cyber security intelligence & threat mitigation

14
Cyber Security Intelligence & Threat Mitigation Yaron Bielous Head of Cloud

Upload: allot-communications

Post on 19-Aug-2015

82 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cyber Security Intelligence & Threat Mitigation

Cyber Security Intelligence &

Threat Mitigation

Yaron BielousHead of

Cloud

Page 2: Cyber Security Intelligence & Threat Mitigation

2

About Allot Communications

For more info contact Allot [email protected]

Page 3: Cyber Security Intelligence & Threat Mitigation

3

WAN

Enterprises migrated to Hybrid Cloud

Internet

Hybrid Cloud Users

Private Cloud On Campus

Public Cloud

In the Branch

At Home

On the Road

The Internet is the new IT

Ensuring Availability,

Performance & Security across

Clouds

24/7

BYOD

ALWAYS CONNECTED

Page 4: Cyber Security Intelligence & Threat Mitigation

Allot’s Solution Domains

4

Cloud Access Security

Threat DetectionDDoS ProtectionWeb Security

Cloud Access Optimization

Application Awareness

QoSPolicy Management

Traffic Steering

Network Traffic Analytics

DPI Technology Policy Control

Engines

Allot Service Gateway Allot NetEnforcer Allot NFVPlatforms

Page 5: Cyber Security Intelligence & Threat Mitigation

Granular Web Analytics under encryption

12

Drill-down to Hosts and Apps is possible even when traffic is SSL

encrypted

Page 6: Cyber Security Intelligence & Threat Mitigation

The Anonymity Risks

6

• May indicate illegal activity• DDoS attacks behind anonymizes• Hacking activity behind anonymizes• Malicious activity detection under the anonymize

shield is a significant challenge

Allot Value Proposition:Delivers granular visibility into a wide range of anonymity tools

Page 7: Cyber Security Intelligence & Threat Mitigation

Targeting Illegal DestinationsHow FBI brought down cyber-underworld site Silk Road

8

Page 8: Cyber Security Intelligence & Threat Mitigation

Richest Intelligence Directly from the Wire

8

Broadband

Experience Analytics User Control Regulatory Compliance

Security IntelligenceControl & Care

Mobile

SIEM

Operations Intelligence

Private Cloud

Public Cloud

Internet

Applications

Users

At Home

On the Road

In the Branch

On Campus

USERLOCATIO

NENDPOIN

TNETWORK CONTEN

TAPPLICATIO

N

Page 9: Cyber Security Intelligence & Threat Mitigation

Proactive Web IntelligenceIndepth Analysis

17

Page 10: Cyber Security Intelligence & Threat Mitigation

Individual User’s Activity

Which application are used? When? For how long? On which device?

Page 11: Cyber Security Intelligence & Threat Mitigation

11

Actionable Security – DDoS Protection

DDoS/DoS/Scan attacks per Day

Anti-DDoS as a Service

Automatic/on-demand Mitigation action

Audit User Activity

Page 12: Cyber Security Intelligence & Threat Mitigation

Actionable Security – Web & Mail Protection

HTTP \ WAP

2nd Filter

Full URL Categorizati

on

1st Filter

URL Blacklist

12

URL Filtering – Black List, White List

Categorized Content Filtering

Anti Virus/Malware

Multi-tenancy

User

Access to this website is forbidden!

www.illegalcontent.com

3rd Filter

Virus/Malware

Protection

Page 13: Cyber Security Intelligence & Threat Mitigation

13

Allot Cyber Solutions for a Safer Internet

• Zero day DDoS Mitigation

• 1st line of defense

• Leading anonymity and encryption awareness

• Highly Granular Transaction information at Scale

• Content filtering to illegal web services, and anti-malware protection

Network Protection

Cyber Intelligence

Web Security

Page 14: Cyber Security Intelligence & Threat Mitigation

14

THANKFind out how Allot can help YOUR business to become a leading Digital Lifestyle Provider

Email [email protected]

U• www.allot.com