Security Intelligence and Analytics

decisioncrunchΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

70 εμφανίσεις

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
Security Intelligence and Analytics

See everything. Know everything.™

Steve Shillingford, President and CEO

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
The Threat Landscape Has Evolved…

HACKTIVISTS

STATE
-
SPONSORED
ATTACKERS

CYBERCRIMINALS

2

FINANCIALLY
MOTIVATED

NATIONALISTICALLY

MOTIVATED

POLITICALLY
MOTIVATED

ATA/APT
GRADE

DDOS

Ransom
& fraud

Gov’t, enterprise &
infrastructure
targets

Public data
leakage

Defacement


DATA

THEFT


MALWARE


BAD

STUFF IN


GOOD STUFF
OUT

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
The Malware Problem


Overwhelming Odds

1/3

of malware is
customized
(no signature available at
time of exploit)

85%

of breaches took
weeks
or more to discover (+6%)

(
VzB
, 2012)

(
VzB
, 2012)

(
Ponemon
)

91%

of organizations believe
exploits bypassing their
IDS and AV systems

3

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
Finding Answers to Dreaded Post
-
breach Questions

4

?

Who did this to us?

How did they do it?

What systems and data were affected?

Can we be sure it is over?

Can it happen again?

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
Records, classifies and indexes all packets, flows, and
files

from L2

L7

On the wire, file
-
level visibility of data exfiltration and malware infiltration

Unmatched multi
-
dimensional flow enrichment and Big Data warehousing

Actionable intelligence, forensics and situational awareness

Flexible, open and easy
-
to
-
use platform
-
Hardware, Software, and VM


do we do what we do?

Providing real
-
time
analysis and full
visibility of
everything
going in and out of
your network

Solera Networks is the Security Camera for
your Enterprise Network

5

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.

NGFW


DPI


IDS/IPS

ACLs

Flow Analysis

Stateful

Firewalls

Solera is Solving the Visibility Gap in Today’s Tools

6

Time

1997

2012

1999

2002

2006


PREVENTION

2

3

4

5

6

7

CONTENT

CONTEXT

VISIBILITY

BIG DATA SECURITY

Security
Intelligence and
Analytics

TODAY’S
SECURITY GAP

Coverage


Real
-
Time File Extraction


Real
-
Time Analytics


Deep Packet Inspection


Log Analysis & Aggregation


Malware Analysis


Application
-
Based Blocking


Signature
-
Based Blocking


L2
-
L7 Indexing


Storage


Full Packet Capture


TCP/IP
Model

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
we deliver

Advanced Persistent
Security


that
easily

tells users what to
look

for

and

at

7

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
Solera
DeepSee


The Most
Scalable
and Flexible
Big Data Security Solution

8

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of thi
s w
ork without express written consent is strictly prohibited.

Big Data Security Intelligence and
Analytics for Visibility of Today’s
Advanced Threats

Goes beyond traditional approaches to deliver 20/20 visibility of
advanced
malware, APTs and ATAs

for every packet, flow and file

Automatically

and
accurately

tells enterprises and organizations
what zero
-
day
threats

and attacks to look for

instead of the other way around

Seamlessly integrates

with best
-
of
-
breed 3rd party security tools to provide a
single, correlated event view

9

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of thi
s w
ork without express written consent is strictly prohibited.

Security Intelligence & Analytics

Context
-
aware
and
adaptive security
will be
the only way to securely
support the dynamic
business and IT
infrastructures emerging
during the next 10 years.



Neil MacDonald, Distinguished VP

GARTNER






10

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.
What We Do
Matters

We help protect companies and
government agencies from those who
want to do them harm. And, by doing that,
we are helping to protect our way of life…

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this
wor
k without express written consent is strictly
prohibited.