120 likes | 210 Views
Security Intelligence and Analytics. See everything. Know everything.™. Steve Shillingford, President and CEO. The Threat Landscape Has Evolved…. CYBERCRIMINALS. FINANCIALLY MOTIVATED. Ransom & fraud. DDOS. ATA/APT GRADE. DATA THEFT MALWARE. BAD STUFF IN GOOD STUFF OUT. Defacement.
E N D
Security Intelligence and Analytics See everything. Know everything.™ Steve Shillingford, President and CEO
The Threat Landscape Has Evolved… CYBERCRIMINALS FINANCIALLY MOTIVATED Ransom & fraud DDOS ATA/APT GRADE DATATHEFT MALWARE BADSTUFF IN GOOD STUFF OUT Defacement STATE-SPONSORED ATTACKERS HACKTIVISTS POLITICALLY MOTIVATED NATIONALISTICALLY MOTIVATED Public data leakage Gov’t, enterprise & infrastructure targets
The Malware Problem – Overwhelming Odds 1/3 85% 91% of malware is customized (no signature available at time of exploit) of breaches took weeks or more to discover (+6%) of organizations believe exploits bypassing their IDS and AV systems (VzB, 2012) (VzB, 2012) (Ponemon)
Finding Answers to Dreaded Post-breach Questions ? Who did this to us? How did they do it? What systems and data were affected? Can we be sure it is over? Can it happen again?
HOW do we do what we do? Solera Networks is the Security Camera for your Enterprise Network Records, classifies and indexes all packets, flows, and files from L2–L7 Providing real-time analysis and full visibility of everything going in and out of your network On the wire, file-level visibility of data exfiltration and malware infiltration Unmatched multi-dimensional flow enrichment and Big Data warehousing Actionable intelligence, forensics and situational awareness Flexible, open and easy-to-use platform-Hardware, Software, and VM
Solera is Solving the Visibility Gap in Today’s Tools TCP/IP Model BIG DATA SECURITY Time 7 NGFW DPI IDS/IPS 2012 CONTENT CONTEXT VISIBILITY TODAY’S SECURITY GAP • Real-Time File Extraction • Real-Time Analytics • Deep Packet Inspection • Log Analysis & Aggregation • Malware Analysis • Application-Based Blocking • Signature-Based Blocking • L2-L7 Indexing • Storage • Full Packet Capture 6 Security Intelligence and Analytics 2006 5 2002 4 Flow Analysis PREVENTION 3 Stateful Firewalls 1999 2 ACLs 1997 Coverage
Whatwe deliver Advanced Persistent Security™that easily tells users what to lookfor—andat
Solera DeepSee™The Most Scalable and Flexible Big Data Security Solution
Big Data Security Intelligence and Analytics for Visibility of Today’s Advanced Threats Goes beyond traditional approaches to deliver 20/20 visibility of advanced malware, APTs and ATAs—for every packet, flow and file Automatically and accurately tells enterprises and organizations what zero-day threats and attacks to look for—instead of the other way around Seamlessly integrates with best-of-breed 3rd party security tools to provide a single, correlated event view
Security Intelligence & Analytics “ INTRUSION PREVENTION SYSTEMS Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years. —Neil MacDonald, Distinguished VPGARTNER NEXT-GEN FIREWALLS DATA LEAKAGE PREVENTION ” SECURITY INTELLIGENCE SIA ANALYTICS LOG MANAGEMENT CONTENT FILTERING SECURITY INFORMATION EVENT MANAGEMENT
We help protect companies and government agencies from those who want to do them harm. And, by doing that, we are helping to protect our way of life… What We Do Matters