the changing security landscape

18
Presentation Identifier Goes Here 1 The Changing Security landscape Anthony Leigh Technical Account Manager, Security

Upload: arrow-ecs-uk

Post on 18-Nov-2014

471 views

Category:

Technology


5 download

DESCRIPTION

Presented at the Arrow ECS Accelerate your Virtualisation Business with Symantec and VMware event, 18th January 2012 at Williams F1 Conference Centre

TRANSCRIPT

Page 1: The Changing Security Landscape

Presentation Identifier Goes Here 1

The Changing Security landscape

Anthony LeighTechnical Account Manager, Security

Page 2: The Changing Security Landscape

Evolution of Strategy RequirementsNow Structured and Unstructured

2

Page 3: The Changing Security Landscape

Jan, 2007 - 250,000 viruses

2011 – over 300 million

3Symantec Endpoint Protection 12.1

Page 4: The Changing Security Landscape

4

MoreSophisticated

AttacksComplex

HeterogeneousInfrastructure

Explosion ofInformation

IncreasedCost of

Incidents

Key IT Security Trends

Page 5: The Changing Security Landscape

5

The Current Approach Is Not Working

Stopping LessSpending More

Page 6: The Changing Security Landscape

IT Must Evolve to Meet New Demands

• Driver: Business automation, e.g., ERP, functional apps

• Data: Centralized, structured

• Infrastructure: Physical

• IT focus: Systems tasks

• Driver: Next level of productivity and agility with collaboration and knowledge sharing

• Data: Distributed, unstructured

• Infrastructure: Virtual, cloud, outsourced

Information-CentricInformation-Centric

System-CentricSystem-Centric

6

Page 7: The Changing Security Landscape

7

The Evolution of IT & Security...

Page 8: The Changing Security Landscape

Threat Landscape2011 Trends

8

Social Networking + social engineering = compromise

Attack Kits get a caffeine boost

Targeted Attacks continued to evolve

Hide and Seek (zero-day vulnerabilities and rootkits, cryptors)

Beyond the PCattackers branch out

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive

Page 9: The Changing Security Landscape

Threat Landscape1. Targeted Attacks continue to evolve

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive

• High profile attacks in 2010 raised awareness of impact of APTs

• Stuxnet was incredibly sophisticated– Two (2) Stolen digital signatures

– Two (2) different root kits

– Four (4) zero-day vulnerabilities

– Seven (7) different propagation mechanisms

– Fifteen (15) modules, ten thousand (10,000) lines of code

Detailed review in the:W32.Stuxnet Dossier& W32.Stuxnet

More Info:

9

Page 10: The Changing Security Landscape

Presentation Identifier Goes Here 10

Page 11: The Changing Security Landscape

Threat Landscape 2. Social Networking + Social Engineering = Compromise

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive 11

… has given way to Social Networking – Use profile information to create targeted social engineering

– Impersonate friends to launch attacks

– Leverage news feeds to spread spam, scams and massive attacks

Dumpster diving…

Page 12: The Changing Security Landscape

Problem: Social EngineeringRecent example: W32:Yimfoca.B

Presentation Identifier Goes Here 12

Page 13: The Changing Security Landscape

Presentation Identifier Goes Here 13

Page 14: The Changing Security Landscape

Threat Landscape3. Hide and Seek

Trivial to use14IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive

Page 15: The Changing Security Landscape

Threat Landscape4. Attack Kits Get a Caffeine Boost

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive 15

• Java exploits added to many existing kits• Kits exclusively exploiting Java vulnerabilities appeared

More Info:

Detailed information available in ISTR Mid-Term: Attack Toolkits and Malicious Websites

Page 16: The Changing Security Landscape

Threat Landscape 5. Beyond the PC

• Mobile activity on the rise– Complex OS environments– Increasing numbers of trojanized Android apps– Mobiles will be targeted more when used for financial

transactions

• Java based threats– Jnanabot is a truly cross-platform bot that

infects Windows, Linux, and MacOS

• Mac OS Threats– Starting to see Fake AV

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive 16

42%

Page 17: The Changing Security Landscape

Symantec Endpoint Protection 12

17

• Up to 70% reduction in scan overhead

• Smarter Updates• Faster Management

• Powered by Insight • Real Time Behavior

Monitoring with SONAR

• Tested and optimized for virtual environments• Higher VM densities

Unrivaled Security

Built for Virtual Environments

Blazing Performance

Page 18: The Changing Security Landscape

Intelligence sourcesLots of information…

IS B09 – SEP 12.1 – Protection Technologies – A Deep Dive 18

Internet Security Threat Report (ISTR)- AnnualInterim ISTR Deep Dive Reports (1 – 2 per year)- Rogueware applications- Web Attack Toolkits & Malicious WebsitesQuarterly Intelligence Updates- Speeds and Feeds update

Security Response Blog- Dozens of articles each month written by analystshttp://www.symantec.com/connect/symantec-blogs/sr

Business Security Response Website

- >25% of all symantec.com traffic is to a ‘Response’ page

http://www.symantec.com/