agility americas how websafe can protect …...how websafe can protect customers from web-based...

Post on 25-Apr-2020

9 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

How WebSafe Can Protect Customers from Web-Based Attacks

Mark DiMinico Sr. Mgr., Systems Engineering—Security

Drivers for Fraud Prevention—WebSafe Protection

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

Drivers for Fraud Prevention—WebSafe Protection

Three Never-Ending Battles 1. Humans will always make mistakes 2. System and application

vulnerabilities continue to emerge 3. Malware detection typically lags

Social Engineering

Phishing

Vulnerability Exploit

Malware Infection

Fraud Scheme

Execution

Money Loss

$

SECURITY

Gameover ZeuS adds nasty trick Crypto to slip through firewalls By Richard Chirgwin, 4 Feb 2014

Nearly  half  of  internet  users  encountered  malware  in  the  last  year  Sep 16, 2015

© 2016 F5 Networks

Perimeter Security

4

Security Investments Are Misaligned with Reality

© 2016 F5 Networks

Perimeter Security

25% 90%

OF ATTACKS ARE FOCUSED HERE

OF SECURITY INVESTMENT

4

Security Investments Are Misaligned with Reality

© 2016 F5 Networks

Perimeter Security Identity & Application Security

25% 90% 72% 10%

OF ATTACKS ARE FOCUSED HERE

OF SECURITY INVESTMENT

OF ATTACKS ARE FOCUSED HERE

OF SECURITY INVESTMENT

4

Security Investments Are Misaligned with Reality

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM Leveraging browser application behavior • Caching content, disk

cookies, history • Add-ons, plug-ins

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM Leveraging browser application behavior • Caching content, disk

cookies, history • Add-ons, plug-ins

Manipulating user actions: • Social engineering • Weak browser settings • Malicious data theft • Inadvertent data loss

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM Leveraging browser application behavior • Caching content, disk

cookies, history • Add-ons, plug-ins

Manipulating user actions: • Social engineering • Weak browser settings • Malicious data theft • Inadvertent data loss

Embedding malware: • Browser Keyloggers • Framegrabbers • Data miners • MITB/MITM • Phishers/Pharmers

Customer Browser

© 2016 F5 Networks

Browser Is the Weakest LinkEndpoint risks to “Data in Use”

HTTP/HTTPS

Secured Data Center

WAF

HIPS

Traffic management

NIPS

DLP

Network firewall

SIEM Leveraging browser application behavior • Caching content, disk

cookies, history • Add-ons, plug-ins

Manipulating user actions: • Social engineering • Weak browser settings • Malicious data theft • Inadvertent data loss

Embedding malware: • Browser Keyloggers • Framegrabbers • Data miners • MITB/MITM • Phishers/Pharmers

Hmmmm…

ZERO TRUST

© 2016 F5 Networks

F5’s WebSafe Capabilities

© 2016 F5 Networks

F5’s WebSafe Capabilities

Advanced Phishing Detection

Application Layer Encryption

Automatic Transaction Detection

Malware Detection

© 2016 F5 Networks

Advanced Phishing Attack Detection and Prevention

• Alerts of extensive site copying or scanning

• Alerts on uploads to a hosting server or company

• Alerts upon login and testing of phishing site

• Logging of credentials used at phishing site

• Enables shuts down of phishing server sites during testing

Identifies phishing threats early on and stops attacks before emails are sent

Internet

Web Application

Alerts at each stage of phishing site development

© 2016 F5 Networks

Advanced Phishing Attack Detection and Prevention

• Alerts of extensive site copying or scanning

• Alerts on uploads to a hosting server or company

• Alerts upon login and testing of phishing site

• Logging of credentials used at phishing site

• Enables shuts down of phishing server sites during testing

Identifies phishing threats early on and stops attacks before emails are sent

Internet

Web Application

2. Save copy to computer

1. Copy website

Alerts at each stage of phishing site development

© 2016 F5 Networks

Advanced Phishing Attack Detection and Prevention

• Alerts of extensive site copying or scanning

• Alerts on uploads to a hosting server or company

• Alerts upon login and testing of phishing site

• Logging of credentials used at phishing site

• Enables shuts down of phishing server sites during testing

Identifies phishing threats early on and stops attacks before emails are sent

Internet

Web Application

2. Save copy to computer

3. Upload copy to spoofed site

4. Test spoofed site

1. Copy website

Alerts at each stage of phishing site development

© 2016 F5 Networks

Clientless Generic and Targeted Malware Detection

• Analyzes browser for traces of common malware (i.e., Zeus, Citadel, Carberp, etc.)

• Both signature- and behavior-based approach

• Detects MitB • Detects Remote Access Trojans

(RATs) • Advanced threats leveraging both

MitB and MitM (Dyre) • Real-time alerts and visibility

Recognize and safeguard against sophisticated threats originating from your clients

© 2016 F5 Networks

Advanced Application-Layer Encryption

• Form fields can be obfuscated to impede hacker visibility

• Sensitive information can be encrypted in real time

• Data decryption leverages BIG-IP hardware

• Intercepted information rendered useless to attacker

• Helps identify stolen credentials

Secures credentials and other valuable data submitted on web forms

ENCRYPTION AS YOU TYPE

© 2016 F5 Networks

Transaction Anomaly Detection

• Analyzes user interaction with the browser

• Mouse movements, button interactions, page read time, etc.

• Detects automated transactions • Ensure integrity of transaction data

• Received vs. sent data check • Provides real-time alerts and visibility

Identifies non-human client behavior and data manipulation

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

Optional web site takedown

for phishing sites

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

Optional web site takedown

for phishing sites

Filtering alerts by severity and ignoring

false positives

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

Optional web site takedown

for phishing sites

Filtering alerts by severity and ignoring

false positives

Provide detailed incident reports

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

Optional web site takedown

for phishing sites

Filtering alerts by severity and ignoring

false positives

Provide detailed incident reports

Continuous WebSafe deployment validation

© 2016 F5 Networks

Benefits of the F5 Security Operations Centers

Fraud analysis that extends a customer’s security team

Real-time alerts activated by phone, SMS, and email

SOCs currently in Seattle, WA, and Warsaw, Poland

SOC services are complimentaryfor WebSafe customers

$

Optional web site takedown

for phishing sites

Filtering alerts by severity and ignoring

false positives

Provide detailed incident reports

Continuous WebSafe deployment validation

Researching and investigating new

global fraud technologies

© 2016 F5 Networks

In Real Time

Fraud Protection Service—Total Protection

Malware and phishing attacks designed to steal identity, data, and

money

Full Transparency

No endpoint software or user

involvement required

On All Devices

Cross-device and cross-channel

attacks

Protect Online Users

Banks, financial institutions, e-

commerce, insurance, social media sites, etc.

Prevent Fraud

Help companies protect their

customers, data, and reputation

WEBSAFE & MOBILESAFE: TOTAL FRAUD PROTECTION

Protect Your Appsto Secure Your Data

© 2016 F5 Networks

© 2016 F5 Networks

Typical WebSafe Architecture

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

Customer has a network firewall in their DMZ

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Of course this can be a BIG-IP system running AFM

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

BIG-IP LTM

A local traffic pool is hosting a web application on several servers

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Data Center

Web Application

BIG-IP LTM

This can be running within the corporate data center…

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

BIG-IP LTM

…or within a public or private cloud

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

BIG-IP Fraud Protection Service (FPS) is provisioned along with BIG-IP LTM and an FPS profile is added

to the virtual server

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

Internet users send requests for the web

application

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

BIG-IP FPS inserts obfuscated JavaScript code into the response

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

Web Application

On the BIG-IP system, a pool is configured for

the Alert Server

BIG-IP LTM +FPS

Alert Server

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

On Premise

SIEM 3rd party risk engine

Web Application

This can either be on premises…

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

On PremiseF5 SOC

SIEM 3rd party risk engine

Web Application

Alert Server

Alerts in the Cloud

...or in the cloud

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

On PremiseF5 SOC

SIEM 3rd party risk engine

Web Application

Alert Server

Alerts in the Cloud

When malicious activity is detected, BIG-IP FPS sends alerts

to the configured pool

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

On PremiseF5 SOC

SIEM 3rd party risk engine

Web Application

Alert Server

Alerts in the Cloud

Whether on premises or in the cloud, the Alert Dashboard displays information about all detected

malicious activity

BIG-IP LTM +FPS

© 2016 F5 Networks

Typical WebSafe Architecture

DMZ

BIG-IP AFM

On PremiseF5 SOC

SIEM 3rd party risk engine

Web Application

Alert Server

Alerts in the Cloud

The F5 SOC does not have any access to on premises

Alert Servers

BIG-IP LTM +FPS

• Add  class  to  your  personal  schedule.  • Survey  will  pop  up  in  Mobile  App.  • Answer  the  multiple  choice.  • Submit  your  question  to  complete.  • Receive  5  points!

Give  Feedback  –  Get  Points!

top related