Attacks and Threats are Getting - Exclusive...
Transcript of Attacks and Threats are Getting - Exclusive...
Attacks and Threats are Getting More Challenging!
• Advanced Persistent Threats (APTs)
– Often organisationally driven
• Zero Day Exploits
– Defending against the unknown
• Polymorphic Threats
– Ever changing
It’s inevitable that some of these threats will become successful ATTACKS!
The True Cost of Breach
• Loss of revenue – From outage, no trading
• Damage to reputation – Negative Customer reaction
• Loss of data – Cost of replacement, repair and
compliance
• Interruption to business – Diverting resources will delay core
activity
• Damage to customer confidence – Loyalty & ongoing business delayed or lost
• Damage to investor confidence – Valuation can affect credit limits &
increase costs
• Loss of Intellectual property – Leadership position lost & margin impact
• Legal costs – See all the above!!!
Customer Pain Points • Lack of Visibility
– Anomalies, behaviours, performance degradation
– Indicators of change
• Sheer Volume of Incidents
– Lateral spread
• Incident Response Processes
– Speed of response
• Time to Remediate
– Manpower, skills
• Why Did it Happen?
– Forensics
• Costs
. . . A New Approach is Needed!
Why Exclusive Networks? Exclusive Networks, SuperVAD and trend seeker in the ICT market, proposes a new approach to the Security theme not strictly linked to the features and competencies of a single brand but to the INTEGRATION of different technologies in order to provide customers with protection and remediation solutions developed accordingly their needs and issues.
• Integrates Platform for the First Time
• Drove Development Work with API's
• First World Wide ‘Integrated/Interworking’ Solution Platform
• Use Exclusive Networks to Engineer Demo's and POC's
Downgrades Attacks into known Threats!
Benefits:
• Faster Notification
• Earlier Remediation – Find2Fix
• Improved Visibility & Intelligence
• Vastly Enhanced ‘Post Breach’ Response
• Minimising Damage - Cost/Reputation
• Efficient Use of Limited Resource
VAR Benefits
• Post Breach – Big Issue
• Addresses a Real Need – NOW
• Good Reason for a Conversation with Customers
• Demo Facility can be Booked
• Incremental Revenue Opportunities
• Demonstrate Value to Customers
• Speak to your Account Manager for Further Information
The webinar series we are proposing has the goal to present the NEW approach to the Security Issue. • The Past: Relying on the features and competencies of a single brand • The Future: taking advantage of the powerful INTEGRATION of different
technologies. In each webinar you will find out: • How different vendors can be integrated • How different venodrs can cooperate • How to develop and set up with EXN brands a new security SOLUTION, a relaible
platform able to provide customers with a 360 protection solution tailored on their needs and iusses
CARM Webinars
CARM Webinars
Forescout - Palo Alto Networks –Aerohive An integrated security ecosystem with:
• Network Access Control • Cyber Security & Malware Protection • Wireless Solution
– 5th Generation – a fully distributed environment for the best reliability and performance
– Beyond Connectivity - Cloud-Enabled Services for the maximum onboard capacity
– Simple Deployment and Support Through a centralized dashboard
– Securely Connecting Corporate, BYO And Guest Devices
– PPSK – Private Preshared Secret
Next Gen WLAN resiliency
BYOD Policy
Restricted VLAN
Limit non-work apps
5Mbps per user
M-F 8am-9pm
CORP Policy
Corp VLAN
Prioritize Work Apps
10Mbps per user
24HR Access
GUEST Policy
Guest VLAN only
No Netflix or BitTorrent
1Mbps max per user
Restricted to 9-5 M-F
IoT Policy
Peripherals VLAN
Limited server access
2Mbps per sensors
24HR access
Policy Driven
– Assures adequate visibility to the assets and risks on your network
– enforces network access based on user, device and security posture
– Manages effective mobile and BYOD security strategy
– Quickly respond to advanced threats and security breaches
– Collaborates with other security devices already in place on your network
– Continuously monitor your network
– Infrastructure agnostic, flexible
The CounterACT continuos Monitor
– Automatically Detect and Prevent Unknown Threats
– Granular malware detection across all protocols
– Automatically creates protections against new threats within 15 minutes
– Detailed forensics to easily prioritize and execute follow-on security actions
– Distribute intelligence and protection across multiple components
Next-Generation Threat Cloud
Gathers potential threats from network and endpoints
Analyzes and correlates threat intelligence
Disseminates threat intelligence to network and endpoints
Inspects all processes and files
Prevents both known & unknown exploits
Integrates with cloud to prevent known & unknown malware
Next-Generation Endpoint
Next-Generation Firewall
Inspects all traffic
Blocks known threats
Sends unknown to cloud
Extensible to mobile & virtual networks
Next-Generation Firewall
Inspects all traffic
Blocks known threats
Sends unknown to cloud
Extensible to mobile & virtual networks
Distributed Protection against APT
– A host connects to the Wireless Network via PPSK authentication
– CounterACT which monitor the network is aware of this host and knows where it is
– An infected object is downloaded by the client and analysed by WildFire which is in the middle
– As per WildFire decision, the object is classified as malicious
– Wildfire informs CounterACT about the security event
– CounterACT block the infected client by asking Aerohive to DEauthenticate its PPSK key.
– The benefit of the integration of these three security platform explain the CARM concept
– Cyber Attack Remediation and Mitigation
– The attack has happened and the host was infected
– The network reacts to the malicious event
– The impact has been minimized
Thank you