Caspida Cyber Security Presentation at RSA 2014
-
Upload
caspida -
Category
Technology
-
view
2.212 -
download
1
description
Transcript of Caspida Cyber Security Presentation at RSA 2014
![Page 1: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/1.jpg)
Caspida Inc.Caspida Inc.
Do you really know who is on your network?!?
Karthik KannanFounder, CMO
Christos TryfonasFounder, CTO
![Page 2: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/2.jpg)
Caspida Inc.
Tectonic Shifts in Security Industry
The Mobile Cloud EraVanishing boundaries“Security Intel” sharing
![Page 3: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/3.jpg)
Caspida Inc.
Data Security is at its Worst
![Page 4: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/4.jpg)
Caspida Inc.
Your Corporate Jewels are at StakeConfidential corporate data
Private customer data
Revenue, financial loss
Reputation
![Page 5: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/5.jpg)
Caspida Inc.
Attack Vectors are Spreading
It Does N
ot Matte
r!!!
![Page 6: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/6.jpg)
Caspida Inc.
Threat EvolutionThreat type
Complexity
Virus, spyware
Phishing,
malware
Targeted
attacks
Malicious users
APTs
Signature
Object analysis
Machine-learning, behavior models and anomaly detection
Sca
le &
dep
th
• DIY• SIEM• Firewalls• Malware detection
![Page 7: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/7.jpg)
Caspida Inc.
Current Tools: Disservice to you
No dynamic, user-centric approach
Signatures Rules
Malware
![Page 8: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/8.jpg)
Caspida Inc.
Security Professional’s Nightmares
Outdated Toolsets(Firewalls, IDSs, AV,
Anti-Malware)
Thousands of Alerts w/ false
Positives
Significant Attack Variability and Sophistication
(APT, Polymorphic and Low-Grade Attacks)
![Page 9: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/9.jpg)
Caspida Inc.
Mo
bil
e
There is an App for Everything!
SMSPhoneMMSIM
Mobile App Stores
Mobile Device Mgmt (MDM) Mobile App Mgmt (MAM)
Clo
ud
SaaS Monitoring
SaaS Encryption
Web Mail CRM/ERP SaaS Apps (Salesforce, …) Custom Apps/TestDev Clouds
De
sk
top
Password Hashing Antivirus Anti-Malware SW
OS security layering
OS-level Sandboxing
Disk Encryption
Productivity Apps/Development/Test
Security in the Technology Evolution
Application-specific Attacks
(Facebook wall, Browser)
Att
ac
ke
rsA
tta
ck
Ty
pe
s
DDoS(Zombies etc.)
Password GuessingFilesystems / DBsMisconfigurations
Viruses
Malware/Spyware
KeyloggersSniffing
GovernmentsSpecial Interest Groups
PolymorphicAPT
Botnets
Web App Attacks (XSS, etc.)
Phishing
En
terp
ris
e
FirewallsMulti-Factor
AuthenticationIDSAntivirus
Malware Sandboxing
ThreatFeeds
SIEMVPN
Corporate EmailFinance Apps
Corporate Storage/Filers Collaboration Tools/ECM Cloud Apps
Time2000 20131990 2010
Att
ac
k S
op
his
tic
ati
on
![Page 10: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/10.jpg)
Caspida Inc.
Architectural Shifts in SecurityMobile
ApplicationExplosion
EnterprisesWith Cloud and
BYOD/Mobile Access
… Internet
Smart Adversaries(Governments,
Groups etc.)
New Infiltration Methods
Impossible to use any signature or rules-based system
Significant Attack Variability and Sophistication
(APT, Polymorphic and Low-Grade Attacks)
![Page 11: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/11.jpg)
Caspida Inc.
Security Paradigms need a JoltData Science applied to security
Virtual firewalls across mobile & cloud
Location & role-aware security analytics
End to end security intelligence – No more point products
![Page 12: Caspida Cyber Security Presentation at RSA 2014](https://reader034.fdocuments.in/reader034/viewer/2022051616/5562bf3ad8b42aaf178b493c/html5/thumbnails/12.jpg)
Caspida Inc.
Next StepsEngage NOW for free security threat
intelligence
Learn more:−www.caspida.com
Contact:−Karthik Kannan ([email protected])