cyber tech israel 2016: advanced threat protection technical overview

21
Advanced Threat Protection Technical Overview

Upload: symantec

Post on 21-Jan-2018

728 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Advanced Threat ProtectionTechnical Overview

Page 2: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Even with the best prevention technologies, can you stop advanced persistent threats?

2

PREVENT

Stopping Incoming Attacks

While prevention is still very important….

…you need to prepare to be breached.

PREPARE

Understanding Where Important Data Is & Who Can Access It

DETECT

Finding Incursions

RESPOND

Containing & Remediating Problems

RECOVER

Restoring Operations

Copyright © 2014 Symantec Corporation

Page 3: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

If you are breached, how fast can you detect, respond and recover?

3

PREPARE

Understanding Where Important Data Is & Who Can Access It

PREVENT

Stopping Incoming Attacks

DETECT

Finding Incursions

RESPOND

Containing & Remediating Problems

RECOVER

Restoring Operations

Copyright © 2014 Symantec Corporation

Page 4: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Copyright © 2014 Symantec Corporation4

Identify suspicious filesATP Solution:

Page 5: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Symantec Advanced Threat Protection: Modules

• Endpoint visibility (the foothold in most targeted attacks)

• Endpoint context, suspicious events, & remediation

• Requires SEP – no new agent – and deployed as a virtual or physical appliance

• Network visibility into all devices & all protocols

• Automated sandboxing, web exploits, command & control

• Deployed off a TAP as virtual or physical appliance

• Email visibility (still the number one incursion vector)

• Email trends, targeted attack identification, sandboxing

• Cloud-based easy add on to Email Security.cloud

5Copyright © 2014 Symantec Corporation

Page 6: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Symantec Advanced Threat Protection: Cynic

6

ATP: ENDPOINT

ATP: NETWORK

ATP: EMAIL

Virtual sandbox

Cynic

Detection engines

Physical sandbox

Copyright © 2014 Symantec Corporation

Page 7: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Cynic - File Types• Windows binaries: EXE, DLL, SYS (drivers), OCX (ActiveX controls), SCR (Screen Savers)

• Office docs: Word, Excel, PowerPoint

• Java applets

• Compressed files (rar, zip, 7z)

• Adobe Acrobat

7

Page 8: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Skeptic: pseudo equation for heuristic analysis

Copyright © 2014 Symantec Corporation8

+ Questionable source

+ Suspect Attachment

+ Suspicious code in attachment

(+ Evidence of obfuscation)

(+ Unexpected encryption) ______

Heuristically detected malcode

* Not all suspicious elements required for conviction

Page 9: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

SONAR• Dynamic analysis

• Does not make detections on application type, but on how a process behaves.

• If it behaves maliciously, regardless of its type, it will trigger a detection

9Copyright © 2014 Symantec Corporation

Page 10: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Virtual Execution• VM execution with mimicked end user behavior

• Range of OS and apps

• VM execution range of OS and applications

• VM communication analysis

Virtual Machines

OS

APPS

OS

APPS

OS

APPS

OS

APPS

Apps

Virtual Machines

OS

APPS

OS

APPS

OS

APPS

OS

APPS

Virtual Machines

OS

APPS

OS

APPS

OS

APPS

OS

APPS

10Copyright © 2014 Symantec Corporation

Page 11: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Physical Execution

• Physical hardware

• Bare metal execution

– No Virtualization

11Copyright © 2014 Symantec Corporation

Page 12: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Copyright © 2014 Symantec Corporation12

Search for Indicators of Compromise

ATP Solution:

Page 13: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

13Copyright © 2014 Symantec Corporation

Searches

Page 14: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Types of Searches

• Inline (Datastore)

– Searches local data store for artifacts

– Seconds to return results

– Artifacts are generated from endpoint and network sensor events

• Endpoint Interrogation

– Searches endpoint for artifacts

– Results can be delayed based on factors

.

14Copyright © 2014 Symantec Corporation

Page 15: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Symantec Advanced Threat Protection: Synapse

15

ATP: ENDPOINT

ATP: NETWORK

ATP: EMAIL

Correlation and Prioritization

RemediationReporting and Investigation

Synapse

Copyright © 2014 Symantec Corporation

Page 16: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Copyright © 2014 Symantec Corporation16

Block, isolate and remove the advanced persistent threats

ATP Solution:

Page 17: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

ATP: Network & Endpoint

SEPM

Sweep, Hunt, Collect, Fix

Sweep, Hunt, Collect, Fix

17Copyright © 2014 Symantec Corporation

ATP Appliance

Cynic

Page 18: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

ATP: Network & Endpoint

SEPM

Sweep, Hunt, Collect, Fix

Sweep, Hunt, Collect, Fix

18Copyright © 2014 Symantec Corporation

ATP Appliance

Cynic

QUARANTINE

Page 19: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

ATP: Network & Endpoint

SEPM

Sweep, Hunt, Collect, Fix

Sweep, Hunt, Collect, Fix

19Copyright © 2014 Symantec Corporation

ATP Appliance

Cynic

QUARANTINE

Blacklist

Page 20: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

Symantec Advanced Threat Protection

20

ATP: ENDPOINT

ATP: NETWORK

ATP: EMAIL

Correlation and Prioritization

Virtual sandbox

Remediation

Cynic

Reporting and Investigation

Detection engines

Physical sandbox

Synapse

Copyright © 2014 Symantec Corporation

Page 21: Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview

21