data center security trendsisfw requirement no. 1 - performance internet border firewall (ngfw)...

29
© Copyright Fortinet Inc. All rights reserved. Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic

Upload: others

Post on 22-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

© Copyright Fortinet Inc. All rights reserved.

Data Center security trends

Tomislav Tucibat

Major accounts Manager, Adriatic

IT Security evolution

How did “threat market” change over the recent years?

3

Problem: Growing Attack Surface

4

Problem: Growing Attack Vectors

An Extensive, Poisoned, Dark, Deep Web

5

BYOD,

mobility and

connected

world

Cloud consumption

Extension of the

Data Center into

the Cloud

Ever increasing

bandwidth

requirements

Advanced

Persistent

Threats and

Growing Attack

Surface

Trends Affecting the Network

Internet of Things

6

What We Used To Think

7

How We Think Today

8

Most Valuable Asset is at Risk

471

614

783

519

0

100

200

300

400

500

600

700

800

900

1000

2012 2013 2014 2015*

US Data Breaches

* Through 08/2015 Source: Identity Theft Resource Center

9

Security Is Now A Board Room Discussion

“63% of Enterprise IT decision makers report a

very high level of Board Level pressure

regarding security”

Source: Lightspeed GMI Survey 2014

10

CIO’s Top Priority

3.10%

6.20% 6.40%

5.80% 6.00%

7.60%

8.10%

11.50%

0.00%

2.00%

4.00%

6.00%

8.00%

10.00%

12.00%

April '13 June '13 Oct '13 Jan '14 Apr '14 June '14 Oct '14 Jan '15

% CIO’s Indicating Security as Top Priority

Source: Morgan Stanley Research, January 2015 98% increase

11

Firewall Spending is Top Priority

$6,150

$2,900 $2,750

$1,900

$1,600 $1,400

$1,100

$500 $400

Firewall/VPN EndpointProtection

Security Software Web Gateway Email Gateway IPS SIEM/Fraud Data LossPrevention

Securty Testing

Dolla

rs (

Mill

ion

s)

IT Security Spending by Technology

Source: Gartner 2014

Common theme with threats

How do threats work in detail?

13

The Threat is Worse Than Ever

*Akylus July 2014

14

With A Consistent Motivation

*Hackmageddon July 2014

15

Companies should be concerned

Prevention techniques sometimes fail, so detection and response tools,

processes, & teams must be added FACT:

GOAL: Reduce time to Find/Detect incidents Reduce time to Investigate incidents Reduce time to Remediate incidents

229 days Average time attackers were on a network before detection

67% Victims were notified by an external entity

16

How to loose 148M USD – a practical guide

1. Get infected by malware from a contractor’s computer. The

malware stole a user’s credentials.

2. Hacker connects using stolen credentials and accesses Target’s

application dedicated to contractors

3. Hacker exploits an internal web app. This exploit allows privileged

code execution, so a set of tools installed on the server hosting the

app.

4. Hackers perform LDAP searches until admin account is identified.

Steal the cached admin token from the web server memory.

5. Hacker creates a new LDAP admin account

6. Hackers copy readable information from reachable DBs (around

70M customer records, but no credit cards)

7. Install malware on POS system, steal 40M credit cards (Kaptoxa

malware)

17

APT lifecycle

Vulnerability

Technology

Best Practices

Network

Architecture

Social

Engineering

18

Key Breach Report Trends

95%

OF MALWARE TYPES

SHOWED UP FOR LESS

THAN A MONTH, AND

FOUR OUT OF FIVE

DIDN’T LAST BEYOND

A WEEK.

70–90%

OF MALWARE SAMPLES

ARE UNIQUE TO AN

ORGANIZATION.

60%

IN 60% OF CASES,

ATTACKERS ARE

ABLE

TO COMPROMISE AN

ORGANIZATION

WITHIN MINUTES.

50%

NEARLY 50% OPEN

E-MAILS AND CLICK ON

PHISHING LINKS WITHIN

THE FIRST HOUR.

23%

OF RECIPIENTS NOW

OPEN PHISHING

MESSAGES AND

11% CLICK ON

ATTACHMENTS.

Strategy to combat Threats

How can you protect yourself?

20

Is There A Silver Bullet For Defeating an ATA?

Advanced

Targeted

Attack

21

Training To Raise Awareness

http://krebsonsecurity.com/2

012/01/phishing-your-

employees-101/

• Policy

• Procedure

• Process

22

Kill Chain of an Advanced Attack

Spam Malicious Email

Malicious Web Site

Exploit

Malware Command & Control Center

Bots leverage legitimate IPs to

pass filters. Social engineering

fools recipient.

Malicious Link

Bot Commands & Stolen Data

Anti-spam

Web Filtering

Intrusion Prevention

Antivirus

App Control/

IP Reputation

Fast flux stays ahead

of web ratings

Zero-days pass IPS

Compression passes

static inspection

Encrypted communication

passes controls

23

Wireless Networks Ranked as the Most Vulnerable IT Infrastructure

Confidential

EndpointCore networkinfrastructure

Wireless Databases Applications Storage Email

Worldwide 45% 29% 49% 25% 17% 11% 25%

EMEA 47% 27% 52% 22% 17% 10% 24%

UK 48% 23% 53% 21% 22% 13% 20%

0%

10%

20%

30%

40%

50%

60%

How vulnerable you believe each is from a security standpoint?

24

Advanced Threats Take Advantage of the “Flat Internal” Network

Existing Firewalls focused on

the Border

Internal network no longer

“trusted”

Many ways into the network

Once inside threats

can spread quickly

EXTERNAL INTERNAL

Email (Phishing) Vulnerabilities

Web Downloads

Social Engineering Exploits

(Zero Days)

Threat Production

+ Recon

1

3 4

Disposal

Package Encrypt Stage Hide, Spread, Disarm, Access,

Contact Botnet CC, Update

Threat Vector Infection

Communication Extraction

2

Border

25

Threat Landscape & Evolving IT Infrastructure

WAN

Internet

Cloud

Home

Office

Internal

Segmentation

Firewall

(ISFW)

Internal

Network (100 Gbps+)

Branch

Office

Private

Cloud

Edge

Gateway

Data Center

ISFW

ISFW ISFW

ISFW ISFW

ISFW

External

Interna

l

26

ISFW Requirement NO. 1 - PERFORMANCE

Internet

Border Firewall (NGFW)

Ports Speeds 1G, 10G

No. of Ports 2 to 12

Throughput Mbps to 1Gbps

Internal Segmentation

Firewall (ISFW)

Interfaces 10G, 40G & 100G

No. of Ports 8 to 48 Ge/10Ge

Throughput 10Gps to 1Tbps

27

High Performance Scalable Enterprise Firewall with Optimum Path Processing (OPP) Engine

UTM (Distributed Enterprise)

UTM (SMB)

Virtual Firewall

SDN Firewall

Cloud Firewall

Internal Segmentation Firewall (ISFW)

Next Generation Firewall (NGFW)

Data Center Firewall (DCFW)

…..

…..

…..

Tbps Mbps

CPU CPU CPU

• Low latency

• High speed

28

Conclusion in short

Technology is important, but it is only a part of the solution

Single vendor solutions may provide an advantage

But only if elements actually work together

Remember your network extends beyond you

Remote employees, third party suppliers and contractors

Your employees are the first line of defense

Equip and use them

Never assume

You’re fully protected and the network hasn’t already been breached

Always look to evaluate new solutions

29

DON’T GO UNPROTECTED