© Blue Coat Systems, Inc. 2011. All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 22 Simple Mail Transfer Protocol (SMTP)
Advertisements

1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Facebook Part III How to Use the Features of Facebook Patrick Therrien Technology & Education Training Specialist.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
ZMQS ZMQS
Streaming Video over the Internet
Nathan Labadie Systems Engineer, US-Central FireEye
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
© 2009 VMware Inc. All rights reserved View Pool Image Configuration Considerations for Gold Images around Application virtualization and performance.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Chapter 1: Introduction to Scaling Networks
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
Enabling business beyond the corporate network.
What’s New in Fireware XTM v11.8.3
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Services Course Windows Live SkyDrive Participant Guide.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Addition 1’s to 20.
25 seconds left…...
® Microsoft Office 2010 Browser and Basics.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
What’s New in WatchGuard Dimension v1.2
Week 1.
We will resume in: 25 Minutes.
1 Unit 1 Kinematics Chapter 1 Day
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Lesson 30 Computer Safety and Ethics
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
Microsoft Volume Licensing
Tim Davidson System Engineer
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Adding WAN Optimisation to Boost Storage Sales Success Blue Coat in a Virtual World.
Secure your users Accelerate your data.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
Visibility – acceleration - security
© 2015 iboss, Inc. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Senior Network Architect.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Web Content Security Unlock the Power of the Web
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
Introducing ProxyClient
Home Internet Vulnerabilities
New Web Security Bundles For 1500 Users and Below
Presentation transcript:

© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats

© Blue Coat Systems, Inc All Rights Reserved.Harvest The APT Attack Lifecycle Entry Penetration 2

© Blue Coat Systems, Inc All Rights Reserved. Putting Social Networking to Work 2011 Security Reports: Highlights Mitigating the Malware Threat The Value of Granular Controls Accelerating Valued Content AGENDAAGENDA 3

© Blue Coat Systems, Inc All Rights Reserved. Desktop AV WebFilter w/ WebPulse Firewall SG IDS ProxyAV ProxyClient/ Cloud Svc DLP PacketShaper Layered Defenses Attackers use multiple tools, so should you Attackers use multiple tools, so should you Ensure overlap and avoid gaps Ensure overlap and avoid gaps APT The best attacks still leave tracks Read and Correlate logs, identify anomalies and connect the dots 4

© Blue Coat Systems, Inc All Rights Reserved. Web Security Options Real-Time Defense Services Multi-Layer SWG 5

© Blue Coat Systems, Inc All Rights Reserved. Cloud Intelligence Awareness from millions of users, feeds, etc. Awareness from millions of users, feeds, etc. Real-time inputs & content analysis Real-time inputs & content analysis Malware, phishing and call-home web threat detection Malware, phishing and call-home web threat detection Scalable Scalable Minimize patches & downloads Minimize patches & downloads Maintained by Security Experts Maintained by Security Experts Cloud Services Network Monitors SWG Mobile Workers XSPs Consumer 6

© Blue Coat Systems, Inc All Rights Reserved. Flexible, Hybrid Deployments Remote User Internet Cloud Intelligence Cloud Services (XaaS) DLP Antivirus Web Filtering Reporter 7

© Blue Coat Systems, Inc All Rights Reserved. Putting Social Networking to Work 2011 Security Reports: Highlights Mitigating the Malware Threat The Value of Granular Controls Accelerating Valued Content AGENDAAGENDA 8

© Blue Coat Systems, Inc All Rights Reserved. Granular Web Application Controls Safe Search Safe Search Major Engines supportedMajor Engines supported Media Search engines as wellMedia Search engines as well Keyword SearchesKeyword Searches Social Networks Social Networks Regulate OperationsRegulate Operations Restrict abuseRestrict abuse Multi-media Multi-media PublishingPublishing SharingSharing Web Mail Web Mail Upload Video Upload Photo Post Message Send Download Attachment Upload Attachment 9

© Blue Coat Systems, Inc All Rights Reserved. Facebook Demo next: AV Filtering Demo

© Blue Coat Systems, Inc All Rights Reserved. 11

© Blue Coat Systems, Inc All Rights Reserved. 12

© Blue Coat Systems, Inc All Rights Reserved. 13

© Blue Coat Systems, Inc All Rights Reserved. Facebook Demo next: Block outgoing messages

© Blue Coat Systems, Inc All Rights Reserved. 15

© Blue Coat Systems, Inc All Rights Reserved. 16

© Blue Coat Systems, Inc All Rights Reserved. Putting Social Networking to Work 2011 Security Reports: Highlights Mitigating the Malware Threat The Value of Granular Controls Accelerating Valued Content AGENDAAGENDA 17

© Blue Coat Systems, Inc All Rights Reserved. Packet Shaping Visibility 18

© Blue Coat Systems, Inc All Rights Reserved. Packet Shaping Visibility 19

© Blue Coat Systems, Inc All Rights Reserved. Video Optimization Requirements Blue Coat Optimized Video Delivery Live Stream-splitting Video-on-Demand Caching with eCDN Adobe Flash, HTTP/SSL, HTML5, Windows Media, Silverlight Scale Video Bandwidth: 10x, 100x, 1000x Reduce Recreational Video by 30-80% Protect Critical Apps from Video Floods Branch Office Video Server 20

© Blue Coat Systems, Inc All Rights Reserved. Top N Applications Trended over time Visually stacked Identify spikes Application Utilization Trending 21

© Blue Coat Systems, Inc All Rights Reserved. Comprehensive Reporting Application Reports Application Reports Response timeResponse time UtilizationUtilization Site Reports Site Reports Response timeResponse time WAN utilizationWAN utilization Top users, apps, etc.Top users, apps, etc. Host Reports Host Reports Top talkers, listeners, DSCPs, etc.Top talkers, listeners, DSCPs, etc. Advanced Protocol Support Advanced Protocol Support VoIP ReportingVoIP Reporting WAN OptimizationWAN Optimization 22

© Blue Coat Systems, Inc All Rights Reserved. ??? AGENDAAGENDA 23

24