Machine Speed Defense
Aug 17, 2015
Machine Speed Defense
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 2
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 3
“Godzilla”
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 4 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 4
Why machinespeed defense?
Copyright source: http://writing-the-wrongs.blogspot.com/2011_03_01_archive.html
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 5 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 5
Cost per compromise;
up 28%
Wasted hours chasingdown false alerts
$11.3 M 395/wkAverage time
to detect a threat
240 Days
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 6 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 6
Deborah PlunkettHead of US NSA’s Information Assurance Directorate“We have to build our systems on the assumption
that adversaries will get in.”
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 7 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 7
Jon OltsikESG Principal Analyst
“To truly gain an advantage against attackers,security and IT teams need to adopt a proactive approach
to incident response with policy-based automation.”
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 8 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 8
How do wemake automation real?
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 9 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 9
Detect Verify Remove
Continuous Automated Threat Removal
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 10 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 10
HawkEye G Manager
HexisThreat Feed
HawkEye GNetwork Sensor
Detect
Detection InformationMultiple Sources
Third-Party Integrations
FireEye® NX
PAN NGFW + WildFire®
19
HawkEye GHost Sensor
174
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 11 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 11
Verify
Introducing ThreatSync™
HexisThreat Feed Third-Party Integrations
HawkEye GNetwork Sensor
Threat FusionThreat AnalyticsIndicator Scoring
Device Incident ScoreThreatSync
FireEye® NX
PAN NGFW + WildFire®
HawkEye GHost Sensor
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 12 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 12
HexisThreat Feed Third-Party Integrations
HawkEye GNetwork Sensor
Remove
Policy ManagerCountermeasures
Kill
Quarantine
Block
Expire
Forensics
Future
ThreatSync
FireEye® NX
PAN NGFW + WildFire®
HawkEye GHost Sensor
SurgicalAutomatic
Machine Guided
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 13 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 13
HexisThreat Feed Third-Party Integrations
HawkEye GNetwork Sensor
Remove
Policy ManagerCountermeasures
Kill
Quarantine
Block
Expire
Forensics
Future
ThreatSync
+
FireEye® NX
PAN NGFW + WildFire®
HawkEye GHost Sensor
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 14 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 14
Network World: Rated 4.875
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 15
What is the key advantage of Continuously and Automatically Removing Threats at Machine Speed?
a. Dramatically reduces time to respond to
threatsb. Force multiplier for incident responders c. Reduces the chance of data lossd. Increases visibilitye. All of the above
???Trivia Question:
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 16
What is the key advantage of Continuously and Automatically Removing Threats at Machine Speed?
a. Dramatically reduces time to respond to
threatsb. Force multiplier for incident responders c. Reduces the chance of data lossd. Increases visibilitye. All of the above
???Trivia Question:
Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 17 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.
Page 17
Thank you.Please stop by the HawkEye G demo
station.