150 likes | 164 Views
Explore the changing dynamics of network security due to digital transformation, IoT, and active internet users. Understand how Infoblox solutions can safeguard your network and prevent cyber threats by bridging the DNS gap. Discover the vulnerabilities in current security products and learn how a robust, scalable, and hybrid architecture can mitigate risks. Join the hands-on lab to experience Infoblox's infrastructure protection, threat detection, and threat intelligence capabilities in action. Take the next steps to engage with Infoblox and fortify your security architecture against evolving cyber threats.
E N D
Agenda Changing Network Dynamics Closing the DNS Gap Infoblox Solutions Why Infoblox Hands on lab introduction
Evolving Network Environment and Paradigm Shifts... Active Internet Users Connected Devices Network Evolution Digital Transformation Internetof Things 3.4 Billion1 Active internet users worldwide in 2016, +25% over last year 21 Billion2 Connected devices by 2020, +30% over last year Networks are being transformed – Cloud, SDN, others Digital transformation is happening faster than you think New trends like IoT are increasing the attack surface • Internet Live Stats (http://www.internetlivestats.com/internet-users/) • http://www.cnbc.com/2016/02/01/an-internet-of-things-that-will-number-ten-billions.html • https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
...Are Leading to Increased Exposure to Cyber Threats Organizations are facing an unprecedented challenge of data breaches
Products Galore: Solutions Missing 400+ VENDORS
The DNS Gap –A Multi Dimensional Threat Vector $4M 46% 45% The Leading Culprit in Data Exfiltration Average consolidated cost of a data breach3 % of survey respondents that experienced DNS data exfiltration4 % of survey respondents that experienced DNS tunneling4 91% 431M #1 78% 84% >$500 $1.5M Making Your Infrastructure Work Against You APT/Malware Proliferation Rooted in DNS Of malware uses DNS to carry out campaigns5 New unique pieces ofmalware in 20156 Malware C&C is #1 responsible vector for crimeware7 DNS: most common application layer attacks1 Of reflection/amplification attacks use DNS1 Per min cost of downtime due to DDoS attack2 Average cost per year to deal with DNS attacks2 70% 46% 45% Ineffective Threat Intelligence of survey respondents that felt Threat Intel is not timely8 % of survey respondents unableto prioritize the threat by category8 % of survey respondents lacked context for threat intel to make it actionable8 • Arbor WISR2016 Report • Ponemon Institute Study – The Cost of Denial-of-Service Attacks. March 2015 • Source: Ponemon Institute, 2016 Cost of Data Breach Study • Source: SC Magazine, Dec 2014, “DNS attacks putting organizations at risk, survey finds” • Source: Cisco 2016 Annual Security Report • Symantec 2016 Internet Security Threat Report • Verizon 2016 Data Breach Investigations Report • Source: Ponemon Institute, 2015 Second Annual Study on Exchange Cyber Threat Intelligence
Three Aspects of Security #1 Infrastructure Protection #2 Data Protection and Malware Mitigation #3 Threat Containment and Operations Better Application and Service Availability Protect Users and Data Efficiency & Optimization of Security Operations
Multipronged Approach to Threat Detection Detect & Prevent communications to malware, C2, Ransomware Government-grade Threat Intelligence Ecosystem Infrastructure protection for critical core services Carrier-grade deep packet inspection Instant identification of popular tunneling tools • Signature • Reputation • Behavior Patented Streaming Analytics Technology Detect & Prevent Data Exfiltration “Machine Learning”
Leverage Threat Intel Across Entire Security Infrastructure • Infoblox • C&C IP List • CSV File • Phishing & Malware URLs • SURBL • JSON TIDE Define Data Policy, Governance & Translation • Spambot IPs • Marketplace • RBL Zone File • C&C & Malware Host/Domain • Custom TI • RPZ Dossier Investigate Threats Faster triage Threat Prioritization Single-source of TI management RESULT:
Importance of a Robust, Scalable & Hybrid Architecture Your Public Cloud IaaS Infoblox Cloud Your Private Cloud IaaS ActiveTrust Threat Intel HQ Grid Master (HA pair) Grid Master Candidate@Recovery Site Grid Member with DNS Firewall Infoblox Grid Grid Member DNS / DHCP Network Insight Grid Member Reporting & Analytics Branch Office Grid Member DNS / DHCP Microsoft DNS, DHCP Edge Network/ Remote Office DHCP
Next Steps Path to Engagement • Try Our Products – Free of Cost & Risk • ActiveTrust Cloud eval • ActiveTrust (on-premises) eval • Security(PCAP) assessment • Engage with Infoblox to discuss your security architectures