220 likes | 573 Views
Targeted at critical assets: High Value Enterprises targeted National Infrastructure targeted Federal/Government Agencies targeted. Modern targeted Malware is used for: Cyber Crime Cyber Espionage Cyber Warfare. FireEye, Inc. Confidential. 2. Modern Malware the new malicious vector . Risin
E N D
1. Combating Modern MalwareThe Next Generation of Cyber Security FireEye, Inc. Confidential
2. FireEye, Inc. Confidential 2 Modern Malware the new malicious vector
Malware is pervasive in today’ Internet landscape. Internet is constantly raining malware, like acid rain, on all connected to it..
Malware – malicious bits hide like poisoned needles in what appears to benign content and benign network traffic. The easily pass in and out of networks, without detection
There is no safe harbor on the Internet – due to ability of highly sophisticated malware to bypass all existing traditional defenses
These malicious bits can be constructed to be: thieves or spies or even bombs
Two types: broadly targeted and narrowly targeted
Malware is pervasive in today’ Internet landscape. Internet is constantly raining malware, like acid rain, on all connected to it..
Malware – malicious bits hide like poisoned needles in what appears to benign content and benign network traffic. The easily pass in and out of networks, without detection
There is no safe harbor on the Internet – due to ability of highly sophisticated malware to bypass all existing traditional defenses
These malicious bits can be constructed to be: thieves or spies or even bombs
Two types: broadly targeted and narrowly targeted
3. Rising Tide of Cyber Espionage FireEye, Inc. Confidential From US military and government targets, DIB targets, to recent industrial espionage
From US military and government targets, DIB targets, to recent industrial espionage
4. Characterizing Modern Malware Confidential
5. Total Collapse of Current Technologies Confidential
6. Modern Malware Infection Cycle For Government Use Only
7. Breaking the Advanced Persistent Threat Confidential Stop What You Know About
Detect What You Don’t Know About
Block callbacks to stop data loss and buy time for IT remediation
Block known, inbound attacks : STOP NEW INFECTIONS
Block known, outbound callbacks : STOP MALICOUS DATA THEFT
Detect unknown, 0-day malware : STOP TARGETED ATTACKS
Dynamically capture & block callbacks : STOP TARGETED DATA THEFT
Stop What You Know About
Detect What You Don’t Know About
Block callbacks to stop data loss and buy time for IT remediation
Block known, inbound attacks : STOP NEW INFECTIONS
Block known, outbound callbacks : STOP MALICOUS DATA THEFT
Detect unknown, 0-day malware : STOP TARGETED ATTACKS
Dynamically capture & block callbacks : STOP TARGETED DATA THEFT
8. FireEye Malware-VM™ Filter KEY POINT:
More in-depth with the FireEye Malware VM analysis
* Proprietary VM technology
* Ability to detect even VM aware malware
* Runs the full OS and browser software stack
KEY POINT:
More in-depth with the FireEye Malware VM analysis
* Proprietary VM technology
* Ability to detect even VM aware malware
* Runs the full OS and browser software stack
9. MAX Cloud protects globally
10. FireEye, Inc. Confidential
11. Enterprise Deployment Architecture Confidential
12. FireEye, Inc. Confidential 12
13. Next Generation of Malware Protection Confidential
14. FireEye, Inc. Confidential 14
15. FireEye, Inc. Confidential 15
16. 16 Copyright 2009 FireEye, Inc. All rights reserved
17. 17 Copyright 2009 FireEye, Inc. All rights reserved
18. 18 Copyright 2009 FireEye, Inc. All rights reserved
19. 19 Copyright 2009 FireEye, Inc. All rights reserved
20. FireEye, Inc. Confidential 20
21. FireEye, Inc. Confidential 21
22. FireEye, Inc. Confidential 22
23. Integrated FireEye/Juniper Enterprise Deployment Architecture KEY POINT:
Multiple types of MPS appliances for the corporate network, branch offices, and even for research purposes.
Malware Analysis
Central Management SystemKEY POINT:
Multiple types of MPS appliances for the corporate network, branch offices, and even for research purposes.
Malware Analysis
Central Management System