virtual security - Security Leaders
Transcription
virtual security - Security Leaders
CYBERSECURITY STRATEGIES What any company or enterprise must have in mind regarding cybersecurity. SOME NUMBERS SECURITY INCIDENTS GROWTH 42.8 45 40 35 28.9 Million 30 22.7 25 24.9 20 15 9.4 10 3.4 5 0 Security Incidents Million incidents per year 2009 2 2010 2011 2012 2013 2014 117,339 incoming attacks per day everyday MAKE SURE YOU ARE NOT AN EASY TARGET 4 /5 75% 30% cyber attacks rely on bugs in outdated software 3 of attacks are opportunity based of computers are already infected WE ANALYZE & PROCESS EVERY DAY 450 000 MALWARE SAMPLES 4 35 000 ANDROID MALWARE SAMPLES 6 BILLION ONLINE REPUTATION QUERIES IF YOUR BUSINESS IS AT STAKE, WE TAKE RISK OUT OF THE EQUATION. 5 64% more reported security incidents in 2014* 700 000 € 1 100 000 € Potential fine for being non-compliant with Singapore Personal Data Protection Act average financial loss for mid sized businesses due to security incidents in 2014* * PWC Global State of Information Security ® Survey 2015 – calculation for companies with 100 million $ - 1 billion $ yearly revenue Based on “reported” incidents. Dark figures to be expected much higher. CYBER SECURITY IS A PROCESS Understand your risk, know your attack surface, PREDICT PREVENT uncover weak spots React to breaches, mitigate the damage, analyze and learn 6 Minimize attack surface, prevent incidents Recognize incidents and RESPOND DETECT threats, isolate and contain them OUR CYBER SECURITY OFFERING VULNERABILITY & PATCH MANAGEMENT Riddler Threat level assessment Attack surface mapping Radar Vulnerability scanning Vulnerability management Software Updater Automatic patch management SERVICES ENDPOINT & NETWORK SECURITY SUITES ATTACK SURFACE ASSESSMENT Professional services Consulting & coaching For all areas of the security strategy ADVANCED THREAT PROTECTION Incident detection & response service platform Security monitoring & alerting Incident response 7 PREDICT RESPOND PREVENT DETECT Protection Service for Business Device & server security Mobile security Central management As a service Business Suite Device & server security Virtual Security Central management On-site SECURITY WALLPAPER #1 Get rid of #2 Back-up and #3 Protect the #4 Assume that #13 Educate, train, Windows XP ASAP Synchronize mobile devices as mobile devices will get feedback well get lost #5 Consider a VPN #6 Up-to-date, #7Patch Now and #8 Ensure your for you mobile state-of-the art Sec patch correctly Virtual Environment workers Solution #9 Control web #10 Secure critical #11 Block applets #12 Protect your acccess and content transactions with an from unknow e-mail extra layer sources 8 is safe #1 – GET RID OF WINDOWS XP #1 Get rid of Support for Windows XP is already finished. Basically any hacker knows that patches won’t be released for this O.S. Operating systems launched after Windows XP were designed with security as a priority, so are a far better option Windows XP ASAP *Source: https://business.f-secure.com/one-year-of-windows-xp-eol/ 9 #2 – BACK UP AND SYNCHRONIZE Ransomware malware is getting more and more common; and once you get infected there’s no sure way to break the encryption. So, have a safe, offline backup to ensure you can restore your operation. #2 Back-up and Synchronize *Source: https://business.f-secure.com/3-key-learnings-ransomware-hits-a-concretemanufacturer/ 10 #3, #4 and #5: MOBILE DEVICES F-Secure did two actions last year to raise awareness about BYOD safety. By placing a ‘free Wi-Fi’ hotspot on a London financial center we could make 250 people log at it; we collected 30MB of data in less than 30 minutes, including POP3 e-mails, complete with sender e-mail addresses and even passwords. Without encryption there is no security *Source: https://www.theguardian.com/technology/2014/sep/29/londoners-wi-fi-security-herod-clause/ 11 #3 Protect the #4 Assume mobile devicesthat as mobile devices will #5 Consider a VPN well get lost for you mobile workers The second one was with UK Parliament. We repeat the experiment to test how politicians would protect their privacy. The results when they logged to our ‘free wi-fi’? It was possible to hijack a social media account for the first one As the second one was making a VoIP call we could record his conversation. Easily. The third one we just got his e-mail and password. Than it was possible to log as him in other web services as well. *Source: https://business.f-secure.com/the-great-politician-hack/ 12 MORE DATA Only 36 percent of the researched companies have a mobile device management solution Only 37 percent provided mobile security for phones and tablets Only 50 percent used VPNs Only 1 in 4 can remote wipe a lost or robbed device. And this got a lot worse for SMBs 13 *Source:https://business.f-secure.com/do-businesses-have-a-recipe-for-byod-security/ SO, WHAT TO KEEP IN MIND ON BYOD AND ONTHE-GO WORKING? 14 FREEDOME FOR BUSINESS EXTENDING THE PSB SECURITY PLATFORM TO MOBILE FLEETS FOR ANDROID AND IOS DEVICES FREEDOME VPN AND WIFI PROTECTION APP AND WEB PROTECTION MOBILE FLEET MANAGEMENT CONNECTION PROTECTION APPLICATION PROTECTION BROWSING PROTECTION MANAGED ANTI-THEFT SECURITY MONITORING PASSWORD ENFORCEMENT FLEET & DEVICE INFO TRACKING PROTECTION VIRTUAL LOCATION #6 – CHOOSE THE CORRECT SECURITY SOLUTION You need to guarantee a reliable, up-todate security solution that handles known malware and zero-day threats as well. The difference between a pure ‘antivirus’ and a security solution is the difference between 99 and 99,9% filtering: that’s 43K #6 Up-to-date, malware! state-of-the art Sec Solution *Source: https://business.f-secure.com/3-key-learnings-ransomware-hits-a-concretemanufacturer/ 17 “AV IS DEAD?” – SO CHOOSE A SECURITY SOLUTION, NOT AN AV Choose a solution that has: 18 1. URL/Web access filtering 2. HTTP, et cetera protocol scanning 3. Exploit detection. 4. Network ("cloud") reputation queries 5. Sandboxing and file based heuristics 6. Traditional file scanning (“The dead AV” – still useful!) 7. Memory scanning 8. Runtime heuristics and memory scanning #7 SOFTWARE UPDATER FIREWALL IDS/IPS PORT APPLICATION BROWSING PROTECTION CONNECTION CONTROL #10 WEB CONTENT CONTROL #9 WEB TRAFFIC SCANNING MALWARE SCANNING SIGNATURE DEFINITIONS ADVANCED PROTECTION OBJECT REPUTATION CHECKS (ORSP) Proactive Protection - DEEPGUARD 19 #10 Key in reaching 100% detection rate over 24 subsequent months Unmatched protection against advanced 0-Day threats DEEPGUARD . Sophisticated technology, with heuristic, behavior and reputation analysis Global protection against emerging threats in 60 secs from initial detection Immediate coverage drastically reduces the window of exposure to new malware REAL-TIME PROTECTION Greatly reduces the lifetime & efficiency of otherwise dangerous malware Take something into account: Do you have a dedicated IT person to handle the security policies? If you do, consider an on premise solution. If not, it is better to choose a cloud-based solution with a Security-as-a-Service model. *Source: https://business.f-secure.com/3-key-learnings-ransomware-hits-a-concretemanufacturer/ 22 OPTION 1 – CLOUD-BASED PROTECTION SERVICEFOR BUSINESS Secure your Business. Wherever it takes you. WINDOWS | MAC | ANDROID | IOS | SERVERS OPTION 2 BUSINESS SUITE PREMIUM ONSITE SOLUTION WITH FULL CONTROL WORKSTATIONS Client Security Premium VIRTUAL SECURITY Scanning and Reputation Server WINDOWS SERVERS Server Security Premium POLICY MANAGER CITRIX AND TERMINAL SERVERS Server Security Premium SHAREPOINT Email and Server Security Premium EXCHANGE Email and Server Security Premium LINUX Linux Security 25 WEB TRAFFIC Internet Gatekeeper EMC STORAGE Email and Server Security Premium #7 OUT-OF-DATE SOFTWARE IS A SIGNIFICANT SECURITY RISK 83% 83% of TOP10 malware could have been avoided with up-to-date software 26 AND YET #7 Patch Now and patch correctly 87% 87% of corporate computers miss critical updates IS WINDOWS BASED PATCH MANAGEMENT ENOUGH? Are in operating system 12% 3% Miscellaneous 85% Are in 3rd party software 27 Source; https://business.f-secure.com/what-is-patchmanagement/ #8 ENSURE YOUR VIRTUAL ENVIRONMENT (REALLY) IS SAFE #8 Ensure your Virtual Environment is safe28 A UK study shows that 85% of enterprises risk the protection level in virtual environments by trusting the same AV solutions as they do in their physical environments. A Gartner study shows that 60% of virtual environments are more open to security risks A virtual security solution can, however, be as secure as the traditional solutions when the security agent is a part of the solution. When optimized in the right way, the performance level does not suffer but your environment will still retain the best possible protection level *Source: https://business.f-secure.com/securing-your-business-is-not-just-aboutendpoints/ SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS Policy Manager F-Secure Applications Server Security S.O. Virtual Machine Virtual Machine Virtual Machine Virtual Machine Aplicações Aplicações Aplicações Aplicações Client Security Client Security Premium Server Security Server Security Email and Server Security S.O. S.O. S.O. S.O. Virtualization Platform SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS (OPTIMIZED) Policy Manager Appliance Virtual Aplicações Server Security Scanning and Reputation Server S.O. S.O. cache Virtual Machine Aplicações Virtual Machine Aplicações Virtual Machine Aplicações Virtual Machine Aplicações Client Security Offload Scanning Agent Client Security Premium Offload Scanning Agent Server Security Server Security Offload Scanning Agent Email and Server Security Offload Scanning Agent S.O. S.O. S.O. S.O. Virtualization Platform F-Secure #9 CONTROL WEB ACCESS AND CONTENT #9 Control web acccess and content You should guarantee that employees cannot access the harmful sites in the first place as 90% of normal attacks come through the web. Source: https://business.f-secure.com/improved-security-is-a-business-opportunity/ 31 IMPROVED PRODUCTIVITY THROUGH CONTROLLED ACCESS A 20% INCREASE COMPARED TO LAST YEAR 69% 2013 of all respondents said they waste at least some time at work on a daily basis. 32 89% The number of people in this year’s survey who reported wasting time at work every day is up to a whopping 89% Source: http://www.salary.com/2014-wasting-time-at-work/ 4% OF PEOPLE SURVEYED WASTE AT LEAST HALF THE AVERAGE WORKDAY ON NON WORK-RELATED TASKS. WHERE’S THE WASTE? 89% 31% waste roughly 30 minutes daily 31% waste roughly 1 hour daily 16% waste roughly 2 hours daily 24% GOOGLE 33 Source: http://www.salary.com/2014-wasting-time-at-work/ 15% 6% waste roughly 3 hours daily 2% waste roughly 4 hours daily 2% waste 5 or more hours FACEBOOK 14% LINKEDIN #10 SECURE CRITICAL TRANSACTIONS WITH AN EXTRA PROTECTION LAYER Secure connections matters as there is financial loss when online banking credentials and money from the bank account is stolen. Also and maybe even wors, business secrets can be stolen if cloud-based CRM credentials are stolen #10 Secure critical transactions with an extra layer 34 CONNECTION CONTROL – STOP THE ATTACKS BEFORE THEY ENTER Banks have secured the connection from browser to the bank and the online banking servers The weakest links: The online bank users and their browsers Phishing 35 Trojans #11 Block applets from unknown sources #11 – BLOCK APPLETS FROM UNKNOWN SOURCES Exploit kits are sets of tools that criminals use to create crimeware campaigns, and largely attempt to infect computers with malware that exploits vulnerabilities in software. Exploit kits have historically been proficient at exploiting vulnerabilities in Java and older versions of Microsoft Windows, but exploits targeting Flash have become more prominent in 2015. Source: https://www.f-secure.com/documents/996508/1030743/Threat_Report_H2_2014 https://www.f-secure.com/weblog/archives/00002785.html 36 STOP MOST OF THE WEB ATTACKS Block 100% of Java applets and Windows malware that come from unknown sources you do not trust. Technologies targeted by exploit kits in 2014-2015 33% 28% 10% FLASH JAVA WINDOWS Source: hxxp:// contagiodata.blogspot.fi/2014/12/exploit-kits-2014.html 37 © F-Secure Confidential 5% SILVERLIGHT #12 – PROTECT YOUR E-MAIL –WHATEVER IT IS #12 Protect your email – whatever it is! 38 The most common ways for malware to manifest are still trough browsing and e-mail. More and more we see macro-based and spear-phishing e-mail attacks, so it is a general good idea to simply avoid receiving such e-mails. Protection begins first and foremost with strong email security, as most of the attachments, files and links are delivered through email. All standard best practices apply, but pay more attention to capabilities such as attachment stripping and scanning, in addition to link reputation checks and security. It doesn’t matter if you have your e-mail in house or on-thecloud: Either protect your mail server or choose a gateway to avoid spam and phishing messages. Source: https://business.f-secure.com/3-key-learnings-from-a-cyberattack/ https://business.f-secure.com/macro-based-malware-is-back-in-business-6-tipis-how-to-keep-them-out/ CHOOSE YOUR OWN WAY TO GET EMAIL PROTECTION EMAIL ENCRYPTION 39 SPAM DETECTION VIRUS PROTECTION PROTECTION SERVICE FOR EMAIL MESSAGING SECURITY GATEWAY Cloud service, hosted by F-Secure On site, self managed, appliance or VMware #13 – EDUCATE, TRAIN, GET FEEDBACK Malware can easily breach all your barriers if the employees do not adhere to basic security practices, or do not know what to do. For example, developers posting questions online about a technical problem they have give valuable information about the company and the systems used. Training also needs to be continuous, as the ways to lure employees to risky behavior keep on developing, and employees might not stick to the #13 Educate, train, guidance. *Source: http://www.scmagazine.com/blue-coat-system-conducts-securitysurvey/article/415611/ 40 get feedback