- Vectra Networks
Transcription
- Vectra Networks
SOLUTION BRIEF Adaptive Distributed Architecture Vectra Networks provides automated detection of cyber attacks in real time. Vectra detects any active phases of an attack including command and control, internal reconnaissance, lateral movement, exfiltration phases of a cyber attack. Executive Overview Today’s cyber security threat landscape is highly dynamic with attackers constantly morphing malware and attack vectors to evade detection, and persistently attack your information assets. There are many infections that will occur outside the perimeter – mobile users, connected partners. Recent breaches have all followed the same blueprint of attackers gaining privileged access, extending the compromise across the network and stealing or destroying data. These cyber attacks are evading the perimeter security systems designed to stop an attacker from entering. The breach at Target Corp began with keylogger malware installed on a computer at their business partner Fazio Mechanical. By infecting computers at Fazio Mechanical, the attackers used stolen credentials to gain access to the Target network, spread laterally, locate key assets, accumulate data and exfiltrate it. Automating Detection of Attacks in Progress To detect cyber attacks that have already bypassed the network perimeter, security professionals need an automated real-time breach detection and reporting solution. This solution monitors network traffic in real time and provides high fidelity detection of an attack in progress. Vectra Networks provides automated detection of cyber attacks in real time. Vectra detects any active phases of an attack including command and control, internal reconnaissance, lateral movement, exfiltration phases of a cyber attack. Using data science and machine learning to detect all attack phases, the Vectra platform has several opportunities to detect an active cyber attack with high fidelity, reducing the rates of false negatives and false positives. The Vectra X-series platform passively monitors network traffic and performs all of the functions below to provide real-time breach detection and reporting. Report Correlate Detect Distill Capture External reporting through syslog, email alerts and API are also provided. Detections are correlated to the hosts under attack using Vectra’s Threat Certainty Index, detections are matched against a host and a numeric value assigned to the host reflecting its security risk. Data science and machine learning algorithms are applied on the distilled data to detect active phases of an active cyber attack within the traffic. Packets are assembled into flows and metadata is extracted from packets for processing by the detection. Capturing network packets in passive mode in the initial stage of real-time breach detection. Figure 1. Vectra Network Architecture Increasing Efficacy Efficacy increases when this solution has visibility into traffic across the entire attack surface such as remote sites and internal network segments where key assets are located. Remote sites are often weak links in the attack surface. Remote sites typically have fewer perimeter defenses and lack security professionals who can take quick action during an attack. Minimizing capital expense, and operational cost and complexity of cybersecurity at remote sites are often key criteria. In the case of remote sites in retail, banking and healthcare segment, the size, noise level, heat dissipation and ease of use are other important decision factors. Internal segments containing key assets have often been presumed to be safe because they lie deep within layers of perimeter security, yet the perpetrators of the Carbanak APT were able to use remote access tools on financial networks to steal over $1 Billion for over 100 banks. Holistic cybersecurity – fully distributed The automated detection of attacks in progress by the Vectra X-series platform can now be extended to remote sites and internal segments while maintaining a singlepane view of an organizations risk profile. X-series Platform The X-series platform software can be ordered preloaded on a full-depth rack-mountable appliance designed to scale with even the largest networks. The X-series platform can be deployed either as an all-in-one device to both monitor traffic and perform real-time threat detection or in combination with S-series sensors that monitor traffic and process metadata from the sensors. The X-series platform performs all detection, analysis and correlation of threats on metadata from sensors. S-series Sensors The S-series sensors are small, dedicated sensors that can be easily deployed in remote sites or with access switches. Sensors can be deployed in-line or as passive device to monitor network traffic, extract critical metadata from it and forward the metadata on to an X-series platform for threat analysis. The small size and simple deployment model of the S-series ensures enterprises have comprehensive coverage throughout the network, especially to remote sites including small offices, bank branches, healthcare clinics and retail locations. Deploying the Distributed Architecture The Vectra Networks scalable distributed architecture ensures customers have consistent cybersecurity protection across their entire organizational regardless of size or geographical distribution. S-series sensors and X-series platforms provide the ability to scale to any size of network across geographically dispersed sites and deliver the centralized analysis, detection and correlation of threats. The infographic on the next page shows the deployment topologies of distributed architecture. » Monitoring traffic on these internal segments is important in a data-centric security strategy, the capital expense and operational complexity of solutions are often limitations. ©2015 Vectra Networks, Inc. | 2 Campus Sensor Deployment Remote Site Sensor Deployment • Sensors deployed at the access layer switch provides visibility into user-to-user traffic • Sensors deployed at the remote-site provides visibility into traffic at remote sites • X-series deployed at the core/distribution layer provides visibility into traffic to and from users to internet, and correlates detections from sensors • X-series deployed at the data center provides visibility into traffic in the data center, and correlates detections from sensors Benefits of Distributed Architecture Vectra Networks distributed architecture provides the following benefits: • Plug-and-play deployment » Sensors are provisioned with customer information before shipment by Vectra Networks. » Sensors obtains its network configuration from DHCP server in the network. This helps with deployments in remote sites with very little technical expertise » Sensors can be deployed in passive mode, or in-line mode as bump-in-the-wire with fail-open • Low bandwidth utilization » Sensor distills metadata of the local traffic and sends it to the X-series for threat analysis and reporting » The metadata from the sensor to X-series is compressed to less than 1% of the received bandwidth to reduce overhead on low bandwidth network links • Extends full fidelity traffic visibility » Remote sites are weak links in the attack surface. Sensors can be easily deployed at remote locations to strengthen network security at remote sites » Sensors deployed on internal segments with key assets to detect lateral spread and data accumulation • Automatic centralized reporting » Vectra X-series provides a unified view of an organization’s risk profile by aggregating and correlating all detections » Vectra X-series enables security operations team to filter threat detections based on sensor monitoring the suspect traffic » X-series provides automatic real-time reporting, empowering organizations with the relevant data to rapidly respond to attacks saving time and manpower • Automatic software updates » Vectra cloud provides updates to the X-series » Updates are downloaded automatically to the sensor from the X-series. ©2015 Vectra Networks, Inc. | 2 The screenshot below shows detections viewed from the X-series deployed in distributed architecture. Figure 2. Detection view on X-series Summary Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet network traffic to automatically detect all phases of a breach. Vectra Networks provides a scalable distributed architecture to ensure customers can maintain full visibility of their networks regardless of their organizational size or physical distribution. S-series sensors and X-series platforms provide the ability to scale to any size of network across geographically dispersed sites while delivering the centralized analysis, detection and correlation of threats.