Top Banner
April 1st 2015 Cyber Security Intelligence & Threat Mitigation Yaron Bielous Head of Cloud
14

Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Apr 17, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

April 1st 2015

Cyber Security Intelligence & Threat Mitigation

Yaron BielousHead of Cloud

Page 2: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

2

About Allot Communications

Page 3: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

WAN

Enterprises migrated to Hybrid Cloud

3

Internet

Hybrid Cloud Users

Private Cloud On Campus

Public Cloud

In the Branch

At Home

On the Road

The Internet is the new IT

Ensuring Availability, Performance &

Security across Clouds

24/7

BYOD

ALWAYS CONNECTED

Page 4: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Allot’s Solution Domains

4

Cloud Access Security

Threat DetectionDDoS ProtectionWeb Security

Cloud Access Optimization

Application AwarenessQoS

Policy ManagementTraffic Steering

Network Traffic AnalyticsDPI Technology Policy Control

Engines

Allot Service Gateway Allot NetEnforcer Allot NFVPlatforms

Page 5: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Granular Web Analytics under encryption

12

Drill-down to Hosts and Apps is possible even when traffic is SSL encrypted

Page 6: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

The Anonymity Risks

6

• May indicate illegal activity

• DDoS attacks behind anonymizes

• Hacking activity behind anonymizes

• Malicious activity detection under the anonymize shield is a significant challenge

Allot Value Proposition:Delivers granular visibility into

a wide range of anonymity tools

Page 7: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Targeting Illegal DestinationsHow FBI brought down cyber-underworld site Silk Road

8

Page 8: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Richest Intelligence Directly from the Wire

8

Broadband

Experience Analytics User Control Regulatory Compliance

Security IntelligenceControl & Care

Mobile

SIEM

Operations Intelligence

Private Cloud

Public Cloud

Internet

Applications

Users

At Home

On the Road

In the Branch

On Campus

USER LOCATION ENDPOINT NETWORK CONTENT APPLICATION

Page 9: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Proactive Web IntelligenceIndepth Analysis

17

Page 10: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Individual User’s Activity

Which application are used? When? For how long? On which device?

Page 11: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Actionable Security – DDoS Protection

11

DDoS/DoS/Scan attacks per Day

Anti-DDoS as a Service

Automatic/on-demand Mitigation action

Audit User Activity

Page 12: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

Actionable Security – Web & Mail Protection

HTTP \ WAP

2nd Filter

Full URL Categorization

1st Filter

URL Blacklist

12

URL Filtering – Black List, White List

Categorized Content Filtering

Anti Virus/Malware

Multi-tenancy

User

Access to this

website is forbidden!

www.illegalcontent.com

3rd Filter

Virus/MalwareProtection

Page 13: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

13

Allot Cyber Solutions for a Safer Internet

• Zero day DDoSMitigation

• 1st line of defense

• Leading anonymity and encryption awareness

• Highly Granular Transaction information at Scale

• Content filtering to illegal web services, and anti-malware protection

Network ProtectionCyber Intelligence Web Security

Page 14: Cyber Security Intelligence & Threat Mitigation · Allot’s Solution Domains 4 Cloud Access Security Threat Detection DDoSProtection Web Security Cloud Access Optimization Application

THANK

Find out how Allot can help YOUR business to become a leading Digital Lifestyle Provider

Email [email protected]

U

• www.allot.com 14