170 likes | 298 Views
The Threat Within. September 2004. Agenda. Customer Pain Industry Solutions Network Behavior Enforcement Example Successes Q&A. Insider Threats Are Growing. US CERT study of cyber crimes in Financial Services: 78 percent of events caused by insiders Gartner:
E N D
The Threat Within September 2004
Agenda • Customer Pain • Industry Solutions • Network Behavior Enforcement • Example Successes • Q&A
Insider Threats Are Growing • US CERT study of cyber crimes in Financial Services: • 78 percent of events caused by insiders • Gartner: • Insiders responsible for 70 percent of security incidents that cause loss • Network boundaries are disappearing
Perimeter Defenses Leave External Security Holes • Signature based systems are limited • Sophisticated attackers • Historical view • 65% of all security incidents are the result of mis-configuration (Gartner) • Worms fast moving threats continue to plague enterprises
Policy And Compliance • Policy compliance • Example: IM, P2P usage • Security exposure • Legal exposure • Wastage • Industry regulation • SOX • HIPAA • GLB • etc, etc
Enforcement Domain Is Becoming Distributed Tomorrow: Distributed Enforcement Today: Perimeter Enforcement • Blurred network boundaries, internal concerns demand distributed enforcement • IPS Functions being built into many products • Firewalls, Switches, Routers, OS
Enterprise-wide Threat Analysis, Detection And Response Needed Today: Perimeter Enforcement
An Analogy: Airport Security Surveillance Enforcement • Check rules • Block Total Security • Check behavior • Block
Profiles network behavior of systems, applications Analyzes network flows Models behavior Identifies anomalies External threats: Worms, Trojans, DOS Internal threats: Insider attacks, stealthy scans Policy violation: P2P, IM, network misuse Compliance violation: HIPAA Identifies corrective measures Real-time and historical view Months of network activity stored Application level details and data capture Comprehensive search mechanisms TAKE ACTION! Network Surveillance And Behavior Enforcement
Addressing Internal And External Risks Stealthy activity Worm activity
Increasing Operational Efficiency • Rapid time-to-resolve • Instant access to activity database ensures rapid event resolution without additional staff • Complete audit of network activity - no transaction is lost • Instant real-time access to terabytes of data - very granular • Ability to pivot data on demand ensures rapid identification of problem source • Network, protocol, ports and application views of data • Local, remote and geographic views of data • Threat views • Problem easily isolated to specific machines, network segments • Security event data integration • Hierarchical multi-user and role-based access
Behavioral Enforcement addresses key provisions of the Security Rule Example Compliance: HIPAA
Borgess Case Study • 140 sites of care • 65 satellite clinics • 3500 hosts • 100 applications • Environment: • Main frame • AS400 • Unix • Windows • Linux
Borgess And QRadar Success Story • Before QRadar: May 2003, Lovegate infection • Over 2000 hosts were infected • Clean-up took several weeks • There were significant service disruptions • After QRadar:May 2004, MyDoom infection • Three hosts were infected • Clean-up took 1 hour • QRadar also used to identify policy violations • Cleartext passwords • QRadar key element of HIPAA compliance
Summary • Security gaps persist • Internal threats • External threats • policy and compliance enforcement • Industry is reshaping to address gaps • A new security architecture emerges • Behavior analytics and enforcement is at the core • QRadar is a leading behavioral enforcement platform • Analytics • Surveillance • Enforcement
Thank You! Brendan Hannigan EVP Marketing And Product Development Q1 Labs