atp technology pillars

32
4 Pillars of Architecture

Upload: priyanka-aash

Post on 16-Jan-2017

485 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: ATP Technology Pillars

4 Pillars of Architecture

Page 2: ATP Technology Pillars

Three Pillars of Security Architecture

• Protection

• Detection

• Response

• Prediction

Page 3: ATP Technology Pillars

Detection and Prevention

Page 4: ATP Technology Pillars

Cloud Access Security Brokers

Page 5: ATP Technology Pillars

Challenges with SaaS/Cloud

• Sanctioned IT:

– Lack of user behavior visibility or audit trail,

– Ability to encrypt/secure

– Ability to directly prevent threats

• Shadow IT:

– No visibility

– No control

Page 6: ATP Technology Pillars

CASB

• Cloud Access Security Brokers (CASBs) are security enforcement points between consumers and service providers that apply security controls to access cloud services

– Data Security/Encryption

– Visibility

– Threat Protection

– Compliance

Image Source: Cloud Access Security Broker (CASB): A pattern for secure access to cloud services EDUARDO B. FERNANDEZ et al

Page 7: ATP Technology Pillars

CASB

• Ciphercloud

• Skyhigh

• Palerra

• Bitglass

• Adallom

Page 8: ATP Technology Pillars

Application Control

• Bit9

• Avecto

• Viewfinity

Page 9: ATP Technology Pillars

RASP and IAST

Page 10: ATP Technology Pillars

RASP and IAST

• IAST – Combine SAST and DAST

• RASP – Self Defending Applications

– Vendors • Arxan

• Prevoty

• Waratek

Page 11: ATP Technology Pillars

Specialized Security Analytics

Page 12: ATP Technology Pillars

Beyond SIEM

• SIEM failed to deliver as per expectation

• Domain specific Analytics

– User Behavior Analytics

– Network Behavior Analytics

– Network Sandboxing

– RASP

– CASB

Page 13: ATP Technology Pillars

Attack Deception

Page 14: ATP Technology Pillars

Turning the table

• New type of technologies which deceives the attacker

– Isolate attacker

– Deceive and Observe

• Vendors

– Illusive

– Topspin

– TrapX

Page 15: ATP Technology Pillars

Security Awareness Doesn’t Deliver Beyond a Point. Invest in Habits.

Page 16: ATP Technology Pillars

Insider Threats

Page 17: ATP Technology Pillars

Response

Page 18: ATP Technology Pillars

Micro Segmentation and End Point Isolation

Page 19: ATP Technology Pillars

You will get hacked…but that’s ok

• Isolate Browser and Applications

• Trusted Container in un-trusted system

• Un-trusted Container in trusted system

• Microsegmentation Vendors • Illumio

• Cloudpassage

• Vidder

• Catbird

• Certes

Page 20: ATP Technology Pillars

• Endpoint Isolation

– Bromium

– Invincea

– Avecto

– Armor5

– Menlo Security

– Spikes security

Page 21: ATP Technology Pillars

EDR – Endpoint Detection and Response

Page 22: ATP Technology Pillars

EDR

• Cybereason

• Triumphant

• Countertack

• Mandiant

Page 23: ATP Technology Pillars

Incident Response Platforms

• CSG

• DFLabs

• Resilient

• Hexadite

Page 24: ATP Technology Pillars

Prediction

Page 25: ATP Technology Pillars

Threat Intelligence

Page 26: ATP Technology Pillars

Threat Intelligence

Page 27: ATP Technology Pillars

Intel 101

• Data vs Intelligence – Context, Intent, Capability

• Tactical vs Strategic – How and what?

– Who and why?

• Atomic vs Composite – IP, packet string, hash

– Combine multiple things

• TTP- Tactics, Techniques and Procedures

Page 28: ATP Technology Pillars

Taxonomy for Threat Intelligence

Threat intelligence

Threat Intelligence

Platform

Threat Intelligence Enrichment

Threat Intelligence Integration

Open Source Intel Human Intel

Technical Intel

Adversary Intel

Vulnerability Intel

Strategic Intel

Page 29: ATP Technology Pillars

Vendor Landscape

• Total Vendors studied: 23

• Prominent Vendors

– Open Source Intel: Recorded Future, Digital Shadows, Cyveillance

– Human Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners, Verisign iDefence, Cyveillance

– Technical Intel: Norse Corporation , Anubis Networks, Emerging Threats

– Adversary Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners, Verisign iDefence, Symantec Deepsight

– Vulnerability Intel: iSIGHT Partners, Verisign iDefence

– Strategic Intel: , Surfwatch labs, Cytegic

Page 30: ATP Technology Pillars

Tying Things Together

Page 31: ATP Technology Pillars

Threat Vector

Protective Controls

Detective Controls

Responsive Controls

Predictive Controls

Page 32: ATP Technology Pillars

Thank You