37
The Real World of IT Security – Insight From a Survey of Business Aaron C. Goldberg July 2013

New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Embed Size (px)

Citation preview

Page 1: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

The Real World of IT Security – Insight From a Survey of Business

Aaron C. Goldberg

July 2013

Page 2: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Interactivity Tips

1. Ask A Question

2. Download a PDF copy of today’s presentation

3. Social Networking Tools

Page 3: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Key Discussion Points• The IT Security landscape• Identifying the concerns• The reliance on Anti-Virus• The barriers to increased levels of IT security

Page 4: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

About the Survey

• How many• When• How was it done

Page 5: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Today’s IT Security Landscape

• Biggest areas of IT security concern• Threat impact• Protection in use for endpoints• Protection in use for servers

Page 6: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Key Concerns for IT SecurityO

pera

ting

sys

tem

laye

r at

tack

s

App

lica

tion

laye

r at

tack

s

USB

dev

ice

atta

cks

Unw

ante

d ap

plic

atio

n in

stal

la-

tion

Mem

ory-

base

d at

tack

s

Phis

hing

Zer

o-da

y at

tack

s

Adv

ance

d Pe

rsis

tent

Thr

eats

(i

.e. u

sing

mul

tipl

e at

tack

ro

utes

)

OT

HE

R

Non

e of

the

abov

e0%5%

10%15%20%25%

Page 7: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Impact of ThreatsMalware Incidents Per Month

5-10 10-20 20-30 30-40 40+0%

10%

20%

30%

40%

50%

60%

70%

Page 8: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Protection In Use At EndpointsA

nti-

viru

s (A

V)

App

lica

tion

con

trol

/ w

hite

list

ings

Dat

a en

cryp

tion

Fir

ewal

ls

US

B d

evic

e se

curi

ty

Pat

ch m

anag

emen

t

Har

d dr

ive

secu

rity

Web

fil

teri

ng

Dat

a lo

ss p

reve

ntio

n

OT

HE

R

Non

e of

the

abov

e0%

20%

40%

60%

80%

100%

Page 9: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Protection Installed for ServersA

nti-

viru

s (A

V)

App

lica

tion

con

trol

/whi

teli

stin

g

Dat

a en

cryp

tion

Fir

ewal

ls

US

B d

evic

e se

curi

ty

Pat

ch m

anag

emen

t

Har

d dr

ive

(sec

urit

y)

Web

fil

teri

ng

Acc

ess

cont

rol t

echn

olog

ies

OT

HE

R

Non

e of

the

abov

e0%

20%

40%

60%

80%

100%

Page 10: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Focusing on Anti-Virus

• Most common security tool• Viruses seem to be the single most prominent

threat mentioned in the general press• Developed when viruses were the vast majority

of threats, but that’s no longer true• Yet reliance is still there

Page 11: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

How Important Do You Believe Anti-Virus is to Protect Your Network

Extre

mely

impo

rtant

Very i

mpo

rtant

Somew

hat i

mpo

rtant

Not ve

ry im

porta

nt

Not im

porta

nt at

all

0%

10%

20%

30%

40%

50%

60%

70%

Page 12: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

The Barriers to Increased IT Security

• This is one aspect of IT where the trade-off of dollars vs. risk is most apparent

• The lack of a “finish line” makes it hard to know what investment is enough

• Different industries have different needs

Page 13: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

What Prevents You From Deploying Additional Security Layers

Bud

get c

onst

rain

ts

Lab

or c

onst

rain

ts

Perf

orm

ance

impa

cts

(Ban

dwid

th/h

ardw

are

cons

trai

nts)

Our

env

iron

men

t is

adeq

uate

ly p

ro-

tect

ed w

itho

ut th

em

Uns

ure

OT

HE

R

0%10%20%30%40%50%60%

Page 14: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Antivirus:Required but not Sufficient

Page 15: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

New Threat Landscape

Page 16: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

New Malware in 2013

16PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 17: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

New Malware in 2013

17PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

2012 Avg ≈ 2.8M / mo.

2013 YTD Avg ≈ 5.5M / mo.

Page 18: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Total Malware Growth

18PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 19: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Total Malware Growth

19PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

~50% increase

Page 20: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION20

APT / Targeted Attacks

Ponemon Research: 2013 State of the Endpoint

ISACA Research: Advanced Persistent Threats Are Real» 93.6% feel APTs are a serious threat» 63% think it is only a matter of time» 79% feel this is the largest gap in APT prevention» 1 in 5 have experienced an APT attack

47%36%

36%24%24%

22%23%

13%

Figure 4: IT security risks of most concern since 2010More than three choice permitted in 2010 and 3 choices permitted in 2011 and 2012

Increased use of mobile platforms

Advanced persistent threats

Intrusion and data loss within a virtual environment

2012 2011 2010 * This choice was not available in all fiscal years

*

Page 21: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

New Threat Landscape

The Endpoint is the New Attack Vector

21

Browser, Apps and OS all have known vulnerabilities

• 2/3 of all apps have known vulnerabilities

• Time-to-Patch with change control is long, resulting in a lack of security and visibility

Rogue USB

• Transport method for injecting malware (e.g., Conficker, Stuxnet)

• Easiest and most common means of data loss / theft

Virus / Malware

•Best capture rate for day one with AV is 33%. After 30 days it is 93%

• 70,000 pieces of malware a month remain undetected

Page 22: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Safeguarding Your Environment

Page 23: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth Strategy

Successful risk mitigation requires a layered defensive strategy which includes:

» Patch Management

» Configuration Control

» Application Whitelisting

» Memory Protection

» Data Encryption

» Port / Device Control

» Antivirus

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

23

Page 24: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth – AV

Benefits

» Stops “background noise” malware

» May detect reused or “hidden “code

» Will eventually clean payloads after they are discovered – prevents spreading to less protected machines

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

24

Page 25: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth – Port / Device Control

Benefits

» Can prevent unauthorized devices from delivering payloads

» Can stop specific file types from being copied to host machines

» Stops common delivery vector for evading extensive physical and technical security controls

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

25

Page 26: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth – Encryption

Benefits

» Protects data; stops leakage; etc.

» Makes lateral data acquisition more difficult for APTs / targeted attacks

» Required by almost all regulations

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

26

Page 27: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth – App Whitelisting

Benefits

» Extremely effective against zero-day attacks

» Stops unknown, targeted malware payloads

» Low performance impact on endpoints

» Prevents sophisticated memory injection attacks which bypass file system

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

27

Page 28: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Defense-in-Depth – Patch / Config Mgmt

Benefits

» Eliminates the attackable surface area that hackers can target, including OS and 3rd party apps across multiple platforms

» Centralizes configuration and enforcement of native desktop firewalls and other security settings

Patch and Configuration Management

Application ControlMemory Protection

DeviceControl

AV

Hard Drive andMedia Encryption

28

Page 29: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Endpoint Management Complexity

Challenge• Too Many Products, Too Much Complexity

» Endpoint management has become excessively complex as multiple stand-alone solutions have been implemented in the IT environment

ManyConsoles

Disparate Architecture

ManyAgents

29

Page 30: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Endpoint Management Complexity

Challenge• Too Many Products, Too Much Complexity

» Endpoint management has become excessively complex as multiple stand-alone solutions have been implemented in the IT environment

Solution• Single, Extensible Platform

» Reduce the number of endpoint agents, servers, consoles in use

» Improve visibility and control over endpoints» Reduce learning curve, free up network resources

and improve IT productivity / resources» Leverage existing organizational structures across

solutions and reduce data silos

SingleConsole

Agile n-Tier Pluggable Architecture

Single Promotable Agent

30

Page 31: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Overcoming Barriers

Page 32: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Tolly Study: Clients

32PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 33: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Tolly Study: Servers

33PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 34: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

True Cost of Malware

• Acquisition Costs» Licensing

(license cost, maintenance, support)» Installation

(HW / SW, roll-out, other)

• Operational Costs» System Managemenet» Incident Management

(help desk, escalation, re-imaging)» Lost Productivity

• Does not include extraordinary costs, such as a data breach

Operational(60~80%)

Acquistion(20~40%)

34

http://www.lumension.com/Resources/Value-Calculators/Cost-of-Malware-Calculator.aspx

Page 35: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

More Information

• Free Security Scanner Tools» Vulnerability Scanner – discover all OS and

application vulnerabilities on your network » Application Scanner – discover all the apps

being used in your network» Device Scanner – discover all the devices

being used in your network

http://www.lumension.com/Resources/Security-Tools.aspx

• Lumension® Endpoint Management and Security Suite» Online Demo Video:

http://www.lumension.com/Resources/Demo-Center/Vulnerability-Management.aspx

» Free Trial (virtual or download):http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx

• Think Before You Renew Your AVhttp://www.lumension.com/rethink-av

35

Page 36: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]

http://blog.lumension.com

Page 37: New Malware Signature Every ½ Second – Is Your AV Keeping Up?

37

• Download a copy of today’s slides

• Provide your feedback! Please complete our survey.

• A recorded version of this seminar will be available at

www.eSeminarsLive.com

• View a calendar of our Upcoming Events

Attendee Services