highlight endpoint changes to thwart emerging breaches

18
1

Upload: tripwire

Post on 16-Feb-2017

6.012 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Highlight Endpoint Changes to Thwart Emerging Breaches

1

Page 2: Highlight Endpoint Changes to Thwart Emerging Breaches

2

Cyberthreat Landscape

140MOver 390K malicious programs are found

every dayAV-Test.org

51%On day 0, only 51% of AV scanners detected new malware samplesLastline Labs

85%85% of breaches could be prevented by remediating

known vulnerabilitiesUS CERT

$445B$445 Billion Financial Loss per yearCenter for Strategic and Int’l Studies

Page 3: Highlight Endpoint Changes to Thwart Emerging Breaches

3

Challenge: Enterprise Cyberthreat Gap

Response GapTime between discovery to remediation to limit damage

Detection GapTime between actual breach and discovery

Prevention GapTime to put

preventative measures in place

to avoid future attacks

Have we been breached?

Can we avoid this from happening

again?

How bad is it?

DETECTIONGAP

RESPONSEGAP

PREVENTIONGAP

Page 4: Highlight Endpoint Changes to Thwart Emerging Breaches

4

Challenges to Detect and Respond to Cyberthreats

Advanced attacks – harder to detect and faster compromises

Limited resources/time – need better prioritization, what is at risk? What do I fix first?

Limited context from fragmented tools – need high-confidence accurate information

Page 5: Highlight Endpoint Changes to Thwart Emerging Breaches

5

Tripwire Cyberthreat Security PortfolioDetecting indicators of breach, compromise, and vulnerability

Business Context – connect your security efforts to what matters to your business

Security Automation – apply intelligence and drive automation for more effective operations

Enterprise Integration – across our portfolio but also with other security ecosystem partner solutions

Page 6: Highlight Endpoint Changes to Thwart Emerging Breaches

6

Tripwire Vulnerability Management

Automated discovery, profiling, and scanning

World-class vulnerability research

Risk- and asset-based prioritization

Scalability, integration, and management

Actionable analytics and reporting Multi-tenancy and data segregation

Page 7: Highlight Endpoint Changes to Thwart Emerging Breaches

7

Automated AssessmentAutomated inventory and vulnerability assessment of all network devices and applications

High-accuracy device profiling

Minimal host and network impact

Dynamic host tracking

Continuous asset discovery & assessment

Page 8: Highlight Endpoint Changes to Thwart Emerging Breaches

8

Risk- and Asset-based PrioritizationFocus remediation efforts on highest risks and most critical assets

Exp

loit

Ava

ilabi

lity

Risk Class

Potential Business ImpactLesscritical

Morecritical

0 50,000+

Uniquely combines exploit availability, risk class, and vulnerability age to pinpoint the greatest risks

Business context by asset value Targets remediation efforts for

greatest risk reduction

Page 9: Highlight Endpoint Changes to Thwart Emerging Breaches

9

World-class Vulnerability ResearchDelivering timely coverage for over 100,000 conditions

CommittedDedicated team of

security researchers

RelevantCoverage for vulnerabilities that matter to the enterprise

Responsive24-hour SLA on critical

Microsoft bulletins

InvestedTripwire’s continuing commitment to complete vulnerability coverage

Tripwire VERTVulnerabilities and Exposures Research Team

Page 10: Highlight Endpoint Changes to Thwart Emerging Breaches

10

Leader in Security Configuration Management

PolicyManagerKnow Your

Configuration State

IntegrityManagerKnow What

Happened and Why

Remediation Manager

Know What ToDo About It

Page 11: Highlight Endpoint Changes to Thwart Emerging Breaches

11

Good changes

Bad changes

Agent-based “inside-out” visibility

File integrity monitoring

Device and application discovery

Web app vulnerabilities

Agent-less “outside-in”visibility

Vulnerability assessment

Balanced Proactive and Reactive Security Controls

Page 12: Highlight Endpoint Changes to Thwart Emerging Breaches

12

Delivering Adaptive Threat Protection

The new integration between Tripwire IP360 and Tripwire Enterprise delivers the unique value of Adaptive Threat Protection:

Continuous analysis of an organization’s attack surface Continuous security control automation Significant reduction of overall cyberthreat risk

Page 13: Highlight Endpoint Changes to Thwart Emerging Breaches

13

Manually configure Tripwire Enterprise monitoring based on outdated threat landscape

Detect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation

Produce a PDF report; manually prioritize vulnerability results; handoff results to others

Scan your environment, find assets and vulnerabilities; limited results

The High Cost of Manual Effort

1Scan

2Report

3Combine

4React

Manuallycorrelate vulnerability

results to assets in Tripwire Enterprise

Manual Process (no integration)

Page 14: Highlight Endpoint Changes to Thwart Emerging Breaches

14

Reduce the Threat Gap with Vulnerability Context

Dynamically adapt Tripwire Enterprise monitoring based on the changing threat landscape

Detect and respond to threats, harden critical systems at risk, manually or through Tripwire Enterprise automation

Use factors such as the Tripwire IP360 score and risk matrix to prioritize vulnerability risk

Use Tripwire IP360 to comprehensively profile the assets for vulnerabilities and applications

1Profile

2Prioritize

3Adapt

4Respond

Automated Process (Tripwire IP360 integration)

Page 15: Highlight Endpoint Changes to Thwart Emerging Breaches

15

Vulnerability Intelligence Tags

Vulnerability Risk Score Vulnerability Risk Matrix Vulnerability Watch List Application Watch List Date Last Scanned

Page 16: Highlight Endpoint Changes to Thwart Emerging Breaches

16

Value to CustomersAutomated device and application discovery solution

Private Cloud

VMWare & Hyper-VFast implementation for lower TTV

Easy to deploy hardened security appliance

Low bandwidth, high accuracy & performance

Non-intrusive device and application discovery

Scalable to largest networks in the world Hardware Appliance

1U Rack Mount

Public Cloud

Amazon Machine Image

83k+ vulnerability checks

Page 17: Highlight Endpoint Changes to Thwart Emerging Breaches

17

Scalability, integration, and management

Security Intelligence Hub

Centralized Reporting and

Analytics

CentralizedManagement

Distributed and Scalable

Scanning

Scalable to the largest networks Distributed architecture speeds scanning Enterprise workflow & security integration VMWare, AWS, and Hyper-V deployment Role-based access control Scan independent reporting Real-time analytics Dashboard, trend, audit & drill-down reports

VnE Manager(physical and virtual appliances)

Device Profiler (physical and virtual appliances)

Page 18: Highlight Endpoint Changes to Thwart Emerging Breaches

tripwire.com | @TripwireInc

Thank You

DOWNLOAD THE VULNERABILITY MANAGEMENT BUYERS GUIDE FROM TRIPWIRE.COM

• Navigate recent advancements in vulnerability management technologies• Understand differences between various assessment technologies• Identify the features that are most important to their organization