Rack Size 1 U 2 U DeepSee Central Manager • Manages up to 100 sensors • Up to 1.4 PB of managed Big Data DeepSee Storage Modules • 20 TB storage modules • With 2 SAS6 interfaces
  • 19.
    © 2013 SoleraNetworks19 An Example Deployment TAP/SPAN +Root Cause Explorer +Threat Analysis +PCAP Import +Comparative Reporting +Reputation Services +more… DeepSee Appliance Management Network DeepSee Dashboard +Reports +Artifact Timeline +Alerts Optional Storage Application Servers Mobile Devices Users
  • 20.
    © 2013 SoleraNetworks20 Real-World Use Cases with Solera DeepSee Situational Awareness Incident Response Policy Compliance Data Loss Monitoring & Analysis Advanced Malware Detection Continuous Monitoring Who? When? What?Where? How? Target(s)? Who Else? Is It Over? What Else? How Long?
  • 21.
    © 2013 SoleraNetworks21 Big Data Analytics DeepSee Big Data Security Analytics Partner IntegrationDeepSee® Applications Reports, GeoIP, Reconstruction, Packet Analysis Reputation, Threat Feeds, and File AnalysisThreat Intelligence Sensors Solera DeepSee Platform Use Cases Incident Response Situational Awareness Policy Compliance Continuous Monitoring Data Loss Monitoring & Analysis Adv. Malware Detection
  • 22.
    © 2013 SoleraNetworks22 A Trusted Partner to Global At-Risk Customers
  • 23.
    © 2013 SoleraNetworks23 Try Big Data Security Intelligence and Analytics Solera DeepSee 30-Day Trial or… Free DeepSee Lab Edition www.soleranetworks.com
  • 24.
    © 2013 SoleraNetworks24 Win an iPad Mini And don’t forget your Big Data Security for Dummies New! Tweet about Solera or a picture of you with Solera swag and mention @SoleraNetworks in your tweet
  • 25.
    © 2013 SoleraNetworks25 Security that Matters You have been targeted. You will be hacked. Now what? Our advanced threat protection and security analytics solutions help protect organizations from cyber attackers. And by doing that, we are helping to protect our way of life… TM