cyber security intelligence & threat mitigation · allot’s solution domains 4 cloud access...

14
April 1st 2015 Cyber Security Intelligence & Threat Mitigation Yaron Bielous Head of Cloud

Upload: others

Post on 17-Apr-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

April 1st 2015

Cyber Security Intelligence & Threat Mitigation

Yaron BielousHead of Cloud

Page 2: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

2

About Allot Communications

Page 3: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

WAN

Enterprises migrated to Hybrid Cloud

3

Internet

Hybrid Cloud Users

Private Cloud On Campus

Public Cloud

In the Branch

At Home

On the Road

The Internet is the new IT

Ensuring Availability, Performance &

Security across Clouds

24/7

BYOD

ALWAYS CONNECTED

Page 4: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Allot’s Solution Domains

4

Cloud Access Security

Threat DetectionDDoS ProtectionWeb Security

Cloud Access Optimization

Application AwarenessQoS

Policy ManagementTraffic Steering

Network Traffic AnalyticsDPI Technology Policy Control

Engines

Allot Service Gateway Allot NetEnforcer Allot NFVPlatforms

Page 5: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Granular Web Analytics under encryption

12

Drill-down to Hosts and Apps is possible even when traffic is SSL encrypted

Page 6: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

The Anonymity Risks

6

• May indicate illegal activity

• DDoS attacks behind anonymizes

• Hacking activity behind anonymizes

• Malicious activity detection under the anonymize shield is a significant challenge

Allot Value Proposition:Delivers granular visibility into

a wide range of anonymity tools

Page 7: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Targeting Illegal DestinationsHow FBI brought down cyber-underworld site Silk Road

8

Page 8: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Richest Intelligence Directly from the Wire

8

Broadband

Experience Analytics User Control Regulatory Compliance

Security IntelligenceControl & Care

Mobile

SIEM

Operations Intelligence

Private Cloud

Public Cloud

Internet

Applications

Users

At Home

On the Road

In the Branch

On Campus

USER LOCATION ENDPOINT NETWORK CONTENT APPLICATION

Page 9: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Proactive Web IntelligenceIndepth Analysis

17

Page 10: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Individual User’s Activity

Which application are used? When? For how long? On which device?

Page 11: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Actionable Security – DDoS Protection

11

DDoS/DoS/Scan attacks per Day

Anti-DDoS as a Service

Automatic/on-demand Mitigation action

Audit User Activity

Page 12: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Actionable Security – Web & Mail Protection

HTTP \ WAP

2nd Filter

Full URL Categorization

1st Filter

URL Blacklist

12

URL Filtering – Black List, White List

Categorized Content Filtering

Anti Virus/Malware

Multi-tenancy

User

Access to this

website is forbidden!

www.illegalcontent.com

3rd Filter

Virus/MalwareProtection

Page 13: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

13

Allot Cyber Solutions for a Safer Internet

• Zero day DDoSMitigation

• 1st line of defense

• Leading anonymity and encryption awareness

• Highly Granular Transaction information at Scale

• Content filtering to illegal web services, and anti-malware protection

Network ProtectionCyber Intelligence Web Security

Page 14: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

THANK

Find out how Allot can help YOUR business to become a leading Digital Lifestyle Provider

Email [email protected]

U

• www.allot.com 14