12
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited. Security Intelligence and Analytics See everything. Know everything.™ Steve Shillingford, President and CEO

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

Embed Size (px)

Citation preview

Page 1: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Security Intelligence and AnalyticsSee everything. Know everything.™

Steve Shillingford, President and CEO

Page 2: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

The Threat Landscape Has Evolved…

HACKTIVISTS

STATE-SPONSORED ATTACKERS

CYBERCRIMINALS

2

FINANCIALLY MOTIVATED

NATIONALISTICALLY

MOTIVATED

POLITICALLY MOTIVATED

ATA/APT GRADE

DDOS

Ransom & fraud

Gov’t, enterprise &

infrastructure targets

Public data leakage

Defacement

DATATHEFT

MALWARE

BADSTUFF IN

GOOD STUFF OUT

Page 3: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

The Malware Problem – Overwhelming Odds

1/3of malware is

customized (no signature available at

time of exploit)

85%of breaches took weeks or more to discover (+6%)

(VzB, 2012) (VzB, 2012) (Ponemon)

91%of organizations believe exploits bypassing their

IDS and AV systems

3

Page 4: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Finding Answers to Dreaded Post-breach Questions

4

?Who did this to us?

How did they do it?

What systems and data were affected?Can we be sure it is over?

Can it happen again?

Page 5: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Records, classifies and indexes all packets, flows, and files from L2–L7

On the wire, file-level visibility of data exfiltration and malware infiltration

Unmatched multi-dimensional flow enrichment and Big Data warehousing

Actionable intelligence, forensics and situational awareness

Flexible, open and easy-to-use platform-Hardware, Software, and VM

HOW do we do what we do?

Providing real-time analysis and full visibility of everything going in and out of your network

Solera Networks is the Security Camera for your Enterprise Network

5

Page 6: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

NGFW

DPI

IDS/IPS

ACLs

Flow Analysis

Stateful Firewalls

Solera is Solving the Visibility Gap in Today’s Tools

6

Time

1997

2012

1999

2002

2006

PREVENTION

2

3

4

5

6

7CONTENTCONTEXTVISIBILITY

BIG DATA SECURITY

Security Intelligence and

Analytics

TODAY’S SECURITY GAP

Coverage

• Real-Time File Extraction

• Real-Time Analytics

• Deep Packet Inspection

• Log Analysis & Aggregation

• Malware Analysis

• Application-Based Blocking

• Signature-Based Blocking

• L2-L7 Indexing

• Storage

• Full Packet Capture

TCP/IP Model

Page 7: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

WHAT we deliver

Advanced Persistent Security™

that easily tells users what to look for—and at

7

Page 8: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Solera DeepSee™

The Most Scalable and Flexible Big Data Security Solution

8

Page 9: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Big Data Security Intelligence and Analytics for Visibility of Today’s

Advanced Threats

Goes beyond traditional approaches to deliver 20/20 visibility of advanced malware, APTs and ATAs—for every packet, flow and file

Automatically and accurately tells enterprises and organizations what zero-day threats and attacks to look for—instead of the other

way around

Seamlessly integrates with best-of-breed 3rd party security tools to provide a single, correlated event view

9

Page 10: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

Security Intelligence & Analytics

Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years.

—Neil MacDonald, Distinguished VPGARTNER

INTRUSION

PREVENTION

SYSTEMS NEXT-GEN

FIREWALLS

LOG

MAN

AG

EM

EN

T

SECURITY

INFORMATION

EVENT

MANAGEMENT

CONTEN

T

FILTERIN

G

DATA

LEA

KA

GE

PR

EV

EN

TIO

N

10

Page 11: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.

What We Do MattersWe help protect companies and government agencies from those who want to do them harm. And, by doing that, we are helping to protect our way of life…

Page 12: © 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written

© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.