getting beyond standalone antivirus to advanced threat protection

25
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing Manager @lombar77

Upload: neila

Post on 08-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Getting Beyond Standalone Antivirus to Advanced Threat Protection. Eric Schwake. Sr. Product Marketing Manager @lombar77. Targeted Attack Trends. 1. Organizations Struggling to Keep Up. 2. A Methodology for Better Protection. 3. How Symantec Can Help. 4. Q & A. 5. Targeted Attacks. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Getting Beyond Standalone Antivirus to Advanced Threat Protection

1

Getting Beyond Standalone Antivirus to Advanced Threat Protection

Eric SchwakeSr. Product Marketing Manager@lombar77

Page 2: Getting Beyond Standalone Antivirus to Advanced Threat Protection

2

Targeted Attack Trends1

Organizations Struggling to Keep Up2

A Methodology for Better Protection3

How Symantec Can Help4

Q & A5

Page 3: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Targeted Attacks

3

Page 4: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Targeted Attacks Defined

4

End goal is most commonly to capture and extract high value information, to damage brand, or to

disrupt critical systems

Broad term used to characterize threats targeted to a specific entity or set of

entities

Often crafted and executed to purposely be covert and

evasive, especially to traditional security controls

Page 5: Getting Beyond Standalone Antivirus to Advanced Threat Protection

How Targeted Attacks Happen

5

Send an email to a person of interest

Spear Phishing

Infect a website and lie in wait for them

Watering Hole Attack

Page 6: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Targeted Attack Trends

6

2013

2012

+91%

Increase in targeted attack campaigns

2011 2012 2013

Email per Campaign

Recipient/Campaign

Campaigns

Duration of Campaign

78

122

29

61

111

23

165

408

779

4 days 3 days 8.3 days

Top 10 Industries Targetedin Spear-Phishing Attacks, 2013Source: Symantec

Public Administration (Gov.)

Services – Professional

Services – Non-Traditional

Manufacturing

Finance, Insurance & Real Estate

Transportation, Gas, Communications, Electric

Wholesale

Retail

Mining

Construction

16%15

141313

65

211

Spear Phishing Attacks by Size of Targeted Organization, 2011 - 2013Source: Symantec

50% 50%39%

18%31% 30%

100%

02011 2012 2013

1,501 to 2,500

1,001 to 1,500

501 to 1,000

251 to 500

1 to 250

2,501+Employees

50% 50%61%

Page 7: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Organizations are Struggling to Keep Up

7

Page 8: Getting Beyond Standalone Antivirus to Advanced Threat Protection

8

Reliance on Silver Bullet Technologies

• A single point product won’t identify all threats

• Most frequent Silver Bullet monitoring technologies: – IDP / IPS

– Anomaly detection (on the rise)

• Individual technologies lack a comprehensive vantage point to detect today’s threats.

32%Average % of incidents detected by IDP / IPS technologies

Page 9: Getting Beyond Standalone Antivirus to Advanced Threat Protection

9

Incomplete Enterprise Coverage

• Companies fail to effectively assess (and update) the scope of their Enterprise

• Enterprise technology trends further challenge scope– Mobile

– Cloud

– BYOD

Page 10: Getting Beyond Standalone Antivirus to Advanced Threat Protection

10

Underestimate SIEM Complexity

• Companies frequently underestimate effort and cost to implement– Technical architecture frequently

under scoped

– Time to implement can take year+

• Struggle to sustain capability– Turnover of “the SIEM expert”

– Focus / Expertise Required 35%Too many false positive responses

72%Collect 1TB of security data or more on a monthly basis

Page 11: Getting Beyond Standalone Antivirus to Advanced Threat Protection

11

Lack of Sufficient Staff / ExpertiseIncreasing Sophistication ≠ More Resources

“We’re at 100% employment in IT security”

– Chief Security Officer

Health Care Organization

83%of enterprise organizations say it’s extremely difficult or somewhat difficult to recruit/hire security professionals

Page 12: Getting Beyond Standalone Antivirus to Advanced Threat Protection

12

Can’t Keep up with Evolving Threats

• Detection program must be evolve as threats evolves– Analyst training / awareness

– SIEM tuning

– Detection methods

– Response tactics

• Varied tactics to keep up with threats: – Open source

– Working groups (ISACs)

– Commercial

28%Sophisticated security events have become too hard to detect for us

35%Do not use external threat intelligence for security analytics

Page 13: Getting Beyond Standalone Antivirus to Advanced Threat Protection

A Methodology for Better Protection

13

Page 14: Getting Beyond Standalone Antivirus to Advanced Threat Protection

The Attack Waterfall

14

Protection Detection Response

256 Billion Attacks

350,000Security Events

The ‘Maybe’s

3,000Incidents

Readiness100+

Security Ops staff

Page 15: Getting Beyond Standalone Antivirus to Advanced Threat Protection

15

Identif

y

Protect

Detect

Respon

d

Recove

r100+

Security Staff

256B attacks

350K events

3000 incidents

Page 16: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Identify or Readiness

16

Threat Intelligence

Asset Management

Policy

Practice

Page 17: Getting Beyond Standalone Antivirus to Advanced Threat Protection

17

Identif

y

Protect

Detect

Respon

d

Recove

r100+

Security Staff

256B attacks

350K events

3000 incidents

Page 18: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Proactive Protection Technologies

18

All Control Points

More than AV

Test URLs in Email

Page 19: Getting Beyond Standalone Antivirus to Advanced Threat Protection

19

Identif

y

Protect

Detect

Respon

d

Recove

r100+

Security Staff

256B attacks

350K events

3000 incidents

Page 20: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Detect

20

Correlate Control Points

Identify Anomalies

Monitor & Test Everything

Page 21: Getting Beyond Standalone Antivirus to Advanced Threat Protection

21

Identify Protect Detect Respond Recover

100+ Security

Staff

256B attacks

350K events

3000 incidents

Page 22: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Respond

22

Automate Correlation

Incident Response

Page 23: Getting Beyond Standalone Antivirus to Advanced Threat Protection

How Symantec Can Help

23

Page 24: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Symantec Advanced Threat Protection

Managed Adversary

Service Insight, SONAR, Thread injection protection

Secure App

Service

Security Simulation

Disarm, Link following, Skeptic

Incident Response

Service

MSS-ATP

Advanced Threat Protection Solution

Cynic

Synapse

Synapse

Protection Detection Response

256 Billion Attacks

350,000Security Events

The ‘Maybe’s

3,000Incidents

Readiness100+

Security Ops staff

24

Page 25: Getting Beyond Standalone Antivirus to Advanced Threat Protection

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

25

Eric [email protected]+1 541 520 6015@lombar77