SlideShare a Scribd company logo
1 of 31
1
Enterprise IT Security
BriefingIT Security Briefing
Bogdan Stefanescu
Presales Consultant - Symantec Romania
bogdan_stefanescu@symantec.com
2
A CRIME IS BEING COMMITTED...
3
EVERY 15 MINUTES IN
PARIS.
4
EVERY 3½ MINUTES IN
NEW YORK CITY.
5
EVERY 2½ MINUTES IN
TOKYO.
6
EVERY 2 MINUTES IN
BERLIN.
7
EVERY ¼ OF A SECOND
IN CYBERSPACE.
8
Changes in the Threat Landscape
Redefining Endpoint Security
From Hackers… To Thieves
Few named variants Overwhelming variants
Noisy and highly visible Silent
Fame motivated Financially motivated
Indiscriminate Highly targeted
9
••
••
On July 13 2010 a unique form of
malware was discovered that was
attempting to take control of industrial
infrastructure around the world
10
••
••
11
Symantec™ Global Intelligence Network
Identifies more threats, takes action faster & prevents impact
Copyright © 2009 Symantec Corporation. All rights
Information ProtectionPreemptive Security Alerts Threat Triggered Actions
Global Scope and ScaleWorldwide Coverage 24x7 Event Logging
Rapid Detection
Attack Activity
• 240,000 sensors
• 200+ countries
Malware Intelligence
• 130M client, server,
gateways monitored
• Global coverage
Vulnerabilities
• 32,000+ vulnerabilities
• 11,000 vendors
• 72,000 technologies
Spam/Phishing
• 2.5M decoy accounts
• 8B+ email messages/day
• 1B+ web requests/day
Austin, TXMountain View, CA
Culver City, CA
San Francisco, CA
Taipei, Taiwan
Tokyo, Japan
Dublin, IrelandCalgary, Alberta
Chengdu, China
Chennai, India
Pune, India
Alexandria, VA
Reading, England
Sydney, AU
12
Changes in the Threat Landscape
Redefining Endpoint Security
Period
Numberofsignatures
Source: Symantec Security Response
13
The Problem
Protection is a constant challenge
• As we improve and innovate our
technologies, malware authors
adapt and innovate too
• Their techniques are easy –
exploit, encrypt, deploy and
repeat
Like a game of cat and mouse…
14
Traditional, signature based detections
just can’t keep up
15
Then we need something different…
16
Ubiquity
is something different
17
The Problem
Millions of file variants (good and bad)
• So imagine that we know:
– about every file in the world today…
– and how many copies of each exist
– and which files are good and which are bad
• Now let’s order them by prevalence with
– Bad on left
– Good on the right
18
Unfortunately neither technique
works well for the tens of millions
of files with low prevalence.
(But this is precisely where the
majority of today’s malware falls)
Unfortunately neither technique
works well for the tens of millions
of files with low prevalence.
(But this is precisely where the
majority of today’s malware falls)
Today, both good and bad software obey a long-tail distribution.
Bad Files Good Files
Prevalence
Whitelisting
works well here.
Whitelisting
works well here.
For this long tail a new
technique is needed.
For this long tail a new
technique is needed.
Blacklisting works
well here.
Blacklisting works
well here.
The Problem
No Existing Protection Addresses the “Long
Tail”
19
Ubiquity
Could we leverage our users for Security?
• We looked at how others leverage their user communities
• They ‘ask’!
• So perhaps we should use a similar approach?
– We ask our users to rate software they use
– Over time, applications build a reputation
– Symantec products then only allows users to run programs
with at least “4 stars.”
Books Music Movies
20
Ubiquity
Well not so fast
• To a user, it’s not at all obvious what is safe and what is
not…
Many threats are
silent, the user
isn’t even aware
of their presence
Some threats
hide inside
legitimate
processes
Other threats
pretend to be
legitimate files…
AntiVirus 2010
This means we can’t just ‘ask’ our users for feedback!
21
How it Works
Submission
Servers
Reputation
Servers
File hash
Good/bad
Confidence
Prevalence
Date first seen
11 Collect
data
22 Calculate
Ubiquity
Safety
Ratings
(updated
every 4 hrs)
33 Deliver Ubiquity Safety Ratings
In 2007, we started collecting data and built a massively-parallel analysis algorithm..
Analogy:
Google’s
PageRank™
Analogy:
Google’s
PageRank™
22
Five important new benefits:
1. Drastically Improved Protection
2. Policy-based lockdown
3. A Weapon Against False Positives
4. Improved performance
5. Unique endpoint visibility
R
eputation
Ubiquity Benefits
23
Conclusion
Ubiquity Changes the Rules of the Game
• Amplifies the protection of
our current technologies
• We no longer rely solely on
traditional signatures
• Use data from tens of millions
of users to automatically identify
otherwise invisible malware
• Shifts the odds in our favor –
attackers can no longer evade
us by tweaking their threats
24
Users –
Given the
tools to make
choices
Empower Users
25
Organized
Criminal
Well
Meaning
Insider
Malicious
Insider
Organized
Criminal
Well
Meaning
Insider
Malicious
Insider
Develop and Enforce IT PoliciesDevelop and Enforce IT Policies
Protect The InformationProtect The Information
Manage SystemsManage Systems
Protect The InfrastructureProtect The Infrastructure
The Challenge
26
Develop and Enforce IT Policies
Control Compliance Suite
Develop and Enforce IT Policies
Define
Risk and
Develop
IT Policies
Assess
Infrastructure
and Processes
Report,
Monitor and
Demonstrate
Due Care
Remediate
Problems
27
Protect The InformationProtect The Information
Data Loss Prevention Suite
Discover
Where Sensitive
Information
Resides
Monitor
How Data
is Being Used
Protect
Sensitive
Information
From Loss
28
Manage SystemsManage Systems
Altiris Total Management Suite
Implement
Secure
Operating
Environments
Distribute
and Enforce
Patch Levels
Automate
Processes to
Streamline
Efficiency
Monitor and
Report on
System Status
™
29
Protect The Infrastructure
Symantec Protection Suite
Protect The Infrastructure
Secure
Endpoints
Protect
Email and
Web
Defend
Critical
Internal
Servers
Backup
and
Recover
Data
™
30
Organized
Criminal
Malicious
Insider
Organized
Criminal
Malicious
Insider
Protect the Infrastructure
Develop & Enforce IT Policies
Protect the Information
Manage Systems
• Lack of Visibility
• Evolving Threats
• Growing Complexity
• IT Risk Management
• Cost & Complexity of Compliance
• Lack of Visibility
• Growth of Unstructured Data
• Social Media Access
• Cloud Computing
• Management of HW and SW
• Complexity of IT Processes
• Operating System Migration
Integrated Security Platform
Open
Platform
Console
Unification
Security
Intelligence
Dynamic
Protection
New Challenges Require New Technologies
31
Thank You

More Related Content

What's hot

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Pro Mrkt
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemNiran Seriki, CCISO, CISM
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 

What's hot (20)

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering SystemThe Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 

Viewers also liked

Atc 2febr2008 siemens
Atc 2febr2008 siemensAtc 2febr2008 siemens
Atc 2febr2008 siemensAgora Group
 
G-Data - 11nov2011
G-Data - 11nov2011G-Data - 11nov2011
G-Data - 11nov2011Agora Group
 
Agile tour 2011 radu davidescu
Agile tour 2011   radu davidescuAgile tour 2011   radu davidescu
Agile tour 2011 radu davidescuAgora Group
 
Maguay 22iun2011
Maguay 22iun2011Maguay 22iun2011
Maguay 22iun2011Agora Group
 
Konica Minolta - 26oct2011
Konica Minolta - 26oct2011Konica Minolta - 26oct2011
Konica Minolta - 26oct2011Agora Group
 
ClassIT - 27oct2010
ClassIT - 27oct2010ClassIT - 27oct2010
ClassIT - 27oct2010Agora Group
 
Mihaela ganciu.prezentare simplus.dpad.2013
Mihaela ganciu.prezentare simplus.dpad.2013Mihaela ganciu.prezentare simplus.dpad.2013
Mihaela ganciu.prezentare simplus.dpad.2013Agora Group
 
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010Securitatea - vector al eficienţei în Sectorul Public-17iunie2010
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010Agora Group
 
Softline - 14oct2010
Softline - 14oct2010Softline - 14oct2010
Softline - 14oct2010Agora Group
 
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010Agora Group
 
ClassIT - 13martie2012
ClassIT - 13martie2012ClassIT - 13martie2012
ClassIT - 13martie2012Agora Group
 
Autodesk sim360 ro agora 21 feb 2013
Autodesk sim360 ro agora 21 feb 2013Autodesk sim360 ro agora 21 feb 2013
Autodesk sim360 ro agora 21 feb 2013Agora Group
 
Agile tour 2011 nicolae giurescu
Agile tour 2011   nicolae giurescuAgile tour 2011   nicolae giurescu
Agile tour 2011 nicolae giurescuAgora Group
 

Viewers also liked (19)

Atc 2febr2008 siemens
Atc 2febr2008 siemensAtc 2febr2008 siemens
Atc 2febr2008 siemens
 
Ariana 5mai2011
Ariana 5mai2011Ariana 5mai2011
Ariana 5mai2011
 
G-Data - 11nov2011
G-Data - 11nov2011G-Data - 11nov2011
G-Data - 11nov2011
 
Agile tour 2011 radu davidescu
Agile tour 2011   radu davidescuAgile tour 2011   radu davidescu
Agile tour 2011 radu davidescu
 
6dec2011 - HP
6dec2011 - HP6dec2011 - HP
6dec2011 - HP
 
Maguay 22iun2011
Maguay 22iun2011Maguay 22iun2011
Maguay 22iun2011
 
Hp - 14oct2010
Hp - 14oct2010Hp - 14oct2010
Hp - 14oct2010
 
Konica Minolta - 26oct2011
Konica Minolta - 26oct2011Konica Minolta - 26oct2011
Konica Minolta - 26oct2011
 
Otimmc 5mai2011
Otimmc 5mai2011Otimmc 5mai2011
Otimmc 5mai2011
 
30ian2009 s-t
30ian2009 s-t30ian2009 s-t
30ian2009 s-t
 
ClassIT - 27oct2010
ClassIT - 27oct2010ClassIT - 27oct2010
ClassIT - 27oct2010
 
Mihaela ganciu.prezentare simplus.dpad.2013
Mihaela ganciu.prezentare simplus.dpad.2013Mihaela ganciu.prezentare simplus.dpad.2013
Mihaela ganciu.prezentare simplus.dpad.2013
 
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010Securitatea - vector al eficienţei în Sectorul Public-17iunie2010
Securitatea - vector al eficienţei în Sectorul Public-17iunie2010
 
Softline - 14oct2010
Softline - 14oct2010Softline - 14oct2010
Softline - 14oct2010
 
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010
Driving Healthcare Efficiency Through Mobile IT-ehealth-8iulie2010
 
ClassIT - 13martie2012
ClassIT - 13martie2012ClassIT - 13martie2012
ClassIT - 13martie2012
 
Hp 8sept2011
Hp 8sept2011Hp 8sept2011
Hp 8sept2011
 
Autodesk sim360 ro agora 21 feb 2013
Autodesk sim360 ro agora 21 feb 2013Autodesk sim360 ro agora 21 feb 2013
Autodesk sim360 ro agora 21 feb 2013
 
Agile tour 2011 nicolae giurescu
Agile tour 2011   nicolae giurescuAgile tour 2011   nicolae giurescu
Agile tour 2011 nicolae giurescu
 

Similar to Symantec_2-4-5 nov 2010

Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityAVG Technologies AU
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022PECB
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresCarl B. Forkner, Ph.D.
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
Cyber Crimes: The next five years.
Cyber Crimes: The next five years. Cyber Crimes: The next five years.
Cyber Crimes: The next five years. Gregory McCardle
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityAVG Technologies AU
 

Similar to Symantec_2-4-5 nov 2010 (20)

Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2016 to 2021
2016 to 20212016 to 2021
2016 to 2021
 
Cyber Crimes: The next five years.
Cyber Crimes: The next five years. Cyber Crimes: The next five years.
Cyber Crimes: The next five years.
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 

More from Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 

More from Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Agora Securitate yugo neumorni
Agora Securitate yugo neumorniAgora Securitate yugo neumorni
Agora Securitate yugo neumorni
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 

Symantec_2-4-5 nov 2010

  • 1. 1 Enterprise IT Security BriefingIT Security Briefing Bogdan Stefanescu Presales Consultant - Symantec Romania bogdan_stefanescu@symantec.com
  • 2. 2 A CRIME IS BEING COMMITTED...
  • 3. 3 EVERY 15 MINUTES IN PARIS.
  • 4. 4 EVERY 3½ MINUTES IN NEW YORK CITY.
  • 6. 6 EVERY 2 MINUTES IN BERLIN.
  • 7. 7 EVERY ¼ OF A SECOND IN CYBERSPACE.
  • 8. 8 Changes in the Threat Landscape Redefining Endpoint Security From Hackers… To Thieves Few named variants Overwhelming variants Noisy and highly visible Silent Fame motivated Financially motivated Indiscriminate Highly targeted
  • 9. 9 •• •• On July 13 2010 a unique form of malware was discovered that was attempting to take control of industrial infrastructure around the world
  • 11. 11 Symantec™ Global Intelligence Network Identifies more threats, takes action faster & prevents impact Copyright © 2009 Symantec Corporation. All rights Information ProtectionPreemptive Security Alerts Threat Triggered Actions Global Scope and ScaleWorldwide Coverage 24x7 Event Logging Rapid Detection Attack Activity • 240,000 sensors • 200+ countries Malware Intelligence • 130M client, server, gateways monitored • Global coverage Vulnerabilities • 32,000+ vulnerabilities • 11,000 vendors • 72,000 technologies Spam/Phishing • 2.5M decoy accounts • 8B+ email messages/day • 1B+ web requests/day Austin, TXMountain View, CA Culver City, CA San Francisco, CA Taipei, Taiwan Tokyo, Japan Dublin, IrelandCalgary, Alberta Chengdu, China Chennai, India Pune, India Alexandria, VA Reading, England Sydney, AU
  • 12. 12 Changes in the Threat Landscape Redefining Endpoint Security Period Numberofsignatures Source: Symantec Security Response
  • 13. 13 The Problem Protection is a constant challenge • As we improve and innovate our technologies, malware authors adapt and innovate too • Their techniques are easy – exploit, encrypt, deploy and repeat Like a game of cat and mouse…
  • 14. 14 Traditional, signature based detections just can’t keep up
  • 15. 15 Then we need something different…
  • 17. 17 The Problem Millions of file variants (good and bad) • So imagine that we know: – about every file in the world today… – and how many copies of each exist – and which files are good and which are bad • Now let’s order them by prevalence with – Bad on left – Good on the right
  • 18. 18 Unfortunately neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Unfortunately neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Today, both good and bad software obey a long-tail distribution. Bad Files Good Files Prevalence Whitelisting works well here. Whitelisting works well here. For this long tail a new technique is needed. For this long tail a new technique is needed. Blacklisting works well here. Blacklisting works well here. The Problem No Existing Protection Addresses the “Long Tail”
  • 19. 19 Ubiquity Could we leverage our users for Security? • We looked at how others leverage their user communities • They ‘ask’! • So perhaps we should use a similar approach? – We ask our users to rate software they use – Over time, applications build a reputation – Symantec products then only allows users to run programs with at least “4 stars.” Books Music Movies
  • 20. 20 Ubiquity Well not so fast • To a user, it’s not at all obvious what is safe and what is not… Many threats are silent, the user isn’t even aware of their presence Some threats hide inside legitimate processes Other threats pretend to be legitimate files… AntiVirus 2010 This means we can’t just ‘ask’ our users for feedback!
  • 21. 21 How it Works Submission Servers Reputation Servers File hash Good/bad Confidence Prevalence Date first seen 11 Collect data 22 Calculate Ubiquity Safety Ratings (updated every 4 hrs) 33 Deliver Ubiquity Safety Ratings In 2007, we started collecting data and built a massively-parallel analysis algorithm.. Analogy: Google’s PageRank™ Analogy: Google’s PageRank™
  • 22. 22 Five important new benefits: 1. Drastically Improved Protection 2. Policy-based lockdown 3. A Weapon Against False Positives 4. Improved performance 5. Unique endpoint visibility R eputation Ubiquity Benefits
  • 23. 23 Conclusion Ubiquity Changes the Rules of the Game • Amplifies the protection of our current technologies • We no longer rely solely on traditional signatures • Use data from tens of millions of users to automatically identify otherwise invisible malware • Shifts the odds in our favor – attackers can no longer evade us by tweaking their threats
  • 24. 24 Users – Given the tools to make choices Empower Users
  • 25. 25 Organized Criminal Well Meaning Insider Malicious Insider Organized Criminal Well Meaning Insider Malicious Insider Develop and Enforce IT PoliciesDevelop and Enforce IT Policies Protect The InformationProtect The Information Manage SystemsManage Systems Protect The InfrastructureProtect The Infrastructure The Challenge
  • 26. 26 Develop and Enforce IT Policies Control Compliance Suite Develop and Enforce IT Policies Define Risk and Develop IT Policies Assess Infrastructure and Processes Report, Monitor and Demonstrate Due Care Remediate Problems
  • 27. 27 Protect The InformationProtect The Information Data Loss Prevention Suite Discover Where Sensitive Information Resides Monitor How Data is Being Used Protect Sensitive Information From Loss
  • 28. 28 Manage SystemsManage Systems Altiris Total Management Suite Implement Secure Operating Environments Distribute and Enforce Patch Levels Automate Processes to Streamline Efficiency Monitor and Report on System Status ™
  • 29. 29 Protect The Infrastructure Symantec Protection Suite Protect The Infrastructure Secure Endpoints Protect Email and Web Defend Critical Internal Servers Backup and Recover Data ™
  • 30. 30 Organized Criminal Malicious Insider Organized Criminal Malicious Insider Protect the Infrastructure Develop & Enforce IT Policies Protect the Information Manage Systems • Lack of Visibility • Evolving Threats • Growing Complexity • IT Risk Management • Cost & Complexity of Compliance • Lack of Visibility • Growth of Unstructured Data • Social Media Access • Cloud Computing • Management of HW and SW • Complexity of IT Processes • Operating System Migration Integrated Security Platform Open Platform Console Unification Security Intelligence Dynamic Protection New Challenges Require New Technologies

Editor's Notes

  1. IT security professionals feel they have more to deal with than ever before. Specifically, they have more viruses, more threats (spam, botnets etc.), more surface areas to protect due to people suppliers, customers, contractors and more Information to protect. In fact, regardless of the size of a company, information doubles every year. Finally job descriptions have expanded and not only are IT security professionals responsible for security, they are also responsible for compliance. Our reference labs (powered by Symantec Global Intelligence Network) showed that 2008 was the tipping point for security and landscape changed radically. Just two years ago, hackers were the biggest threat and they were primarily focused on taking down your machines and infrastructure and the only way you knew you were being hit was your PC started to act odd or you saw a spike in network traffic as a worm was moving through your infrastructure. We at Symantec warned at that time that in the future you would be more worried about organized crime and this change happened in 2008. 90% of records lost in 2008 involved organized crime targeting corporate information. That is vastly different than just 2 years ago…. Additional Background on GIN At the heart of all of our products is the Symantec Global Intelligence Network. We are incredibly proud of this Network, and it just gets more and more powerful all the time. We have a 95% detection rate—that’s the highest of any security vendor—and the lowest number of false positives (0.0001%) The Network analyzes over 1.5 billion security alerts daily, validates approximately 5,000 as genuine security threats, and notifies customers of within 10 minutes of discovery This is, by far, the largest, most sophisticated intelligence network on the planet. It scans 30% of the world’s email traffic, processes over 8 billion email messages daily and gathers malicious code data from 130 million systems The Network updates every 5-10 Minutes from 240,000 Sensors In over 200 Countries There are more than 32,000 vulnerabilities in the Symantec vulnerability database There are 2.5 million decoy accounts in the Symantec Probe Network There are 4 Symantec Security Operations Centers located in Australia, UK, USA, India There are 11 Security Response Centers in the USA, Australia, Canada, India, China, Ireland What all of this means is that if there is a malicious attack about to hit you, we know about it first. We block it, we keep it from affecting your business, and we tell you how to take action. It’s about prioritized risk and response, and our intelligence network keeps you protected and tells you what to do first. There simply is no approach that’s faster or more thorough than ours. This Network is the main reason that 99% of the Fortune 500 & 1000 utilize our products. This is what makes all the difference between having security software and knowing that your information is protected 24/7.
  2. Transcript: That includes our flagship endpoint protection product, but it also includes the capabilities to help our customers protect their web traffic and their email infrastructure because, as we saw, those are important vectors for malware to enter a corporate environment. In addition, it's important for our customers to have added hardening and added protection for their critical systems. And then finally, we've heard from our customers that the ability to backup and recover data are important security capabilities, and those are part of our Symantec Protection Suites as well. Author’s Original Notes: Secure Endpoints using Symantec Endpoint Protection (SEP) Protect Email and Web using Brightmail and Web Gateway (Mi5) Defend Critical Internal Servers using Critical Systems Protect (CSP) Backup and Recover Data using Backup Exec System Recovery (BESR) Bridge Solutions A secure infrastructure is a well managed infrastructure – therefore, part of protection is management and our Altiris suite also helps customers maintain both security and compliance