15
Comprehensive Advanced Threat Defense June 2014

Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

Comprehensive Advanced Threat Defense   June 2014

Page 2: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 1

Introduction  

The  hot  topic  in  the  information  security  industry  these  days  is  “Advanced  Threat  Defense”  (ATD).  There  are  many  definitions,  and  plenty  of  marketing  hype  and  spin  on  the  topic,  but  it’s  the  science  –  and  the  art  –  of  defending  yourself  against  sophisticated,  persistent  adversaries  who  can  get  past  (or  have  already  gotten  past)  your  security  defenses.      

We  like  to  define  advanced  threat  defense  in  terms  of  the  adversary  rather  than  the  attack  technique  used  to  remind  ourselves  that  what  we  are  really  up  against  is  a  person  or,  more  likely,  a  group  of  people  who  are  specifically  targeting  your  organization,  and  will  use  whatever  attack  vectors  and  techniques  necessary  to  achieve  their  objectives.  

This  paper  describes  a  comprehensive,  network-­‐based  approach  to  Advanced  Threat  Defense.      

Page 3: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 2

The  Threat  Lifecycle  

It  is  important  to  understand  that  advanced,  targeted  attacks  are  not  instantaneous  events.    They  are  complex  processes  with  multiple  phases  that  occur  over  a  period  of  time.    As  shown  in  Figure  1,  we  break  the  threat  lifecycle  down  into  four  major  phases:  

1. Infiltration  

2. Command  and  Control  Communication  

3. Lateral  Propagation  

4. Data  Exfiltration  

 

Threat  Lifecycle  

Figure 1.

 

Page 4: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 3

Infiltration  Phase  

If  the  adversaries  are  external  threat  actors,  they  normally  need  to  get  access  to,  and  then  gain  control  over,  one  of  your  organization’s  computing  assets.    There  are  many  ways  they  can  accomplish  this.    They  could  use  a  classic  server-­‐side  exploit  technique  such  as  SQL  injection  or  a  fuzzing  attack.    They  could  guess,  buy,  or  hack  or  crack  one  of  your  users’  VPN  login  credentials  (username  and  password).    Or  they  could  use  social  engineering  to  exploit  a  user’s  trust  and  naivety  to  snare  login  credentials.  They  may  launch  a  spear-­‐phishing  attack  to  deceive  one  of  your  users  into  visiting  a  malicious  website  that  will  exploit  their  browser  or  open  a  document  that  will  exploit  an  application  on  their  computer  or  mobile  device.    

If  the  adversary  is  an  internal  user  (a  “trusted  insider”),  they  normally  do  not  have  to  go  through  the  infiltration  phase,  as  they  already  have  authorized  access  to  your  computing  and  network  resources.    This  ancillary  infiltration  case,  “Insider  Threat”,  is  also  detailed  in  Figure  1.  

Command  and  Control  (“C2”)  Communication  Phase  

Once  an  external  adversary  has  gained  unauthorized  access  and  control  (“compromised”)  over  one  of  your  computing  assets,  “Victim  0”;  they  will  typically  exercise  complete  remote  control  over  that  compromised  asset.    The  attacker  will  normally  do  that  by  using  remote  administration  utilities  that  are  already  available  on  the  compromised  asset  or  by  installing  a  “back  door”  program  such  as  a  remote  administration  trojan  (RAT)  on  the  asset,  which  they  will  then  use  to  communicate  with  the  asset.    This  will  result  in  command  and  control  (C2)  communication  between  the  compromised  asset  and  the  remote  C2  server.  This  communication  is  bi-­‐directional,  with  beaconing  messages  going  from  the  victim  to  the  server  and  commands  being  issued  from  the  server  to  the  victim.    

Lateral  Propagation  Phase  

Attackers  are  ultimately  interested  in  valuable  data  assets  to  extract  information  from.  So  after  they  have  successfully  taken  control  of  “Victim  0”,  they  use  that  device  as  a  starting  point  to  find  and  infiltrate  other  connected  assets  inside  your  network.  They  move  laterally  from  network  device  to  network  device,  compromising  more  assets;  escalating  privilege;  looking  for  and  staging  sensitive,  valuable  or  classified  information;  and  installing  more  back  doors  so  they  can  persist  in  your  environment  even  if  you  identify  and  clean  up  some  of  the  compromised  assets.    

Data  Exfiltration  Phase  

Once  the  attackers  have  found  and  staged  the  data  they  want  to  steal,  they  begin  to  send  it  out  of  the  network.    They  will  often  try  to  “obfuscate”  the  data  by  encapsulating,  compressing,  transforming,  or  encrypting  it  in  some  way.  Then  they  will  send  it  out  of  the  network,  either  by  “hiding  it  in  plain  sight”  on  standard  outbound  network  channels  such  as  web  (HTTP)  and  email  (SMTP),  or  by  trying  to  circumvent  your  standard  network  security  systems  (such  as  web  and  email  proxies)  by  sending  it  out  of  the  network  using  non-­‐standard  ports  and/or  protocols.  

Page 5: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 4

The  Three  Dimensions  of  Network  Threat  Intelligence  

There  are  three  components  you  must  understand  when  you  are  looking  for  threats  in  your  network:    

• Content  

• Channels  

• Locations  

Content  –  What  information  is  being  transferred?  

“Content”  is  the  information  that  is  flowing  over  the  network.      

Examples  of  “content”  include  web  pages,  files,  and  email  attachments.    It  is  important  to  understand  that  content  and  packets  are  not  the  same  thing.    In  most  cases  today,  the  “content”  is  not  visible  in  the  packets  because  it  has  been  buried  under  multiple  levels  of  encapsulation,  encoding,  embedding,  packing  and/or  compression.    Because  most  targeted  attacks  these  days  involve  content-­‐level  threats,  in  the  infiltration  phase  as  well  as  in  the  data  exfiltration  phase,  it  is  very  important  that  a  network-­‐based  ATD  system  be  able  to  extract,  decode  and  analyze  the  content  traversing  the  network  no  matter  how  deeply  or  recursively  embedded  it  is.    This  applies  to  both  inert  (non-­‐executable)  and  active  (executable)  content  objects.  

Channels  –  How  is  the  information  being  transferred?  

“Channels”  are  the  way  in  which  information  is  being  transferred  over  the  network.  

Channels  include  the  attributes  of  the  network  ports,  protocols,  and  applications  that  are  being  used.    Channels  define  the  “context”  in  which  information  exchange  occurs  on  the  network,  and  that  contextual  awareness  is  often  critically  important  in  being  able  to  distinguish  “normal”  network  activity  from  abnormal,  suspicious,  or  malicious  network  activity.      

Locations  –  Where/who  is  the  information  coming  from  and  going  to?  

“Locations”  are  everything  that  relate  to  the  source  and  destination  of  the  information  that’s  traversing  the  network.  

Examples  of  “locations”  includes  not  just  network-­‐,  protocol-­‐,  and  application-­‐level  source  and  destination  information  such  as  TCP/UDP  ports,  IP  addresses,  DNS  domains,  and  URLs,  but  also  organizational-­‐,  reputational-­‐,  and  identity-­‐based  attributes  of  the  sources  and  destinations  of  information.    

Page 6: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 5

 Threat  Detection,  Prevention,  and  Incident  Response  Requirements  

A  network-­‐based  Advanced  Threat  Defense  system  should  serve  two  primary  roles:  

1. Threat  Detection  and  Prevention  role  protects  you  from  internal  and  external  attacks.  

2. Incident  Response  role  helps  automate  and  accelerate  your  incident  response  cycle.  

In  the  Threat  Detection  and  Prevention  role,  the  key  actions  for  an  ATD  are  to  “detect”  and  “prevent”  a  whole  spectrum  of  malicious  activity,  regardless  of  the  tactics,  including  phishing,  exploits,  malware,  command  and  control  communication,  lateral  propagation,  data  staging,  data  leakage,  and  exfiltration,  among  others.    The  key  technical  requirement  here  is  that  the  ATD  system  must  be  able  to  identify  threats  in  real  time  –  as  they  occur  –  and  be  able  to  take  a  unilateral  prevention  action  when  it  sees  them.    This  unilateral  prevention  capability  is  important  because,  in  many  cases,  the  ATD  system  is  the  only  one  in  the  network  security  infrastructure  that  can  identify  the  threat  with  sufficient  precision  to  be  able  to  block  it  without  disrupting  normal  network  traffic.  

In  the  Incident  Response  role,  the  ATD  system  must  be  able  to  discover  compromised  systems,  investigate  live  and  dormant  incidents,  and  contain  targeted  attacks  before  they  result  in  data  loss.    Implicit  in  the  previous  statement  is  the  fact  that  no  ATD  system  can  guarantee  that  you  will  never  be  compromised  by  an  advanced  adversary.    The  key  technical  requirement  in  this  role  is  that  the  ATD  system  must  have  some  form  of  “historical  network  memory”  and  be  able  to  search,  query,  and  analyze  the  recorded  information.    This  gives  the  incident  responders  the  ability  to  “go  back  in  time”  and  look  for  things  that  the  system  did  not  know  were  malicious  at  the  time  that  they  occurred.  

 

Page 7: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 6

Comprehensive  Network-­‐Based  Advanced  Threat  Defense  Capabilities  

A  comprehensive  network-­‐based  ATD  solution  can  be  broken  down  into  three  critical  capabilities:  

• Inbound  Threat  Protection  

• Data  Theft  Protection  

• Network  Security  Analytics    

Comprehensive  Advanced  Threat  Defense  

Figure 2.  

   

Page 8: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 7

Inbound  Threat  Protection  

The  industry  may  lead  you  to  believe  that  this  is  only  about  advanced  malware  protection;  however,  a  truly  comprehensive  ATD  solution  provides  protection  against  targeted  persistent  attacks  at  each  phase  of  the  threat  lifecycle  on  the  network:  before  they  are  downloaded,  when  they  are  transferred  within  the  network,  to  when  they  are  installed  on  an  endpoint.  A  truly  comprehensive  ATD  solution  protects  you  with  these  features:  

• Advanced  Malware  Detection  –  analyzing  scores  of  inbound  threats  per  second  as  they  flow  over  the  network,  maintaining  a  high  malware  detection  rate  with  extremely  low  false  positives.  

• Rich  Malware  Execution  Forensics  –  detailed  description  of  what  the  malware  did  when  it  executed  in  the  virtual  execution  environment  such  as  registry,  file  system  and  operating  system  changes,  network  call-­‐out  behavior,  etc.  

• Real-­‐Time  Threat  Prevention  –  analyzing  network  traffic  at  multi-­‐gigabit  speeds,  providing  real-­‐time  discovery  and  prevention.    

• Automated  Threat  Intelligence  –  delivering  a  continuous  stream  of  finely  curated  reputational  threat  intelligence  for  automatic  consumption;  a  key  component  in  enabling  the  solution  to  quickly  identify  suspicious  and  malicious  activity.  

• Flexible  Policy  (Rules)  Engine  –  operationalizing  known  advanced  threat  indicators  using  open  industry  standards,  like  YARA.    

• Wire-­‐Speed  Performance  –  analyzing  gigabits  of  network  traffic  in  real  time,  providing  visibility,  analysis,  and  protection  from  advanced  threats  before  they  harm  your  enterprise.  

Data  Theft  Protection  

A  truly  comprehensive  ATD  solution  will  directly  detect  and  prevent  the  unauthorized  flow  of  sensitive,  valuable,  or  classified  information  out  of  the  network.    The  technical  requirements  include:  

• Data  Exfiltration  Prevention  –  using  sophisticated  rules  and  techniques  to  prevent  the  theft  of  sensitive  and  confidential  data  out  of  your  network.  

• Intellectual  Property  Protection  –  flexible  and  powerful  policy  engine  to  match  the  characteristics  of  your  intellectual  property  and  block  any  unauthorized  transfers  of  this  data.  

Page 9: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 8

• Compete  Content  Visibility  –  delivering  network  visibility,  analysis,  and  control  over  all  protocols,  applications,  and  file  types  to  defend  against  advanced  threats  and  prevent  data  theft  in  real  time.  

• Flexible  Data  Profiling  –  Through  a  flexible,  powerful  policy  engine,  you  can  define  the  characteristics  of  your  most  valuable  data  to  identify  sensitive  data  and  keep  it  from  leaving  your  network.  

• Actionable  Alerts  –  alerts  provide  comprehensive,  actionable  information  allowing  you  to  rapidly  triage  and  remediate  threats.  

Network  Security  Analytics  

A  comprehensive  ATD  solution  will  provide  a  historical  record  of  all  network  activity  so  you  may  “go  back  in  time”  to  look  for  things  that  you  didn’t  know  were  bad  at  the  time  that  they  occurred.    There  are  many  use  cases  for  this  capability  across  all  phases  of  the  threat  lifecycle.    The  technical  requirements  include:  

• Full  Metadata  Capture  –  collecting  details  (metadata)  about  every  network  transaction.  This  metadata  is  stored  as  historical  network  memory  and  leveraged  to  discover  past  incursions.  

• Multi-­‐dimensional  Analysis  –  analyzing  network  content  against  multiple  sources  of  threat  intelligence  including  reputation  feeds,  custom  policies,  and  threat  prevention  policies  that  are  updated  frequently.  

• Advanced  Visualization  –  delivering  dynamic  summaries  and  trends  of  your  enterprise,  by  host,  alerts,  location,  and  protocols  to  understand  your  organizations  threat  landscape.  

• Customizable  Reporting  –  standard  and  customizable  reports  on  the  rich  metadata  collected  over  time.    

• Correlated  Alerting  –  correlating  alert  data  for  investigation  with  other  transactions  potentially  related  to  the  threat.  

A  comprehensive,  network-­‐based  ATD  system  should  combine  all  three  capabilities  –  Inbound  Threat  Protection,  Data  Theft  Protection,  and  Network  Security  Analytics  –  in  a  seamless,  tightly  integrated  system,  under  a  single  management  framework.  

   

Page 10: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 9

Integration  with  Endpoint  Security  Systems  

The  main  job  of  a  network-­‐based  ATD  system  is  to  protect  the  enterprise’s  computing  assets  (endpoints)  –  at  the  network  level  –  from  being  compromised.    The  primary  way  it  does  this  is  by  decoding  and  analyzing  the  network  traffic  that  flows  to  and  from  those  endpoints,  looking  for  indications  of  threat  and/or  compromise  within  the  contextual  information  that  is  available  on  the  network.    It  can  also  simulate  endpoint  execution  environments  –  by  incorporating  emulators  and/or  full  virtualized  endpoint  execution  containers  (“sandboxes”)  for  example.  

However,  no  matter  how  “good”  a  network-­‐based  ATD  system  is  –  it  needs  to  have  access  to  the  contextual  information  that  is  available  on  the  actual  enterprise  endpoints  themselves.  To  do  this,  the  network  ATD  system  should  integrate  with  endpoint  defenses.  This  integration  should  include  the  sharing  of  contextual  information  about  threats  and/or  threat  intelligence.  

For  example,  if  the  network  ATD  system  sees  malware  inbound  to  an  enterprise  endpoint,  it  does  not  know  if  the  malware  actually  executed  on  the  “real”  endpoint.    On  the  other  hand,  if  there  is  an  endpoint  security  solution  that  is  monitoring  and  recording  the  behavior  of  all  executable  objects  on  the  endpoint,  the  network  ATD  system  can  query  the  endpoint  security  system  to  determine  if  the  malware  actually  executed  on  the  target  endpoint  (or  at  other  endpoints  in  the  enterprise).    If  the  answer  is  “yes”,  the  network  ATD  system  can  increase  the  severity  of  the  malware  alert  and  escalate  its  priority  in  the  security  analyst’s  workflow.  

 Integration  between  Network  and  Endpoint  ATD  Systems      

 Figure 3.  

Page 11: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 10

The  Fidelis  XPS™  Solution  

The  Fidelis  XPS™  solution  is  a  comprehensive,  network-­‐based  Advanced  Threat  Defense  solution  consisting  of  four  major  components,  as  shown  in  Figure  4.  

 

The  Fidelis  XPS  Solution  

 

Figure 4.  

These  components  are  described  briefly  below.  For  more  details,  see  the  Fidelis  Solution  Overview  white  paper.  

• Fidelis  Insight  is  a  cloud-­‐based  aggregation  of  dynamic  threat  intelligence  derived  from  multiple  public  and  proprietary  sources.  Fidelis  Insight  includes  content-­‐,  channel-­‐,  and  location-­‐based  threat  intelligence.    It  also  includes  a  secure,  high-­‐capacity,  virtual  execution  (sandbox)  environment.  

• Fidelis  XPS  CommandPost  is  the  management  system  for  the  Fidelis  XPS  products  and  the  integration  point  between  the  Fidelis  XPS  solution  and  other  systems  in  the  enterprise  network  security  infrastructure.    

Page 12: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 11

• Fidelis  XPS  Sensors  are  the  “workhorses”  of  the  Fidelis  XPS  solution.    They  are  typically  deployed  at  boundary  points  on  the  enterprise  network  (e.g.  at  Internet  or  MPLS  access  points,  in  front  of  the  enterprise  fileshares,  etc.).    They  can  be  deployed  “in  line”  with  the  network  traffic  or  “out  of  band”  where  they  receive  a  copy  of  the  traffic  from  a  network  TAP  or  a  switch  SPAN  port.    There  are  several  different  types  of  sensors  that  are  designed  for  deployment  at  different  points  in  the  physical  and  logical  network  infrastructure.    The  sensors  reassemble,  decode,  and  analyze  the  traffic  that  traverses  the  network  boundary  in  real  time  using  Fidelis’  patented  Deep  Session  Inspection®  technology,  which  gives  them  deep  visibility  and  control  over  the  protocols,  application,  and  content  objects  that  are  flowing  over  the  network.    This  enables  the  Fidelis  XPS  sensor  to  detect  threats  that  are  not  visible  to  other  network  security  systems.    The  Fidelis  XPS  sensors  include  an  integrated  Malware  Detection  Stack  that  identifies  malware  objects  flowing  over  the  network  using  a  combination  of  rule-­‐based  behavioral  analysis,  static  and  dynamic  malware  detection  technologies.    The  malware  detection  stack  uses  a  high  speed,  multi-­‐threaded  architecture  that  can  analyze  hundreds  of  objects  per  second  (per  sensor).        When  a  sensor  detects  a  session  that  triggers  a  threat  detection  rule,  it  takes  an  action  on  the  session.    The  action  is  configurable  at  the  rule  level  and  can  be  a  record-­‐and-­‐alert  action  or  a  prevention-­‐and-­‐alert  action.    The  sensors  also  extract  rich  network-­‐,  protocol-­‐,  application-­‐,  and  content-­‐level  metadata  from  each  and  every  network  session  that  occurs  on  the  network  –  whether  the  session  triggers  a  threat  detection  rule  or  not  –  and  sends  the  metadata  to  a  Fidelis  XPS  Collector  system  (if  deployed).  

• Fidelis  XPS  Collector  is  a  database  for  rich  session  metadata  extracted  from  all  network  sessions  by  the  Fidelis  XPS  sensors.    The  Collector  stores  session  metadata  from  one  or  more  Fidelis  XPS  sensors  in  a  high-­‐speed  database  and  makes  it  available  to  analysts  via  a  query  and  search  interface  on  the  Fidelis  XPS  CommandPost.    The  Collector  supplies  historical  network  memory  at  a  much  lower  total  cost  of  ownership  than  a  full  packet  capture  system.    The  Collector  corresponds  to  the  “index”  component  of  a  full  packet  capture  system,  but  the  Collector’s  index  is  much  “richer”  because  of  the  deep  protocol,  application,  and  content  decoding  capabilities  of  the  Fidelis  XPS  sensors  that  extract  the  metadata  –  the  richer  the  index,  the  higher  the  probability  of  detection.  

     

Page 13: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 12

Fidelis  XPS  Solution  Architecture  

The  Fidelis  XPS  products  are  purpose-­‐built  for  advanced  threat  defense,  and  have  the  following  specific  architectural  capabilities:  

• Broad  visibility  over  all  network  ports,  protocols,  and  applications  

• Deep  visibility  into  encapsulated,  encoded,  embedded,  compressed,  obfuscated  content  

• Multi-­‐dimensional  dynamic  threat  intelligence  

• Historical  and  comprehensive  network  memory  

• Static  and  dynamic  malware  detection  and  analysis  

• Data  theft/exfiltration  detection  and  prevention  

• Open  policy,  rules,  and  threat  intelligence  engine  

• Scalability  up  to  2.5+  Gbps  for  each  stand-­‐alone  appliance  (up  to  20+  Gbps  per  blade  center  chassis)  

• Unilateral  real-­‐time  prevention  (blocking)  capability  

• Integrations  with  leading-­‐edge  endpoint-­‐based  ATD  systems          

Page 14: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 13

Fidelis  XPS  –  A  Comprehensive  Network-­‐Based  ATD  Solution  

Visibility  and  Control  over  the  Entire  Threat  Life  Cycle  

The  Fidelis  XPS  solution  includes  technologies  and  threat  intelligence  that  give  visibility  and  control  over  each  of  the  four  phases  of  the  threat  lifecycle  (infiltration,  command  and  control  communication,  lateral  propagation,  and  data  exfiltration).    Experience  shows  that  this  “broad  spectrum”  approach  significantly  increases  the  probability  of  seeing  the  threat  before  it  does  irreparable  harm  to  the  targeted  organization.  

Multi-­‐Dimensional  Dynamic  Threat  Intelligence  

Fidelis  XPS’  Deep  Session  Inspection  technology,  coupled  with  the  dynamic  threat  intelligence  available  in  Fidelis  XPS  Insight,  gives  the  Fidelis  XPS  solution  a  unique  ability  to  operationalize  all  three  dimensions  of  network  threat  intelligence  (content,  channels  and  locations)  on  network  traffic.    This  multi-­‐dimensional  visibility  also  increases  the  probability  of  detecting  an  advanced  threat.  

Threat  Detection/Prevention  and  Incident  Response  

The  architecture  of  the  Fidelis  XPS  solution,  and  in  particular  its  unique  combination  of  real-­‐time  detection  and  prevention  capability  with  both  selective  and  non-­‐selective  network  memory,  enables  it  to  add  value  both  in  threat  detection  and  prevention  and  in  incident  response  roles.  

Integrations  with  Endpoint  Advanced  Threat  Detection  Systems  

The  Fidelis  XPS  solution  has  integrations  with  leading  edge  endpoint-­‐based  ATD  systems  such  as  Verdasys  Digital  Guardian  and  Bit9  +  Carbon  Black.    These  integrations  give  the  Fidelis  XPS  system  access  to  contextual  information  that  is  only  available  on  the  endpoint  itself.

All  Three  Critical  ATD  Capabilities  in  a  Single,  Tightly  Integrated  System  

One  of  the  most  distinguishing  characteristics  of  the  Fidelis  XPS  solution  is  that  it  integrates  all  three  critical  capabilities  of  network  based  advanced  threat  defense  (advanced  malware  protection,  data  exfiltration  protection,  and  network  forensics  and  analytics)  in  a  single  system  under  a  unified  management  framework,  as  shown  in  Figure  4.  

The  benefits  of  having  all  three  of  these  capabilities  seamlessly  integrated  into  a  single  system,  under  a  unified  management  framework  include:  higher  probability  of  detecting  or  preventing  threats  before  they  result  in  serious  damage;  lower  incident  response  costs  due  to  fewer  incidents,  faster  containment  and  remediation,  and  lower  post-­‐incident  charges  such  as  legal,  forensics,  etc.;  and  lower  network  security  infrastructure  costs  as  a  result  of  having  fewer  boxes,  lower  maintenance,  and  less  analyst  oversight.  

Page 15: Comprehensive Advanced Threat Defense · WPv0614 PAGE 4 TheThreeDimensions*of*NetworkThreat*Intelligence * There$are$three$components$you$must$understand$when$you$are$looking$for$threats$inyour$

WPv0614

PAGE 14

About  General  Dynamics  Fidelis  Cybersecurity  Solutions  

General  Dynamics  Fidelis  Cybersecurity  Solutions  provides  organizations  with  a  robust,  comprehensive  portfolio  of  products,  services,  and  expertise  to  combat  today's  sophisticated  advanced  threats  and  prevent  data  breaches.  Our  commercial  enterprise  and  government  customers  around  the  globe  can  face  advanced  threats  with  confidence  through  use  of  our  Network  Defense  and  Forensics  Services,  delivered  by  an  elite  team  of  security  professionals  with  decades  of  hands  on  experience,  and  our  award  winning  Fidelis  XPS™  Advanced  Threat  Defense  products,  which  provide  visibility  and  control  over  the  entire  threat  life  cycle.