View
14
Download
0
Category
Tags:
Preview:
Citation preview
©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd.
5 Steps to Stronger Security
STOPPING THE NEXT MASSIVE CYBERATTACK
©2015 Check Point Software Technologies Ltd. 2
Era of the Breach
1 IT Security Risks Survey 2014, Kapersky Lab report, 20142 PWC Global State of Information Security Survey 2015, PWC, October 20143 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014
of large companies saytargeted attacks area major threat1
39% 117,339global attacks per day2
Average annualized cybercrime cost by organization3
12.7million
©2015 Check Point Software Technologies Ltd. 3
What Can Breaches Teach Us?
Security vulnerabilities
Operational weaknesses
Common attack patterns
Preventive steps
©2015 Check Point Software Technologies Ltd. 4
Best-in-class securityproducts are not enoughon their own Only a security-driven network architecture and security infrastructure partnered with experienced staff can prevent future attacks
©2015 Check Point Software Technologies Ltd. 6
Assess environment vulnerabilities and weaknesses
STEP 1
©2015 Check Point Software Technologies Ltd. 7
Evaluating Security• Ingress/Egress • Critical Services • Critical Data • Segmentation • Security controls • Password policy controls• Advanced threat prevention
©2015 Check Point Software Technologies Ltd. 8
Segment the network toprevent and contain infections
STEP 2
©2015 Check Point Software Technologies Ltd. 10
Implement security controlsto protect against APTs
STEP 3
©2015 Check Point Software Technologies Ltd. 12
The criminal identifies a vulnerability to exploitSecurity solution:
The criminal writes code to exploit that vulnerability and download malwareSecurity solution:
Malware connectswith its Command& Control centerSecurity solution:
Malware spreads through the network to look for critical dataSecurity solution:
Malware finds the data & begins exfiltrationSecurity solution:
IPS AVSandboxing
SegmentationIPSAV
Anti-bot tools
Anti-bottools
Data leakage and loss
prevention tools
©2015 Check Point Software Technologies Ltd. 14
Keys to Effective Monitoring
Monitor logs daily
Correlate logs from different technologies
Tune detection and analysis rules based on logs
Identify potential incidents with anomaly detection tools
Stay familiar with network assets
Use visualization to assist expert analysis
Maintain logs for 90 days or more
Retroactively review logs based on new data
©2015 Check Point Software Technologies Ltd. 16
Closing The Door To Attacks
Are you prepared to…
Contain attacks?
Minimize losses?
Keep the business running?
©2015 Check Point Software Technologies Ltd. 17
Take the first step, schedule your FREE Security Checkup
Stop Tomorrow’s Attacks, Today
Recommended