Top Banner
Targeted Attacks| Have you found yours? Andy Dancer CTO EMEA
17

Trend Micro - Targeted attacks: Have you found yours?

Jun 04, 2015

Download

Documents

Andy Dancer, CTO EMEA Trend Micro spoke at the CIO Event (dot) com
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Trend Micro - Targeted attacks: Have you found yours?

Targeted Attacks| Have you found yours?Andy DancerCTO EMEA

Page 2: Trend Micro - Targeted attacks: Have you found yours?

Advanced Persistent Threats

EmpoweredEmployees

Elastic Perimeter

Copyright 2012 Trend Micro Inc.

Trend Micro evaluations find over 90% of enterprise networks contain active

malicious malware!

Traditional Security is Insufficient

Page 3: Trend Micro - Targeted attacks: Have you found yours?

3Copyright 2012 Trend Micro Inc.

Page 4: Trend Micro - Targeted attacks: Have you found yours?

Custom Attacks

• Today’s most dangerous attacks are those targeted directly and specifically at an organization — its people, its systems, its vulnerabilities, its data.

04/12/2023 4Confidential | Copyright 2012 Trend Micro Inc.

0101001010010100110001100001011101010101

Page 5: Trend Micro - Targeted attacks: Have you found yours?

Deep Discovery & The Custom Defense

04/12/2023 5Confidential | Copyright 2012 Trend Micro Inc.

Deep Discovery

Network Threat Detection

DETECT

Advanced Threat

Protection

Page 6: Trend Micro - Targeted attacks: Have you found yours?

APT Activity

Specialized Threat DetectionAcross the Attack Sequence

Malicious Content• Emails containing embedded

document exploits• Drive-by Downloads• Zero-day and known malware

Suspect Communication• C&C communication for any

type of malware & bots• Backdoor activity by attacker

Attack Behavior• Malware activity: propagation,

downloading, spamming . . .• Attacker activity: scan, brute

force, tool downloads.• Data exfiltration communication

Page 7: Trend Micro - Targeted attacks: Have you found yours?

7Copyright 2012 Trend Micro Inc.

Switch of mental approach

• Terrorist Paradox– We have to win all the

time to defend– They only have to get it

right once to win

• Advanced Threats– Many steps have to

execute in turn to steal my data

– I only need to spot one step to thwart them

Page 8: Trend Micro - Targeted attacks: Have you found yours?

Deep Discovery & The Custom Defense

04/12/2023 8Confidential | Copyright 2012 Trend Micro Inc.

Deep Discovery

Attack Analysis & Intelligence

ANALYZE

Network Threat Detection

DETECT

Advanced Threat

Protection

Page 9: Trend Micro - Targeted attacks: Have you found yours?

9Copyright 2012 Trend Micro Inc.

Automated AnalysisBandwidth

Live Cloud Lookup

Advanced Heuristics

Sandbox Analysis

Output to SIEM

ThreatIntelligence

Focused Manual Investigation

Page 10: Trend Micro - Targeted attacks: Have you found yours?

Deep Discovery AdvisorThreat Intelligence Center

• In-Depth Contextual Analysis including simulation results, asset profiles and additional security events

• Integrated Threat Connect Intelligence included in analysis results

• Enhanced Threat Investigation and Visualization capabilities

• Highly Customizable Dashboard, Reports & Alerts• Centralized Visibility and Reporting across Deep

Discovery Inspector units

Threat ConnectIntelligence

Page 11: Trend Micro - Targeted attacks: Have you found yours?

Deep Discovery & The Custom Defense

04/12/2023 11Confidential | Copyright 2012 Trend Micro Inc.

Deep Discovery

Attack Analysis & Intelligence

ANALYZE

Containment& Remediation

RESPOND

Adaptive SecurityUpdates

ADAPT

Network Threat Detection

DETECT

Advanced Threat

Protection

Page 12: Trend Micro - Targeted attacks: Have you found yours?

The Custom Defense

04/12/2023 12Confidential | Copyright 2012 Trend Micro Inc.

D E T E C T A N A L Y Z E R E S P O N DA D A P T

Context-relevant views & intel guide rapid remediation response

Custom security blacklists & signatures block further attack

Deep analysis based on custom sandboxing and relevant global intel

Specialized Threat Detection at network and protection points

Page 13: Trend Micro - Targeted attacks: Have you found yours?

The Custom Defense In Action Advanced Email Protection

• Blocking of targeted spear phishing emails and document exploits via custom sandboxing

• Central analysis of detections

• Automated updates of malicious IP/Domains

• Search & Destroy function

InterScan Messaging Securityor ScanMail

Anti-spam

Web Reputation

Anti-phishing

Advanced Threat Detection

Anti-malware

“Suspicious”

quarantine

feedback

04/12/2023 13Confidential | Copyright 2012 Trend Micro Inc.

Deep Discovery Advisor

ThreatAnalyzer

Threat Intelligence

Center

Security Update Server

Page 14: Trend Micro - Targeted attacks: Have you found yours?

So what does that look like in context?

Outer Perimeter

Inn

er P

erim

eter

s

Valuable Server

Valuable Server

Endpoint

Endpoint

Valuable Server

Page 15: Trend Micro - Targeted attacks: Have you found yours?

Deep Discovery

Identify Attack Behaviour & Reduce False Positives

Detect Malicious Content and Communication

Analyze

Simulate

Real-Time

Inspection

Deep

Analysis

Correlate

Actionable

Intelligence

Visibility – Real-time DashboardsInsight – Risk-based Analysis

Action – Remediation Intelligence

Out of band network data

feed of all network traffic

Page 16: Trend Micro - Targeted attacks: Have you found yours?

DeepSecurityInner Perimeter for valuable assets

VM VM VM VMVMSecurity

VM

Hypervisor

Deep Packet Inspection

Firewall

Anti-Virus

Log Inspection

Integrity Monitoring

Also works

for VDI

Page 17: Trend Micro - Targeted attacks: Have you found yours?

Thanks for listening......any questions?

Confidential | Copyright 2012 Trend Micro Inc.