240 likes | 247 Views
Learn about Symantec's DeepSight early warning and managed security services to protect your business. Stay ahead of evolving threats with comprehensive solutions covering network security, secure programming, incident response, and more.
E N D
Tech Day:Early Warning and Managed Security Services Sean B. Murphy, CISSP Senior Systems Engineer 24 January 2006
1 2 3 A G E N D A Your challenges DeepSight Early Warning Services Managed Security Services
Mitigating risk and proactively protecting your business becomes more challenging every day.
Application Development Processes Perimeter Defense Wireless Authorization & Access Control Network Design Network Components Authentication Solutions Virus Protection Secure Programming Infrastructure Security Directory Services Product Security Application Security Operating Systems Data Integrity Privacy Confidentiality & Segmentation Secure Builds & Host Hardening Partner & Third Party Integration Cryptography & Encryption Storage Solutions Monitoring & Logging Provisioning & Implementation Digital Forensics Secure Operations System Administration Incident Response & Readiness Configuration Management Assessment & Compliance Physical Security Business Continuity Corporate Security Policy Remote Access Services Security Strategy Training & Awareness Roles & Responsibility Employee Exit Processes Internal Threat Profiling Secure Organization Hiring & Screening Organizational Security Maturity Employee Change Management Symantec Security Blueprint
Malicious Code: Worms, Virus, & TrojanMore Targeted Malware has grown 2.4x 1H05 nearly equals all of 2004 There have been only 5 Cat. 3 events in ’05. There have been only 7 Category 3 events in the last 9 mos.
Faster, More Aggressive Attacks • New vulnerabilities are being exploited more quickly • Faster exploitation requires better patch management policies • More attacks are targeting new vulnerabilities January 2003 Slammer Vuln is 6 months old August 2003 Blaster Vuln is 26 days old May 2004 Sasser Vuln is 18 days old August 2005 Zotob and Esbot Vuln is 5 days old
New Vulnerabilities • Over 14,000 vulnerabilities documented in the Symantec vulnerability database • 2664 new vulnerabilities discovered in 2004; 1869 in first half of 2005 • 70% of vulnerabilities can be exploited with little or no coding knowledge • Malicious code threats today are largely synonymous with software vulnerabilities and vice versa Source: Symantec Vulnerability Database
11 Symantec Support Centers Customers + Consulting & Education 61 Symantec Monitored Countries 20,000 Registered Sensors in 180 Countries 6 Symantec Security Response Labs + + + Calgary, Canada Dublin, Ireland Springfield, OR Tokyo, Japan Waltham, MA San Francisco, CA London, England Redwood City, CA Munich, Germany Alexandria, VA Taipei, Taiwan Santa Monica, CA Newport News, VA Orem, UT/American Fork, UT Sydney, Australia Global Intelligence Network Unmatched Insight 5 Symantec SOCs
DeepSight Alert Services • Customized vulnerability and malicious code alerts • Version-specific alerting • Over 4,600 products • Over 18,000 versions • From over 2,200 vendors • Comprehensive, prioritized alerts • In-depth analysis and attack mitigation strategies • Patches and workarounds • Automated delivery of actionable information • Powerful Research Capabilities
DeepSight Threat Management System • Global threat landscape • View of global attack activity including source data • Early warning of global attacks, worms, blended threats • Notifications personalized to your industry, technologies and more • Automated alerting of emerging threats • Complete, credible analysis and risk assessment, including countermeasures to mitigate attacks
DeepSight Attack Correlation Engine & Database Symantec Security Response Threat Analysts DeepSight Threat Management SystemOverview • Over 20,000 sensors in over 180 countries registered to upload IDS and Firewall information • 500 MSS customers • 120 million AV systems • Attack Quarantine System DeepSight Data Partners • Almost 16 billion events • Over 160 million attack source IP addresses • In-depth expert analysis and investigation
2+ Days Early Warning Symantec DeepSight Customers on Alert:Zotob.E and Esbot.A Worms DeepSight Timeline 2005.08.09: Alert Services: Multiple Microsoft Vulns TMS: ThreatCon raised to 2, Threat Alert MS PnP Buffer Overflow Vuln 2005.08.14: Alert Services: Zotob.A worm alert TMS: Threat Alert bot networks using PnP Vuln 2005.08.15: Alert Services: Esbot.A worm alert Risk 2 2005.08.12: Alert Services: Additional exploits available 2005.08.13: TMS: Daily Report TMS observed exploit activity in DeepSight Honeypot 2005.08.16: Alert Services:Zotob.E & Esbot.A worms raised to Risk 3 TMS: ThreatCon raised to 2, alert on Worms
Be a trusted extension of Client’s Security Organization Focus on Large Enterprise’s unique problems and service requirements Extend world-class monitoring throughout Enterprise Build trust through operational transparency Service Delivery Philosophy
Audits & Certifications People Stability Technology Defense In Depth Customer Service Process Intelligence Market Leadership Return on Investment Infrastructure Flexibility Critical Service Components
Security Monitoring Incident Analysis: Analyze security data to detect and respond to signs of malicious activity Perform data aggregation, normalization, data mining and correlation Validate, and Assess impact of Incident to Enterprise. Incident Escalation: Escalate actionable incidents Industry leading escalation SLA Flexible escalation procedures to fit with Enterprise requirements Rapid Response to Outbreaks: Update processes, technology and expertise to emerging threats and trends. Provide early warning to client of emerging threats. Security Management Fault Management: Monitor devices for fault, performance and availability monitoring Restore service availability Identify and eliminate root cause of faults and outages Change Management: Routine and Emergency changes to business critical security devices. Performance based SLA for changes Secure in-band & out-of-band management Configuration backup (for quick rebuilds) Release/Lifecycle Management: Routine Product Updates Emergency Patches Management & Monitoring Services
Defense in Depth:Edge to Endpoint Protection GLOBAL INTELLIGENCE DATA VULNERABILITY SCAN DATA Router Firewall Integrated Security Appliance Network IDS/IPS Host IDS/IPS
Incident assessment follows mature assessment methodology. Leverage Intelligence on new threats Obtain second opinion if required Follow internal published handling guidelines. Context is critical for accurate validation and severity assessment Global Trends Enterprise details Attack details Vulnerability Results Analysis Methodology Critical Servers Global Trends Client Vulnerabilities Firewall & IDS Logs Known False Positives
Data Reduction and Expert Analysis INFRASTRUCTURE 950 million logs and alerts received INTELLIGENCE 650,000 potential events detected TECHNOLOGY 14,500 events created PEOPLE 3100 incidents validated PROCESS 65 severe events escalated
Return on Investment Approximately 87% of clients with tenure of more than six months successfully avoided experiencing a severe attack.
Thank You! sean_murphy@symantec.com