Threat Management Service October 2015. Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Security Life Cycle for Advanced Threats
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Boost your network security with NETASQ Vulnerability Manager.
Microsoft Ignite /16/2017 4:54 PM
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
(Geneva, Switzerland, September 2014)
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
The Most Analytical and Comprehensive Defense Network in a Box.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
The Changing World of Endpoint Protection
$3.5M The average cost of a data breach to a company 243 The average number of days that attackers reside within a victim’s network before detection 76%
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Techcello Provides SaaS Lifecycle Management Solution to “SaaS-ify” Your Application Efficiently on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security Information and Event Management
Marin Frankovic Datacenter TSP
Synchronized Security Revolutionizing Advanced Threat Protection
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
Some Great Open Source Intrusion Detection Systems (IDSs)
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Protect your Digital Enterprise
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
OIT Security Operations
Comprehensive Security and Compliance at an Affordable Price.
Critical Security Controls
“Introduction to Azure Security Center”
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Active Cyber Security, OnDemand
بهترین راهکار را انتخاب کنید...
THE NEXT GENERATION MSSP
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
Threat Monitoring and Defense A fully managed and monitored security and compliance solution for cloud, hybrid, & on-premises infrastructure.
Cyber Security in a Risk Management Framework
Presentation transcript:

Threat Management Service October 2015

Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a- Service provider focused on real-time event analysis & management It developed MOREAL to proactively combat known and unknown threats to network security within an enterprise and give enterprises efficient access to security services via its cloud-based model

Managed Security Services from PCCW Global PCCW Global offers a suite of Managed Security Services that are designed to optimize and protect your network 3 Managed FirewallHosted Firewall Anti Distributed Denial of Service Threat Management Service PCCW Global offers a suite of Managed Security Services that are designed to optimize and protect your network

What is MOREAL? MOREAL is a solution for identifying network security threats in real-time and providing actionable information for combating attacks on an organisation. 4 Self-Learning Threat Database Proactive Real-Time Threat Identification Efficient non-intrusive deployment Scalable Cloud-Based Security MOREAL mines data from existing network elements to identify known and unknown threats and protect your organization from revenue loss and reputation damage

Security Operation Centers SOC: Athens, Herndon & Hong Kong DC: Amsterdam, London, Dallas, Los Angeles, Singapore & Hong Kong 5 7X24 Security Operation Centers Proactive monitoring Emergency Response & Incident Handling Teams Security Research Team Amsterdam London Athens Los AngelesDallas Herndon Hong Kong Singapore Hong Kong

Security Challenges 6

7 $171m $94m $66m $61m $14m $0.5 - $1.0m PlayStation 3 data breach (April 2011) 1.5 million credit card records stolen (April 2012) SecureID intellectual property breach (March 2011) 40 million credit and debit cards stolen (December 2013) 1.9 million Social Security numbers stolen (October 2012) 6 million passwords stolen (June 2012) $3 trillion $67 billion Cybercrime Cost Source: ISACA Annual Security Investments Source: Gartner The Cost of Cybercrime

An Increasingly Sophisticated Landscape M Security incidents increased by 48%, to 42.8 million, the equivalent of 120,000 attacks a day. The average cost of managing and mitigating data breaches rose to $2.7m per incident, over a third more than in Price Waterhouse Coopers Global State of Information Security Survey 2015 Attacks are more frequent, sophisticated, and damaging to an enterprise

The Need for a New Approach “Organisations must assume they are compromised, and, therefore, invest in detective capabilities that provide continuous monitoring for patterns and behaviours indicative of malicious intent”. ̶ Malware Is Already Inside Your Organisation; Deal With It – Gartner At Risk: RevenueReputationProfitabilityLong-Term Trust

10 Our Positioning - The Market Lacks Responsive Security Recovery Prevention Response Detection IT Tools Backup Virtualization Advanced Persistent Threat Security Information and Event Management Vulnerability Assessment Antivirus Intrusion Prevention Systems Firewalls AntiSpam Content Filtering Anti Denial of Service Threat Management Service Anti DDoS Managed Firewall Hosted Firewall

Our Solution 11

Network Threat Management Network threats may be categorized as: Threats you know about. Threats you don’t know about. Threats you only find out about after a compromise. 12 Most security services rely on recognizing known threats rather than new or constantly changing threats. Our Threat Management Service continuously scans for threats in real-time, self-learns, and provides actionable threat identification. It is designed to identify known, unknown and even threats that have compromised your security but have yet to do harm to your organization

Threat Management Service 13 PCCW Global‘s Threat Management Service provides a 7x24 threat monitoring and identification system together with an integrated security advisory service This threat management service is made up of two components Threat Intelligence Platform Proactively analyses collected CPE and Security device logs Automatic threat identification, monitoring, reporting and alerting Security Operation Centres (SOC) with security expertise Security Incident Investigation Security Advisory -Per-incident mitigation recommendation -Regular customer review meeting MOREALProfessional Security Service

Access advance analytics and actionable reports via a single intuitive dashboard View network health, utilization & security in real-time Leverage a global threat database that uses Big Data and crowd- sourcing to identify emerging threats Use an advance correlation engines for known & unknown threats identification, now penetrating and already existing in your network Deploy enhanced security simply and quickly via pure cloud solution with hybrid options available. Pay as you grow subscription with low total cost of ownership 14 MOREAL gives you a complete view of your network health and security to identify existing and emerging threats in real-time. It has been designed to self-learn and leverage a continually evolving global threat database What Does MOREAL Deliver?

The Intelligence MOREAL Provides 15 View in browser. Identified network threats on single screen  Multi-vendor support. Alerts graded by severity.  Includes recommended counter measures. Automatic counter measures possible using ACL, SNORT or YARA Customizable reports. Network forensics on retained log history.  Log retention period specified by customer.  Post compromise analysis.

A New Layer of Network Defense Unified Threat Management, Next Generation Firewalls, Secure Web Gateways, Intrusion Detection Systems, Intrusion Prevention Systems Web Application Firewall, Denial of Service, etc. 16 Risk & Compliance Tools Network & Application Security Vulnerability Assessment Security Information and Event Management, etc. Responsive security - Moving from Prevention to Detection A new layer of defence, complementing existing ones and maximizing value of logs already generated & collected Non-intrusive and an OS independent solution for rapid deployment Threat aggregation and behavioural analysis identifies threats in their infancy Real-time mitigation recommendations Expands the visibility of existing security systems and hardware Expands the lifespan of existing security solutions, driving cost efficiency

How It Works 17

5 Steps to Recognizing Cyber Attack Patterns 18 Customer 1 MOREAL continuously receives logs from customer Network Elements. 2 MOREAL correlates the logs between Network Elements to get a “big picture” of all network activity. 3 MOREAL checks network activity behavior with external threat intelligence and identifies threats. 4 MOREAL advises customer of threat and recommended remedial action. 5 MOREAL provides “SINGLE SCREEN” consolidated view of all network threats. All this happens in REAL TIME MOREAL All flows in real time Network Elements MOREAL Threat Intelligence Platform Logs Threat Alerts

Where Does the Data Come From? Network Elements Routers Firewalls Next Generation Firewalls Web Proxy Unified Threat Management Advance Persistent Threat Secure Web Gateways Intrusion Prevention System/ Intrusion Prevention Detection Distributed Denial Of Service 19 MOREAL is vendor agnostic and captures data from a variety of network elements to create a complete view of the network

MOREAL Threat Identification Engine 20 A continuously updated threat database known as ThreatDB is maintained. Baseline network flows per user, and other key metrics updated in real time are stored in the Behavioural Analytics engine. Together these are combined in the Threat Logic module to produce network security threat alerts. The technology is self-learning and is able to identify new threats even if they have never been seen before. MOREAL uses advanced big data analytics and machine learning. Threat DB All threats indexed, ready to be correlated Threat Logic Real-Time analysis threat evolution Behavioral Analytics Prediction of threat paths with high criticality & likelihood

Global Threat Intelligence Threat DB is a database of global cyber attacks, constantly updated from multiple sources 21 Threat DB: Threats normalized & indexed Customers CERTs Academia Industry Leaders Etc. Security Research Incident Handling Feeds Normalization

22 Threat DB 1.Network element logs are created and shared with MOREAL 2.Logs are correlated with the global threat database 3.Behavioural Analysis evaluates regular behaviour of that network and its users 4.Threat Logic scoring of the probability of threat 5.Real-Time analysis of threat and recommendations for mitigation 6.All steps are visible to the user via the dashboard 7.Threat alerts to customer via the dashboard, an or SMS 8.Admin or PCCW Global SOC Takes Action Threat LogicBehavioural Analytics Network Element logs from Customer Dynamic external threat search & aggregation Dashboard Alert Admin

23 The MOREAL Difference Real-Time Intelligence MOREAL gives you the ability to identify threats to your organization based on its data mining capabilities and traffic pattern recognition Global Security MOREAL has been deployed on PCCW Global’s network and is capturing data on potential threats globally and on a daily basis Enhancing Security Solutions MOREAL extends the life of your existing security solutions and adds a layer of proactive and real-time threat intelligence Long-Term Learning MOREAL’s threat database is continually learning and evolving to protect your organization from present and future threats

24 Thank you!