Palo Alto Networks - Next Generation Security Platform

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Migrating from Juniper to Palo Alto Networks
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Security for Today’s Threat Landscape Kat Pelak 1.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Expose The Underground Advanced Persistent Threats
MIGRATION FROM SCREENOS TO JUNOS based firewall
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Department Of Computer Engineering
What Are We Missing? Practical Use of the Next-Generation Firewall: Controlling Modern Malware and Threats Jason Wessel – Solutions Architect.
Extending Zero Trust To The Endpoint
How to protect your Virtual Datacenter Michiel van den Bos.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
What Did You Do At School Today Junior?
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Ultimate Test Drive A Partner Led Program. The Ultimate Palo Alto Networks Experience 2 | ©2014, Palo Alto Networks. Confidential and Proprietary. The.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Winning with Check point
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
About Palo Alto Networks
Sky Advanced Threat Prevention
The conversation just gets better CIO to CEO The power of collaboration Luis Alvarez BT Global Services.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Critical Infrastructure Protection and the Role of the Next Generation Firewall Blaž Ivanc.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Mail2Cloud Case Study Crescent Electric Supply Company mxHero Solves for Large s & Drives Cloud Adoption 1 Copyright 2016, mxHero Inc.March 8, 2016.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
Palo Alto Networks SLO WUG NG Silvester Drobnič, CHS d.o.o.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Blue Coat Cloud Continuum
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
ABC Company Positioned as a Magic Quadrant Leader
Transform IT with networking innovation Dell Networking
Advanced Endpoint Security Data Connectors-Charlotte January 2016
OIT Security Operations
Market Growth Context – Where would you bet your company’s future?
Secure Software Confidentiality Integrity Data Security Authentication
Jon Peppler, Menlo Security Channels
Virtualization & Security real solutions
Prevent Costly Data Leaks from Microsoft Office 365
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Improving Azure IoT Insights with network context
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Software-Defined Secure Networks in Action
The Next Generation Cyber Security in the 4th Industrial Revolution
Power BI and SharePoint – the road ahead
Microsoft Data Insights Summit
Presentation transcript:

Palo Alto Networks - Next Generation Security Platform Mikko Kuljukka Janne Volotinen

Palo Alto Networks at-a-glance CORPORATE HIGHLIGHTS Founded in 2005; first customer shipment in 2007 Safely enabling applications and preventing cyber threats Able to address all enterprise cybersecurity needs Exceptional ability to support global customers Experienced team of 3,300+ employees Q2 FY16: $334.7M revenue $MM REVENUES ENTERPRISE CUSTOMERS Here are some additional facts you can use based on where we closed at the end of FY15. We’ll update these numbers quarterly following each earnings release. At the end of Q4, ‘15, we had more than 26,000 customers in over 140 countries across multiple industries. As of Q2 ’16, we now have more than 30,000 customers Palo Alto Networks has ranked an ”enterprise firewall market leader” by Gartner in 2011, 2012, 2013 and 2014 (published April 2015). FY’15 revenues grew 55% year over year We have consistently added more than 1,000 customers per quarter for the last 17 consecutive quarters, indicating a strong acceptance of our vision and strategy. We have over 3,300 employees worldwide. We’ve built a world-class global support operations with teams in the Americas, EMEA, Asia, and Japan.

Palo Alto Networks is positioned as a Leader in the Gartner Magic Quadrant for enterprise network firewalls.* Palo Alto Networks is highest in execution and a visionary within the Leaders Quadrant. *Gartner Magic Quadrant for Enterprise Network Firewalls, Adam Hils, Greg Young, Jeremy D’Hoinne, and Rajpreet Kaur, May 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. © 2016 Palo Alto Networks. All Rights Reserved.

DELIVERING THE NEXT-GENERATION SECURITY PLATFORM THREAT INTELLIGENCE CLOUD Next-Generation Threat Intelligence Cloud Gathers potential threats from network and endpoints Analysis and correlates threat intelligence Disseminates threat intelligence to network and endpoints Next-Generation Firewall Inspects all traffic Safely enables applications Sends unknown threats to cloud Blocks network based threats NATIVELY INTEGRATED EXTENSIBLE AUTOMATED CLOUD NETWORK ENDPOINT ADVANCED ENDPOINT PROTECTION Next-Generation Endpoint Inspects all processes and files Prevents both known and unknown exploits Protects fixed, virtual, and mobile endpoints Lightweight client and cloud based NEXT-GENERATION FIREWALL

Making the Firewall a Business Enablement Tool Applications: Enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats, both known and unknown, with Content-ID and WildFire. Lets talk for a moment about how our technology can enable applications, users and content – along with your business. Safe enablement policies begin with accurate classification of the application using App-ID. App-ID uses a combination of signatures, application and protocol decoders, and heuristics to identify all applications, across all ports, all the time - as soon as traffic hits the firewall. The application identity then becomes the basis for your positive enforcement model firewall policies. This means you can safely allow or block certain applications, or specific functionality within or across multiple applications like file sharing or instant messaging. Users make up the next piece of a safe enablement policy. We can tie users, regardless of the device platform, to the application with User-ID and GlobalProtect. User-ID integrates with the widest range of directory services on the market, including Active Directory, and Microsoft Exchange (which brings you Linux or MAC-OS users and LDAP to enable you to build policy around users and groups of users by name, not just IP addresses. An API is also available for non-standard directory integration. For remote or traveling employees working on a laptop, an iOS or Android platform from say, a Starbucks or a customer site, we can include them in the safe application enablement policies with our Global Protect end point solution. Scanning the content within the application is the final enablement policy and that is delivered by Content-ID. IPS, AV, antispyware and URL filtering within Content-ID will allow you to apply very specific threat prevention profiles to your business critical traffic and/or users. The threat prevention engine is stream based and it utilizes a uniform signature format. It looks for a combination of things in a single pass, unlike the silo based AV, IPS and URL filtering. Wildfire provides the ability to identify malicious behaviors typically associated with zero-day attacks found in executable files by running them in a virtual environment and observing their behaviors. When a malicious sample is identified, it is then passed on to the signature generator, which automatically writes a signature for the sample and tests it for accuracy. Signatures are then delivered to all Palo Alto Networks customers as part of the daily malware signature updates. This slide summarizes one of our Core Value Propositions and Main Differentiators from the other vendors: The ability to SAFELY ENABLE APPLICATIONS, USERS AND CONTENT. Now, real quick I want to talk about how the device is sold: We sell a purpose built appliance with a purpose built operating system. Included with the base appliance are all the firewall capabilities: App-ID, User-ID, SSL and IPSEC VPN, SSL decryption and re-encryption, QoS, and Data Filtering. If you are interested in Threat Prevention, URL Filtering – or - Global Protect, these would each require a separate license. Oh, and just so you are aware…there are no user counts anywhere in our licensing model. ONE OF THE MAIN POINTS IS TO EMPHASIZE IS THAT WE INNOVATED HEAVILY TO DELIVER ON THE REQUIREMENTS. IT’S A BIG PART OF OUR CULTURE.

Enabling Applications, Users and Content Palo Alto Networks allows you to build enablement policies that are based on business relevant elements – applications, users and content. It makes perfect sense, right? Your business runs on applications, users and content – shouldn’t your security policies? At the perimeter, you can reduce your organizations threat footprint by blocking a wide range of unwanted applications and then inspecting the allowed applications for threats - both known and unknown. <point out gmail, ultrasurf, tor as examples of applications you would allow and scan for threats; or outright block> In the datacenter, application enablement translates to confirming the applications users and content are allowed and protected from threats while simultaneously finding rogue, misconfigured applications - all at multi-Gbps speeds. In virtualized datacenter environments, organizations can apply consistent application enablement policies while addressing security challenges introduced by virtual machine movement and orchestration. <point out Oracle and Sharepoint as examples> Expanding outwards to enterprise branch offices and remote users, enablement is delivered through policy consistency - the same policy deployed at the corporate location and is extended, seamlessly to other locations. In short, our technology allows you to enable applications for users and protect the associated content – without hindering your business.

Single-Pass Parallel Processing™ (SP3) Architecture Operations once per packet Traffic classification (app identification) User/group mapping Content scanning – threats, URLs, confidential data One policy Parallel Processing Function-specific parallel processing hardware engines Separate data/control planes The Palo Alto Networks firewall allows you to specify security policies based on a more accurate identification of each application seeking access to your network. Unlike traditional firewalls that identify applications only by protocol and port number, the firewall uses packet inspection and a library of application signatures to distinguish between applications that have the same protocol and port, and to identify potentially malicious applications that use non-standard ports. The strength of the Palo Alto Networks firewall is its Single Pass Parallel Processing™ (SP3) engine. Each of the current protection features in the device (Anti Virus, Spyware, Data Filtering and vulnerability protection) utilize the same stream-based signature format. As a result, the SP3 engine can search for all of these risks simultaneously. The advantage of providing a stream based engine is that the traffic is scanned as it crosses the box with a minimal amount of buffering. For further explanation, refer to the document Single_Pass_Parallel_Processing_Architecture.pdf on the Palo Alto Networks website. 7 | ©2014, Palo Alto Networks. Confidential and Proprietary PAN-EDU-SE Palo Alto Networks. Confidential and Proprietary.

PREVENTION AGAINST UNKNOWN THREATS Anti-malware signatures DNS intelligence Malware URL database Anti-C2 signatures 1 2 3 4 SIGNATURE CREATION Soak sites, sinkholes, 3rd party sources Command-and-control Staged malware downloads Host ID and data exfil SANDBOX TESTING WildFire TM Global intelligence and protection shared with all customers SUSPICIOUS TRAFFIC Palo Alto Networks Customers

Protecting all data center traffic Security Network Application Orchestration systems corporate network/DMZ Securing North South traffic Securing East West traffic Segment North South (physical) and East West (virtual) traffic Tracks virtual application provisioning and changes via dynamic address groups Automation and orchestration support via REST-API Virtualized servers Physical servers

Normal Application Execution Gaps Are Vulnerabilities Exploit Techniques Exploit Technique 2 Exploit Attack 1. Exploit attempt contained in a PDF sent by “known” entity. Begin Malicious Activitiy 2. PDF is opened and exploit techniques are set in motion to exploit vulnerability in Acrobat Reader. 3. Exploit evades AV and drops a malware payload onto the target. Exploit Technique 1 Exploit Technique 3 4. Malware evades AV, runs in memory. Normal Application Execution Activate key logger Steal critical data More… Gaps Are Vulnerabilities To gain a better understanding of these exploit techniques and how they are used by attackers, let’s walk through an example: The graphic here represents an application – Adobe acrobat reader, for example. As with most applications, this application has a certain number of vulnerabilities. Some may be known, in which case patches might be available. Other vulnerabilities have yet to be discovered. The application normally runs its normal functions (for example, display a document, print, etc.). The attacker’s goal is to cause the application to do something it is not meant to do (ie, run a piece of code supplied by the attacker). In order to make that happen, the attacker needs to use a series of exploit techniques, in a particular order. If those techniques succeed, the attacker can exploit a vulnerability in the application. So the user in this example opens the PDF document, the document displays as it normally would, but in the background these techniques are set in motion. Click forward, showing the 3 exploit techniques… If all three of these techniques succeed (and they often do because anti-virus is not good at detecting them), the acrobat reader software is exploited and malware can be executed. Click forward to “Begin Malicious Activity”

Normal Application Execution Exploit Techniques Exploit Attack 1. Exploit attempt contained in a PDF sent by “known” entity. 2. PDF is opened and exploit techniques are set in motion to exploit vulnerability in Acrobat Reader. 3. Exploit evades AV and drops a malware payload onto the target. Exploit Technique Blocked 4. Malware evades AV, runs in memory. Normal Application Execution Traps Exploit Prevention Modules (EPM) 1. Exploit attempt blocked. Traps requires no prior knowledge of the vulnerability. Traps EPM Now let’s look at the same scenario again, this time with our Traps Exploit Prevention Modules in place. Our Traps Advanced Endpoint Protection agent runs on the endpoint and injects these exploit prevention modules into each application that runs. This process is seamless and transparent to the end-user. Note that the exploit prevention modules require no knowledge of where the vulnerabilities are in the application. So you are protected from exploitation of both known and unknown vulnerabilities. Click forward: Exploit Technique Blocked. As you can see, as soon as the exploit technique is attempted, it is blocked by Traps. At this point Traps would terminate the application and send a notification to the end-user and the administrator console with detailed information about the attempted attack. No malicious code was allowed to execute so no harm has been done. Now – You might be wondering: “What if the attacker invents a new exploit technique? Or What if the attacker is able to circumvent one of the exploit prevention modules?” Click forward…

Normal Application Execution Exploit Techniques Exploit Technique Blocked Exploit Attack 1. Exploit attempt contained in a PDF sent by “known” entity. No Malicious Activity 2. PDF is opened and exploit techniques are set in motion to exploit vulnerability in Acrobat Reader. 3. Exploit evades AV and drops a malware payload onto the target. Exploit Technique 1 4. Malware evades AV, runs in memory. Normal Application Execution Traps Exploit Prevention Modules (EPM) Traps EPM 1. Exploit attempt blocked. Traps requires no prior knowledge of the vulnerability. 2. If you turn off EPM #1, the first technique will succeed but the next one will be blocked, still preventing malicious activity. As mentioned previously, an attack will only be successful if a series of exploit techniques succeed – usually 3-5. So let’s walk through the scenario where the first exploit prevention module is bypassed and Exploit technique #1 succeeds. Click Click again to the second exploit technique being blocked. Due to the chain-like nature of exploit techniques, even if one succeeds, the next one will be blocked. This will break the chain and prevent successful exploitation of the vulnerable application. So despite the fact that one technique succeeded, the exploit still failed and no malicious activity occurred on the system.. Click – “No Malicious Activity” comes up and the file type starts changing from PDF to other types Remember, we use adobe acrobat as an example here but this can be any application, including proprietary applications. The nature of the Traps exploit prevention modules is such that they do not require any prior knowledge of the application, how it works, or its vulnerabilities.

SAFELY ENABLE APPLICATIONS DATA CENTER Cloud FACILITATE ACCESS REDUCE AND CONTROL RISK Remove threats from wanted traffic Allow desired applications by user, limit high-risk features Visibility into all applications & users on the network

DELIVERING THE NEXT-GENERATION SECURITY PLATFORM THREAT INTELLIGENCE CLOUD Next-Generation Threat Intelligence Cloud Gathers potential threats from network and endpoints Analysis and correlates threat intelligence Disseminates threat intelligence to network and endpoints Next-Generation Firewall Inspects all traffic Safely enables applications Sends unknown threats to cloud Blocks network based threats NATIVELY INTEGRATED EXTENSIBLE AUTOMATED CLOUD NETWORK ENDPOINT ADVANCED ENDPOINT PROTECTION Next-Generation Endpoint Inspects all processes and files Prevents both known and unknown exploits Protects fixed, virtual, and mobile endpoints Lightweight client and cloud based NEXT-GENERATION FIREWALL

Thank you!