15
© 2014 IBM Corporation 4 Undeniable Truths of Advanced Threat Protection Patrick Vandenberg Program Director IBM Security October 22, 2014

4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

1© 2014 IBM Corporation

4 Undeniable Truths of AdvancedThreat Protection

Patrick VandenbergProgram DirectorIBM Security

October 22, 2014

Page 2: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

2 © 2014 IBM Corporation2

We are in an era of continuous breachesAttackers are relentless, victims are targeted, and the damage toll is rising

Source:IBM X-Force Threat Intelligence Quarterly – 1Q 2014

OperationalSophistication

IBM X-Force declaredYear of the

Security Breach

Near Daily Leaksof Sensitive Data

40% increasein reported data

breaches and incidents

Relentless Useof Multiple Methods

500,000,000+ recordswere leaked, while the future

shows no sign of change

2011 2012 2013

Note: Size of circle estimates relative impact of incident in terms of cost to business.

2011 2012 2013

Page 3: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

33

And the cost of a data breach is on the rise, with customers at risk

2014 Cost of Data Breach StudyFrom Ponemon Institute, sponsored by IBM

Page 4: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

44

Security is a board room discussion, and security leadersare more accountable than ever before

Your Board and CEO demand a strategy

Loss of marketshare andreputation

Legal exposure

Audit failure

Fines and criminalcharges

Financial loss

Loss of dataconfidentiality,integrity and/or

availability

Violation ofemployee privacy

Loss ofcustomer trust

Loss of brandreputation

CEO CFO/COO CIO CHRO CMO

Source: Discussions with more than 13,000 C-suite executives as part of the IBM C-suite Study Series

Page 5: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

55

Threats haveevolved…

…yet the majorityof security teamsare still using siloed,discrete defenses

Are security teams up for the challenge?

Broad AttacksIndiscriminate malware,spam and DoS activity

Targeted AttacksAdvanced, persistent, organized,

and politically or financially motivated

o Build multiple perimeterso Protect all systemso Use signature-based methodso Periodically scan for known threatso Read the latest newso Shut down systems

o Assume constant compromiseo Prioritize high-risk assetso Use behavioral-based methodso Continuously monitor activityo Consume real-time threat feedso Gather, preserve, retrace evidence

Requiring a newapproach to protection…

Tactical ApproachCompliance-driven, Reactionary

Strategic ApproachIntelligence-driven, Continuous

New threats require new thinking, but most are defending against yesterday’s attacks

Page 6: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

6 © 2014 IBM Corporation6

Four truths about advanced threat protectionDespite increasing challenges, organizations can protect themselves by adoptingthe right strategy

1 Prevention is mandatoryTraditional methods of prevention haveoften failed, leaving many to believedetection is the only way forward.This is a dangerous proposition.

2 Security Intelligenceis the underpinningSpecialized knowledge in one domain is notenough. It takes enterprise-wide visibility andmaximum use of data to stop today’s threats.

3 Integration enablesprotectionThe best defense is relentless improvement.Technologies must seamlessly integrate withprocesses and people across the entirelifecycle of attacks.

4 Openness must beembracedSecurity teams need the ability to share contextand invoke actions between communities ofinterest and numerous new and existingsecurity investments.

Page 7: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

7 © 2014 IBM Corporation7

Introducing the IBM Threat Protection SystemA dynamic, integrated system to disrupt the lifecycle of advanced attacksand help prevent loss

Made possible by the following:

Accelerated RoadmapSignificant investment across10 development labs to fast-trackadvanced threat protection offerings

Unique IntegrationsStrategic focus on connecting IBMproducts to streamline intelligencesharing and take action

New PartnershipsCoordinated outreach across theindustry to bring together interoperableproducts for our customers

Page 8: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

8 © 2014 IBM Corporation8

Exploit Disruption

Preventmalware installs• Verify the state

of applications• Block exploit

attempts used todeliver malware

Preventmutated exploits• Verify the state of

network protocols• Block unknown

exploits withbehavioral heuristics

Malware Quarantine

Preventcontrol channels• Stop direct

outbound malwarecommunications

• Protect againstprocess hijacking

Preventactive beaconing• Stop malware and

botnet control trafficwith real-timereputation andSSL inspection

User Protection

Preventmalicious apps

• Block accessto maliciouswebsites

• Protect againstweb applicationmisuse

Preventcredential loss

• Block keyloggers• Stop credential use

on phishing sites• Limit reuse of

passwordsOn the Endpoint

Trusteer ApexMalware Protection

On the Network

IBM Security NetworkProtection XGS

Focus on critical points in the attack chain with preemptive defenseson both the endpoint and network

Page 9: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

9 © 2014 IBM Corporation9

Continuously monitor security-relevant activity from acrossthe entire organization

Pre-Attack Analytics

Predict and prioritizesecurity weaknessesbefore adversaries do• Use automated

vulnerability scans andrich security context

• Emphasize high-priority,unpatched, or defenselessassets requiring attention

IBM Security QRadarVulnerability Manager

Real-time Attack Analytics

Detect activity andanomalies outsidenormal behavior• Correlate and baseline

massive sets of data• From logs, events, flows,

user activity, assets,locations, vulnerabilities,external threats, and more

IBM SecurityQRadar SIEM

IBM Security QRadarSecurity Intelligence Platform

Page 10: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

10 © 2014 IBM Corporation10

Rapid Response Integrations

Quickly expand security coverageto prevent further harm• Share indicators across control points• Dynamically apply customized rules

IBM SecurityFramework Integrations

Quickly investigate breaches, retrace activity, and learn from findingsto remediate weaknesses

Help prepare for and withstandsecurity breaches more effectively• Gain access to key resources that can

enable faster recovery and helpreduce incident business impact

Emergency Response Services

IBM EmergencyResponse Services

Post-Attack Incident Forensics

Reduce the time to fully discoverwhat happened and when it occurred• Index and reconstruct attack activity and

content from full-packet network data• Apply search engine technology

and advanced visualizations

IBM SecurityQRadar Incident Forensics

Page 11: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

1111

Leverage threat intelligence with product integrations that drawupon human and machine-generated information

Global Threat Intelligence

X-Force Intelligence Network

ExploitTriage

MalwareTracking

Zero-dayResearch

Real-time sharing ofTrusteer intelligence

NEW

PhishingSites

URL/WebCategories

IP/DomainReputation

• Combines the renowned expertise ofX-Force + Trusteer malware research

• Catalog of 80K+ vulnerabilities,17B+web pages, and data from 100M+endpoints

• Intelligence databases dynamicallyupdated on a minute-by-minute basis

Page 12: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

1212

Share, analyze, and act upon information gatheredfrom an ecosystem of third-party products

Security Partner Ecosystem and Integrations

IBM works with a broad set of technology vendorswho provide complementary solutions and areintegrated with our security products

Strengthen the threat protection lifecycle• Leverage a vibrant ecosystem

of security products• Increase visibility, collapse

information silos, and provideinsights on advanced attacks

Ready forIBM Security IntelligencePartner Ecosystem

100+ vendorsand 400+ products

SSL Traffic Decryption forQRadar Incident Forensicsinvestigations

New Advanced Threat Protection Integrations:

Additional Sample of QRadar Partners:

Integration with IBM XGS toblock new threats and QRadarfor centralized response

Page 13: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

1313

IBM is uniquely positioned to offer integrated protection

Open Integrations

Smarter Prevention Security Intelligence Continuous Response

Global Threat Intelligence

1 2 3

5 4

Ready for IBM SecurityIntelligence Ecosystem

New integration with A10Networks to decrypt SSLTraffic for incident forensics

NEW

IBM X-ForceThreat Intelligence

New virtual real-timesharing of Trusteer threatintelligence from 100M+endpoints with X-Force

NEW

IBM EmergencyResponse Services

IBM Security QRadarIncident Forensics

In-line packet compression, dataimport facility and integrated SSLtraffic decryption with A10

NEW

Increased global coverageand expertise & Available asSubscription via online

NEW

Trusteer Apex EndpointMalware Protection

IBM Security NetworkProtection XGS

Threat Flow Visualization andIncident Analysis [Cloud-basedFile Inspection Feedback]

NEW

IBM XGS7100 with increased20Gps+ throughput for high-performance datacenters

NEW

IBM Security QRadarSecurity Intelligence

Master Console appliance forMSSPs, Greater QFlow collectionand data burst handling

NEW

Threat Monitoringand Intelligence Services

Managed SIEM enhancements,cyber threat intelligence

Page 14: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

1414

Find us at IBM Booth #607…

And visit us on SecurityIntelligence.com

IBM X-Force Threat Intelligence Reports/http://www.ibm.com/security/xforce

Website/protection-ibm.com/security/threat

YouTubeIBMSecuritySolutionsyoutube.com/user/

Twitteribmsecurity@

IBM X-Force Security Insights Blogforce-www.SecurityIntelligence.com/x

Page 15: 4 Undeniable Truths of Advanced Threat Protection Vandenberg - IBM... · IBM Security QRadar Vulnerability Manager Real-time Attack Analytics Detect activity and anomalies outside

© 2014 IBM Corporation

IBM Security

15

www.ibm.com/security

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposesonly, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the useof, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating anywarranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreementgoverning the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available inall countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in anyway. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the UnitedStates, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and responseto improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriatedor can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secureand no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed tobe part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THEMALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.