Layered Security Why It Works Webcast
Layered Security Why It Works Webcast
Sponsored by Symantec
Todays Speakers
Jerry Shenk, SANS Analyst Kat Pelak, Senior Product Marketing Mgr., Symantec
Layered SecurityIntroduction
No Silver Bullet
Anti-virus:
On the mail server At the workstation
Firewall:
Ingress filtering (inbound) Egress filtering (outbound)
Traffic monitoring:
The latest thing
2013 The SANS Institute www.sans.org 4
Defense In Depth
Risk analysis is the starting point:
What data is important?
Where does it reside? How could it be exploited?
Layered Security
Roots in military science:
Deep defense or defense in depth
Goals:
Slow an attacker Cause enemy casualties
Network Controls
Firewalls
Ingress restrictions Egress restrictions
10
Antivirus
Commonly used as a single layer Attackers work to avoid detection
11
Reputation
File checksum:
Mathematical fingerprint Known good Known bad Unknown
IP address or domain:
Countries Addresses with detected hostile traffic
2013 The SANS Institute www.sans.org 12
Behavioral Analysis
Prevention is best but detection is a must. Baselining normal behavior with the help of:
Firewalls Routers Flow collectors Network taps
13
14
15
16
Conclusion
Attackers attack various layers!
66%
Breaches went undetected for 30 days or more
4
Months to remediate
243
Days before detected
42%
Increase in Targeted Attacks Last Year
19
7 Billion
File, URL & IP Classifications
1 Billion+
Devices Protected
2.5 Trillion
Rows of Security Telemetry
550
Threat Researchers
240 Million+
Contributing Users & Sensors
Symantec Targeted Attack Protection
14
Operations & Response Centers
20
21
Global Intelligence
Endpoint Gateway Data Center
New
Network Threat Protection for Mac
Symantec Targeted Attack Protection
Intrusion Prevention
Symantecs patented Network Intrusion Prevention System blocks attackers from connecting over the network to your PCs and injecting their attacks.
Advanced Scanning
Symantecs nextgeneration scanning technology blocks suspicious files even those with no fingerprint before they can run and steal your data.
Insight Reputation
Our Insight System Monitors software The reality is that threats leverages the wisdom of as it runs on your occasionally get through Symantecs 100s of endpoints and Our aggressive SMR millions of users to automatically blocks technology roots out such compute safety ratings for software with suspicious entrenched infections and every single software file behaviors even if that kills them in seconds. on the planet, and uses software has never been this to block targeted seen before. attacks.
23
24
Identify anomalies
Delivery behavior, message attributes, social engineering tricks, attachment method
Evasion Tactics
Understands short URLs, freewebs, delays, multi hops, multi destination
25
Thank you!
[email protected] Twitter: KatherynePelak
Copyright 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
26
Q&A
Please use GoToWebinars Questions tool to submit questions to our panel.
Send to Organizers
and tell us if its for a specific panelist.
27
Acknowledgements
Thanks to our sponsor:
Kat Pelak
And to our attendees: