1 / 25

RSA – The Big Picture

RSA Identity Protection and Verification Adaptive Authentication, Anti-eFraud Solutions David Mateju RSA Sales Consultant david.mateju@rsa.com. Encryption Store, Transport. IT infrastructure. information. Access Authentication, Authorization , Anti-fraud Solutions. DLP Data Loss Prevention.

Download Presentation

RSA – The Big Picture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RSA Identity Protectionand VerificationAdaptive Authentication, Anti-eFraud SolutionsDavid MatejuRSA Sales Consultantdavid.mateju@rsa.com

  2. Encryption Store, Transport IT infrastructure information AccessAuthentication, Authorization, Anti-fraud Solutions DLP Data Loss Prevention SIEM Security Information and Event Management RSA – The Big Picture

  3. RSAEncryption andKey Management Suite RSA Access ManagerRSA Federated IdentityManager RSA SecurID RSA DigitalCertificateSolutions RSA IdentityProtection and Verification Suite IT infrastructure information RSAData Loss Prevention Suite RSA enVision Platform RSA – The Big Picture

  4. Access RSA Identity Protection and Verification Suite

  5. What is Crimeware? Two Broad Classifications Identity Theft Crimeware • Steals online credentials or any personal data required for identity takeover, with intent of using the stolen identity to steal funds • Examples: Keyloggers, screen-scrapers, local pharming Trojans Funds Transfer Crimeware • Performs unauthorized online transactions to steal funds • Trojans that “hijack” online banking or other secure sessions of infected users to carry out fraudulent transactions after user has logged out • Examples: Session-hijacking Trojans, Man-in-the-Browser

  6. Why On-line? • Universally accessible • Little chance of being caught • Cheap (little infrastructure necessary) • Scalable • Less violent (no gangsters from Jersey to shoot you)

  7. The Fraudster Supply Chain Is it organized crime? YES. It is organized. And involves organized crime. Insiders ATM fraud etc. Universal MITM Phishing Kit

  8. Crimeware Ecosystem – Organized Crime • Trojan developers offer guarantied replacement in case the trojan is detected by anti-virus applications

  9. Future Trojan Developments (“Anti-Anti-Trojan”) Inline Anti-Virus “tester” and “fixer”

  10. Need a Piece of Crimeware? WebMoney Trojan = $500 Snatch Trojan+Rootkit = $600 Limbo personalized $500 / $350 discounted Limbo logs (50MB) $30 FTP Checker / Iframer $35 Dream BotBuilder $500 + $25 for updates Pinch $30 + $5 for updates Mpack $700 w/ support

  11. Business of Trojans

  12. Crimeware Ecosystem – Infection Service

  13. Zeus Trojan as an example … • Tracking one variant of a very popular tool-kit • In first two weeks infected 32,000 computers • Roughly 4,000 infections a day • No effective anti-virus update available • Highly polymorphic, no consistent binary signature • To date we have recovered 60,000 compromised users and their credentials from this tool-kit alone • Zeus is also known as WSNPOEM

  14. RSA Identity Protection and Verification Suite • RSA Adaptive Authenticationand Transaction Monitoring (with Risk Engine) • RSA FraudAction • RSA eFraudNetwork

  15. Behind the Scenes – The RSA Risk Engine • Over 100 risk indicators (factors) are monitored • Self-learning provides immediate response to new threats

  16. 3% flag rate>95% detection !! 1% flag rate>80% detection ! Impact of components on detection

  17. RSA eFraudNetworkThe World’s Largest Online Fraud Fighting Community

  18. RSA Adaptive AuthenticationRSA Transaction Monitoring • Fraudulent transfers down by 90%, much higher security • User authentication costs down

  19. RSA FraudAction – RSA non-stop serviceRSA’s 24x7 Anti-Fraud Command Center

  20. Command & Control Bot-Herder Infection / Update Anti Trojan - A Systematic Approach to Mitigation Drop Zone Less than 25% of infected PCs are protected by AV applications. Even less effectively protected against the specific threat. RSA’s Anti-Trojan Solution Victim’s PC

  21. Anti Trojan - A Systematic Approach to Mitigation Infection / Update Command & Control Bot-Herder Drop Zone • Block(browsers, ISPs) • Shutdown • Block(firewalls, ISPs, content filtering) • Shutdown (or) • Monitor • Block(firewalls, ISPs, content filtering) • Shutdown (or) • Monitor

  22. Additional Anti-Trojan Services • Only service on market offering these services

  23. RSA – World “Web Anti-Fraud” Leader

  24. RSA “Anti-Fraud” Solutions – Selected Customers • South Africa: • Standard Bank • UK: • Barclays Bank • ING Direct • USA: • Bank of America • Bank of the West • Baxter Credit Union • Century Bank • Commerce Bancorp, Inc. • E*Trade • Eglin Federal Credit Union • Finance Center Federal Credit Union • Mid America Bank • State Employees' Credit Union (SECU) • Susquehanna Bancshares • TCF Financial Corporation • Tennessee Valley Federal Credit Union • Australia: • Adelaide Bank • Canada: • Royal Bank of Canada • France: • Le Crédit Lyonnais • India: • HDFC Bank • Italy: • Banca Popolare di Sondrio • Japan: • Mizuho Bank • Nomura Securities • Sony Bank Inc. • Sumitomo Mitsui Banking Corporation • The Bank of Fukuoka

More Related