using cloud security to better protect your … cloud security to better protect your organization ....

23
Barry Fisher, Cloud Security Product Team FEBRUARY 2017 Using cloud security to better protect Your organization

Upload: dangmien

Post on 13-Mar-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Barry Fisher, Cloud Security Product Team FEBRUARY 2017

Using cloud security to better protect Your organization

By 2020, Cisco Global Cloud Index estimates:

92% of global data center traffic will come from the cloud.

By 2021, Gartner estimates:

25% of corporate data traffic will bypass perimeter security.

Agenda What’s happening in the market

Defining the Secure Internet Gateway

What sets Cisco Umbrella apart

Business apps Salesforce, Office 365,

G Suite, etc.

Branch office

Critical infrastructure Amazon, Rackspace, Windows Azure, etc.

Roaming laptops

Workplace desktops

Business apps

Critical infrastructure

Internet The way we work has changed

Users and apps have adopted the cloud, security must too

Security controls must shift to the cloud

70% increase in

SaaS usage

70% of branch offices

have DIA

49% of the workforce

is mobile

82% admit to not using

the VPN

On and off the corporate network

All ports and protocols

Open platform

Live threat intelligence

Proxy and file inspection

Discovery and control of SaaS

Your secure onramp to the internet, anywhere users go

Secure Internet Gateway

Discovery and control of SaaS

User & entity behavior analytics for compromised accounts and insider threats

Cloud DLP for data exposure and compliance violations

App firewall for cloud malware and shadow IT

Protect the usage of business applications and critical infrastructure in the cloud

Cloud Access Security Broker

How a SIG compares to a NGFW

Main focus: Control inbound and

outbound traffic and inspect threats at the perimeter

Main focus: Secure internet access,

anywhere users go

SIG NGFW

SIG Secure internet

access, anywhere users go

SWG Granular web usage

controls for compliance and protection

Open platform w/ bi-directional API integrations

SaaS discovery and control; works w/ CASB

Internet traffic enforcement for all ports & protocols

Cloud-delivered security to cover on and off-network

Web traffic enforcement for ports 80/443 and HTTP/S

Web application visibility and control Future release

Web content filtering

Web data loss prevention

Web productivity and bandwidth control

How a SIG compares to a SWG

How a SIG compares to a SWG

SWG

TALOS AND AMP SUPPORTING ENTIRE CISCO SECURITY PORTFOLIO

SIG

DNS and IP layer

HTTP/S layer

AMP

Problem: Incomplete coverage of destinations and files

PREDICTIVE DESTINATION

INTEL

HTTP/S layer

AV REACTIVE FILE INTEL

RETROSPECTIVE FILE INTEL

VENDOR + CUSTOMER FEEDS

VENDOR FEEDS

SIG works with your security stack Malware C2 Callbacks Phishing

HQ

Sandbox

NGFW

Proxy

Netflow

AV AV

BRANCH

Router/UTM

AV AV

ROAMING

AV

First line Network and endpoint

Network and endpoint

Endpoint

SIG

Safe access anywhere users go, even off VPN

First line of defense and inspection

Secure onramp to the internet

Cisco Umbrella Visibility and protection everywhere

Enforcement built into the foundation of the internet

Intelligence to see attacks before launched

Enterprise-wide deployment in minutes

Malware C2 Callbacks Phishing

208.67.222.222

DNS Overview

Authoritative DNS Owns and publishes the “phone books”

Domain registrar Maps and records names

to #s in “phone books”

Recursive DNS Looks up and remembers

the #s for each name

Remote sites

Enterprise location B

Internal Windows DNS server

Enterprise location C

Internal BIND server

Who resolves your DNS requests?

Challenges Multiple internet service providers

Direct-to-internet branch offices

Users forget to always turn VPN on

Different DNS log formats

Enterprise location A

Internal InfoBlox appliance

Home users

Roaming laptops ISP2

ISP1

ISP3

ISP?

ISP?

ISP?

Recursive DNS for internet domains

Authoritative DNS for intranet domains

Remote sites

Enterprise location B

Internal Windows DNS server

Enterprise location C

Internal BIND server

Using a single global recursive DNS service

Benefits Global internet activity visibility

Network security w/o adding latency

Consistent policy enforcement

Internet-wide cloud app visibility

Enterprise location A

Internal InfoBlox appliance

Home users

Roaming laptops ISP2

ISP1

ISP3

ISP?

ISP?

ISP?

Recursive DNS for internet domains

Authoritative DNS for intranet domains

Authoritative DNS logs Used to find: Newly staged infrastructures Malicious domains, IPs, ASNs DNS hijacking Fast flux domains Related domains

User request patterns Used to detect: Compromised systems Command and control callbacks Malware and phishing attempts Algorithm-generated domains Domain co-occurrences Newly registered domains

Gather intelligence and enforce security at the DNS layer

Any device

Recursive DNS

root com. domain.com.

Authoritative DNS

Enforcement built into foundation of internet

Umbrella provides:

Connection for safe requests

Prevention malicious requests

Proxy inspection for risky requests

File inspection AV Engines Cisco AMP

URL inspection Cisco Talos feeds

Cisco WBRS Partner feeds

Requests for “risky” domains Intelligent proxy

Intelligence to see attacks before launched

Data 100B DNS requests resolved per day Diverse dataset gathered across 85M users

across 160 countries Security researchers 250+ industry renown researchers across

Cisco Talos and Umbrella Build models that can automatically

classify and score domains and IPs

Models Dozens of models continuously analyze

millions of live events per second Automatically score and identify malware,

ransomware another threats

Statistical and machine learning models

Guilt by inference Co-occurrence model

Sender rank model

Secure rank model

Guilt by association Predictive IP Space Modeling

Passive DNS and WHOIS Correlation

Patterns of guilt Spike rank model

Live DGA prediction model

Natural Language Processing rank model

INTELLIGENCE

2M+ live events per second

11B+ historical events

SIG Vision

Threat intelligence, cross-product analytics, APIs, and integrations

DNS-Layer Proxy App visibility and control*

Sandbox 3rd-Party New product*

Leveraging a global footprint

CASB controls

File inspection

Inbound inspection*

*Future