attacks and threats are getting - exclusive...

21

Upload: others

Post on 26-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies
Page 2: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Attacks and Threats are Getting More Challenging!

• Advanced Persistent Threats (APTs)

– Often organisationally driven

• Zero Day Exploits

– Defending against the unknown

• Polymorphic Threats

– Ever changing

It’s inevitable that some of these threats will become successful ATTACKS!

Page 3: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

The True Cost of Breach

• Loss of revenue – From outage, no trading

• Damage to reputation – Negative Customer reaction

• Loss of data – Cost of replacement, repair and

compliance

• Interruption to business – Diverting resources will delay core

activity

• Damage to customer confidence – Loyalty & ongoing business delayed or lost

• Damage to investor confidence – Valuation can affect credit limits &

increase costs

• Loss of Intellectual property – Leadership position lost & margin impact

• Legal costs – See all the above!!!

Page 4: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Customer Pain Points • Lack of Visibility

– Anomalies, behaviours, performance degradation

– Indicators of change

• Sheer Volume of Incidents

– Lateral spread

• Incident Response Processes

– Speed of response

• Time to Remediate

– Manpower, skills

• Why Did it Happen?

– Forensics

• Costs

. . . A New Approach is Needed!

Page 5: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Why Exclusive Networks? Exclusive Networks, SuperVAD and trend seeker in the ICT market, proposes a new approach to the Security theme not strictly linked to the features and competencies of a single brand but to the INTEGRATION of different technologies in order to provide customers with protection and remediation solutions developed accordingly their needs and issues.

• Integrates Platform for the First Time

• Drove Development Work with API's

• First World Wide ‘Integrated/Interworking’ Solution Platform

• Use Exclusive Networks to Engineer Demo's and POC's

Page 6: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Downgrades Attacks into known Threats!

Page 7: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Benefits:

• Faster Notification

• Earlier Remediation – Find2Fix

• Improved Visibility & Intelligence

• Vastly Enhanced ‘Post Breach’ Response

• Minimising Damage - Cost/Reputation

• Efficient Use of Limited Resource

Page 8: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

VAR Benefits

• Post Breach – Big Issue

• Addresses a Real Need – NOW

• Good Reason for a Conversation with Customers

• Demo Facility can be Booked

• Incremental Revenue Opportunities

• Demonstrate Value to Customers

• Speak to your Account Manager for Further Information

Page 9: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

The webinar series we are proposing has the goal to present the NEW approach to the Security Issue. • The Past: Relying on the features and competencies of a single brand • The Future: taking advantage of the powerful INTEGRATION of different

technologies. In each webinar you will find out: • How different vendors can be integrated • How different venodrs can cooperate • How to develop and set up with EXN brands a new security SOLUTION, a relaible

platform able to provide customers with a 360 protection solution tailored on their needs and iusses

CARM Webinars

Page 10: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

CARM Webinars

Forescout - Palo Alto Networks –Aerohive An integrated security ecosystem with:

• Network Access Control • Cyber Security & Malware Protection • Wireless Solution

Page 11: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies
Page 12: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

– 5th Generation – a fully distributed environment for the best reliability and performance

– Beyond Connectivity - Cloud-Enabled Services for the maximum onboard capacity

– Simple Deployment and Support Through a centralized dashboard

– Securely Connecting Corporate, BYO And Guest Devices

– PPSK – Private Preshared Secret

Page 13: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Next Gen WLAN resiliency

Page 14: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

BYOD Policy

Restricted VLAN

Limit non-work apps

5Mbps per user

M-F 8am-9pm

CORP Policy

Corp VLAN

Prioritize Work Apps

10Mbps per user

24HR Access

GUEST Policy

Guest VLAN only

No Netflix or BitTorrent

1Mbps max per user

Restricted to 9-5 M-F

IoT Policy

Peripherals VLAN

Limited server access

2Mbps per sensors

24HR access

Policy Driven

Page 15: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

– Assures adequate visibility to the assets and risks on your network

– enforces network access based on user, device and security posture

– Manages effective mobile and BYOD security strategy

– Quickly respond to advanced threats and security breaches

– Collaborates with other security devices already in place on your network

– Continuously monitor your network

– Infrastructure agnostic, flexible

Page 16: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

The CounterACT continuos Monitor

Page 17: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

– Automatically Detect and Prevent Unknown Threats

– Granular malware detection across all protocols

– Automatically creates protections against new threats within 15 minutes

– Detailed forensics to easily prioritize and execute follow-on security actions

– Distribute intelligence and protection across multiple components

Page 18: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Next-Generation Threat Cloud

Gathers potential threats from network and endpoints

Analyzes and correlates threat intelligence

Disseminates threat intelligence to network and endpoints

Inspects all processes and files

Prevents both known & unknown exploits

Integrates with cloud to prevent known & unknown malware

Next-Generation Endpoint

Next-Generation Firewall

Inspects all traffic

Blocks known threats

Sends unknown to cloud

Extensible to mobile & virtual networks

Next-Generation Firewall

Inspects all traffic

Blocks known threats

Sends unknown to cloud

Extensible to mobile & virtual networks

Distributed Protection against APT

Page 19: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

– A host connects to the Wireless Network via PPSK authentication

– CounterACT which monitor the network is aware of this host and knows where it is

– An infected object is downloaded by the client and analysed by WildFire which is in the middle

– As per WildFire decision, the object is classified as malicious

– Wildfire informs CounterACT about the security event

– CounterACT block the infected client by asking Aerohive to DEauthenticate its PPSK key.

Page 20: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

– The benefit of the integration of these three security platform explain the CARM concept

– Cyber Attack Remediation and Mitigation

– The attack has happened and the host was infected

– The network reacts to the malicious event

– The impact has been minimized

Page 21: Attacks and Threats are Getting - Exclusive Networkspassport.exclusive-networks.it/upload/workdoc/CARM... · Security Issue. • The Past: Relying on the features and competencies

Thank you