Web security | data security | email security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

Intrusion Prevention anno 2012: Widening the IPS concept.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Palo Alto Networks Jay Flanyak Channel Business Manager
Enabling business beyond the corporate network.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Security for Today’s Threat Landscape Kat Pelak 1.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
ContentKeeper Electronic Mail Template Concepts Presented by Date.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Marketing of Information Security Products. The business case for Information Security Management.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Honeypot and Intrusion Detection System
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Bill Jensen Bashar Kachachi Session Code: SIA309.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
IS3220 Information Technology Infrastructure Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
September 28, 2016 Taking Control of Network Security In a Web-Centric World ISSA Bryan Wood October 12 th 2011.
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Web Security Flex
Jon Peppler, Menlo Security Channels
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
Introduction to Symantec Security Service
Comodo Dome Data Protection
Presentation transcript:

web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats Anand Tapikar, Regional Presales Manager

Agenda 2 ๏ Modern Threats ๏ Threat Channels ๏ Web 2.0 and outbound data loss ๏ Threat Vector ๏ Defense Strategies ๏ Unified security management ©2010 All Rights Reserved. Websense, Inc.

Phishing attacks Confidential data leaks Drive by download attacks Malware download Blended threats © 2010 Websense, Inc. All rights reserved.3 Modern threats

Threat Channels © 2010 Websense, Inc. All rights reserved.4    Corpora te Webmail    Instant Messagin g    Host ed Applic ations Bl og s    L oc al W ea th er    File Shari ng Y ou Tu be Vi de os    Net worki ng Web 2.0 Sites Popular websites Web mails Instant messaging Corporate corporate laptops connected to home Broadband USB/ removable media Proxy avoidance tools

Web 2.0 and Outbound Data Loss The challenge – enable Facebook and other interactive sites, while preventing outbound data loss. Interactivity has established the Web as a primary data loss vector data loss #2 Threat to Enterprise Security - Inadvertent Exposure of Confidential Information 92% IDC

Business perimeters are fading out Remote users Cloud applications Internet enabled applications Increase use of web 2.0 Technology Lag Vulnerability exposed in common applications © 2010 Websense, Inc. All rights reserved.6 Threat vectors

Proactive rather than reactive Align security strategy to compliment the business Layered and integrated security defense Fix business processes that leads to data leaks Don’t just leave alerts open in the system drive it to closure User awareness © 2010 Websense, Inc. All rights reserved.7 Defense Strategies

8 Top 100 sites Next 1 million sitesNext 100 million sites THE DYNAMIC WEB Constantly changing content Millions of varied pages per site Legitimate sites compromised Legacy security systems obsolete Requires real-time content analysis THE KNOWN WEB Current events, regional, genre sites Less user-generated content Reputation, URL databases fairly effective THE UNKNOWN WEB Junk, personal, scam, adult, etc. Million of new sites appear daily Reputation and URL databases can’t keep up Requires real-time categorization and real-time security scanning Web Traffic

Technology available today ThreatsTechnologies/ Approach Threats from web 2.0URL filtering with Real time scanning Infected popular sitesReal time content scanning, Gateway level antivirus Blended threats SPAM and content control with backend integration with URL filter Data loss through Web, , IM, USB, print channels DLP solutions Attacks through Https (encrypted ) channels, Proxy avoidance tools SSL decryption Remote laptop connected to broadband Remote filtering solutions, Hosting URL solution New /unknown attacksIntelligence sharing, Alert monitoring, security metric reporting, user awareness

Unified security management Intelligence Sharing Web Security Data Security Security unified web and content security Single View of all the controls and logs © 2010 Websense, Inc. All rights reserved. Security Monitoring Change management as per business requirements Risk Assessments

Threats are coming from multi channels so our responses also needs to cover multiple channels Make Security control part of business recovery/continuity Don’t just leave to IT, involve business representative Have proper change management and security workflow Continuous focus on user awareness © 2010 Websense, Inc. All rights reserved.11 Summary

web security | data security | security © 2010 Websense, Inc. All rights reserved. Thank You