PPT

homuskratNetworking and Communications

Nov 20, 2013 (3 years and 9 months ago)

101 views

1

© Copyright 2013 EMC Corporation. All rights reserved.

Security Trends

The Case for Intelligence
-
Driven
Security

2

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Digital
Content

ZETTABYTE

¼

ZETTABYTES

2

ZETTABYTES

40
-
60?

Attack Surface and Threat Environment

3

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Attack Surface and Threat Environment

Apps

Web Front
Ended
apps

There’s an “app” for
that

Big
Data Apps
Everywhere!

4

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Attack Surface and Threat Environment

Devices

Dawn of

Smart

phones

Smartphone/tablet
ubiquity

Internet

of things

(not just PCs, not just
mobile)

5

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Attack Surface and Threat Environment

Social Media

Focus on

monetizing

Total Commercialization
of social media:
absence of
privacy

MySpace

6

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Attack Surface and Threat Environment

Perimeter

NO
direct
control over
physical
infrastructure

7

© Copyright 2013 EMC Corporation. All rights reserved.

2007

2020

2013

Attack
Surface
and
Threat Environment

Threats

Complex
Intrusion Attacks

Disruptive

Attacks

Destructive
attacks

8

© Copyright 2013 EMC Corporation. All rights reserved.

Historic Security Model


Perimeter based


Static/Signature based


Siloed

Reactive

9

© Copyright 2013 EMC Corporation. All rights reserved.

Intelligence Driven

New Model


Risk
-
based


Dynamic/agile


Contextual

10

© Copyright 2013 EMC Corporation. All rights reserved.

Impediments to Change

Detection &
Monitoring

Response

Prevention

Budget Inertia: Reactive model

70%

34%

20
%

10
%

33%

33%

11

© Copyright 2013 EMC Corporation. All rights reserved.

Impediments to Change

Technology
Maturity


Skilled
personnel
shortage

Budget

Inertia

Information
sharing at scale

12

© Copyright 2013 EMC Corporation. All rights reserved.

Shift In Focus. Shift In Spend

IT Risk

Control

Compliance

Business

Risk

Prevention

80%

Monitoring

15%

Response

5%

Prevention

34%

Monitoring

33%

Response

33%

$

13

© Copyright 2013 EMC Corporation. All rights reserved.

BIG DATA

IS WHERE

SECURITY
MEETS

Intelligence
-
Driven Security

SOC | GRC | Identity | Anti
-
Fraud

BIG DATA FUELS


INTELLIGENCE
-
DRIVEN SECURITY

15

© Copyright 2013 EMC Corporation. All rights reserved.

Advanced Analytics

provide context and
visibility to detect
threats

Adaptive Controls

adjusted dynamically based

on risk and threat level


Risk
-
Based, Contextual, & Agile


Intelligence
-
Driven Security

Risk Intelligence

Thorough Understanding Of

Risk To Prioritize Activity

Information Sharing

A
ctionable Intel From Trusted Sources & COIs

16

© Copyright 2013 EMC Corporation. All rights reserved.

Assess

Risk

1

Take

Action

2

Ensuring Trusted Interaction Between People, Application, & Data

Identity

17

© Copyright 2013 EMC Corporation. All rights reserved.

Auth. Manager 8.0 | Adaptive Authentication | Cloud Trust Authority

Next
-
Generation Identity

RSA eFraud Network

Action

Big Data

Device Profile

Fraud Network

User Behavior
Profile

Geo Location

Analytics

Two
-
Factor

Out Of Band Txt

Challenge Q’s

Step Up Authentication

Proceed As Normal

Risk Engine

Investigate

Change/Block Access

18

© Copyright 2013 EMC Corporation. All rights reserved.

RSA Security Analytics Platform | RSA Archer GRC Suite

Security Analytics

RSA Live

Governance

Big Data

Big Data

Store

Network Packets

Information Assets

Log Files

IT Assets

Investigations

Malware
Analytics

Visualization

Data Leakage

Alerting &
Reporting

Analytics

Compliance

&

Business

Context

Incident

Management

& Workflow

Active

Defense &

Remediation

19

© Copyright 2013 EMC Corporation. All rights reserved.

Web Threat Landscape


Advanced Malware (e.g. Trojans)


Phishing


Rogue Mobile App


Site Scraping


Vulnerability Probing


Layer 7 DDoS Attacks


Man in the Middle/Browser


Password Cracking/Guessing


Parameter Injection


New Account Registration Fraud


Account Takeover


New Account Registration Fraud


Promotion Abuse


Unauthorized Account Activity


Fraudulent Money Movement



Separating Customers from Criminals

Fraud Prevention and Web Security

Begin

Session


Login


Transaction


Logout

In the

Wild

Fraud

Action

Silver Tail

Transaction

Monitoring

Adaptive

Authentication

20

© Copyright 2013 EMC Corporation. All rights reserved.

Silver Tail, Fraud Action, Adaptive Authentication, Transaction Monitoring

Next
-
Generation Anti
-
Fraud & Web Security

RSA eFraud Network + Fraud Action

Response

Big Data

Big Data

Store

Web Traffic

Investigations

Fraud

Analytics

Visualization

Alerting &
Reporting

Analytics

Compliance

&

Business

Policy

Adaptive

Authentication

Active

Defense

Transaction

Monitoring

21

© Copyright 2013 EMC Corporation. All rights reserved.

Single eGRC Platform

Risk Management & Governance

Business

Continuity

Management

IT Comfit

Management

Threat

Management

Compliance

Management

Governance

Compliance &

Business

Context

Incident

Management

& Workflow

Active

Defense &

Remediation

22

© Copyright 2013 EMC Corporation. All rights reserved.

Summary


Transformation of Infrastructure, Business and
Threat Makes Traditional Security Less Relevant


New Strategies Must be Based on Risk, Context and
be Responsive To Rapidly Changing Environments


Big Data, Analytics Can Be Leveraged to Create
Intelligence
-
Driven Security Models that Meet These
Needs