Upload
cora-taylor
View
214
Download
0
Tags:
Embed Size (px)
Citation preview
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Security Intelligence and AnalyticsSee everything. Know everything.™
Steve Shillingford, President and CEO
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
The Threat Landscape Has Evolved…
HACKTIVISTS
STATE-SPONSORED ATTACKERS
CYBERCRIMINALS
2
FINANCIALLY MOTIVATED
NATIONALISTICALLY
MOTIVATED
POLITICALLY MOTIVATED
ATA/APT GRADE
DDOS
Ransom & fraud
Gov’t, enterprise &
infrastructure targets
Public data leakage
Defacement
DATATHEFT
MALWARE
BADSTUFF IN
GOOD STUFF OUT
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
The Malware Problem – Overwhelming Odds
1/3of malware is
customized (no signature available at
time of exploit)
85%of breaches took weeks or more to discover (+6%)
(VzB, 2012) (VzB, 2012) (Ponemon)
91%of organizations believe exploits bypassing their
IDS and AV systems
3
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Finding Answers to Dreaded Post-breach Questions
4
?Who did this to us?
How did they do it?
What systems and data were affected?Can we be sure it is over?
Can it happen again?
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Records, classifies and indexes all packets, flows, and files from L2–L7
On the wire, file-level visibility of data exfiltration and malware infiltration
Unmatched multi-dimensional flow enrichment and Big Data warehousing
Actionable intelligence, forensics and situational awareness
Flexible, open and easy-to-use platform-Hardware, Software, and VM
HOW do we do what we do?
Providing real-time analysis and full visibility of everything going in and out of your network
Solera Networks is the Security Camera for your Enterprise Network
5
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
NGFW
DPI
IDS/IPS
ACLs
Flow Analysis
Stateful Firewalls
Solera is Solving the Visibility Gap in Today’s Tools
6
Time
1997
2012
1999
2002
2006
PREVENTION
2
3
4
5
6
7CONTENTCONTEXTVISIBILITY
BIG DATA SECURITY
Security Intelligence and
Analytics
TODAY’S SECURITY GAP
Coverage
• Real-Time File Extraction
• Real-Time Analytics
• Deep Packet Inspection
• Log Analysis & Aggregation
• Malware Analysis
• Application-Based Blocking
• Signature-Based Blocking
• L2-L7 Indexing
• Storage
• Full Packet Capture
TCP/IP Model
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
WHAT we deliver
Advanced Persistent Security™
that easily tells users what to look for—and at
7
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Solera DeepSee™
The Most Scalable and Flexible Big Data Security Solution
8
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Big Data Security Intelligence and Analytics for Visibility of Today’s
Advanced Threats
Goes beyond traditional approaches to deliver 20/20 visibility of advanced malware, APTs and ATAs—for every packet, flow and file
Automatically and accurately tells enterprises and organizations what zero-day threats and attacks to look for—instead of the other
way around
Seamlessly integrates with best-of-breed 3rd party security tools to provide a single, correlated event view
9
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
Security Intelligence & Analytics
Context-aware and adaptive security will be the only way to securely support the dynamic business and IT infrastructures emerging during the next 10 years.
—Neil MacDonald, Distinguished VPGARTNER
“
”
INTRUSION
PREVENTION
SYSTEMS NEXT-GEN
FIREWALLS
LOG
MAN
AG
EM
EN
T
SECURITY
INFORMATION
EVENT
MANAGEMENT
CONTEN
T
FILTERIN
G
DATA
LEA
KA
GE
PR
EV
EN
TIO
N
10
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.
What We Do MattersWe help protect companies and government agencies from those who want to do them harm. And, by doing that, we are helping to protect our way of life…
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written consent is strictly prohibited.