Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

25
© Copyright Fortinet Inc. All rights reserved. Peter Vanhemelryck presales engineer Het ecosysteem als complete bescherming tegen cybercriminaliteit

Transcript of Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

Page 1: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

© Copyright Fortinet Inc. All rights reserved.

Peter Vanhemelryckpresales engineer

Het ecosysteem als complete bescherming tegen cybercriminaliteit

Page 2: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

2

Focus op deze richtsnoeren

Known and Unknown

InboundOutboundInternalExternal

Page 3: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

3

WHAT IF I TOLD YOU

YOU’VE BEEN BREACHED(AND DIDN’T EVEN KNOW IT?)

Page 4: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

4

Source: DataBreaches.net

Adobe 152M customer

records breached

Target70M customers

at risk

Home Depot56M customers at

risk

eBay 145M customers at

risk

UPS

Snapchat

Dominos Pizza (France)

Twitter

Neiman Marcus

Korean Credit

Bureau

Mozilla

Vodafone

Gmail

LexisNexus

AOL2,400,000

Sony 47,740

employees exposed

European Central

Bank

Apple

Page 5: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

5

Customer Challenge – Security

Increasing Damage

AppControl

WebFilter

Anti-Spam

AntiMalwareVPN IPSFIREWALL Advanced

Threat Protection

Hackers

Layer 1-2 Content & Application (Layer 3-7)

IntrusionsWorms

VirusesSpyware

BotnetsSpam

MaliciousURLs

MaliciousApps

AdvancedPersistent

Threats

2005 2007 TodayTHREATTIMELINE

201120032000

Incr

easi

ng P

erfo

rman

ce R

equi

rem

ents

Today’s sophisticated threats are causing more damage than ever, and a growing set of security technologies is needed to stop them.

Most security vendors outsource or lack critical pieces of the puzzle Customers try to piece together a solution on their own

Page 6: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

6

Breaking the Kill Chain of Advanced Attacks

Antispam

Web Filtering

Antivirus

Intrusion Prevention

App ControlIP Reputation

Spam

MaliciousLink

Exploit

Malware

Bot Commands& Stolen Data

Spam

MaliciousLink

Exploit

Malware

Bot Commands& Stolen Data

MaliciousEmail

MaliciousWeb Site

C2 Server

Page 7: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

7

Fortinet Advanced Threat Protection Framework

Step 1 - Prevent• Block threats before they

enter your network

Step 2 - Detect• Discover threats that

have entered the network

Step 3 - Mitigate• Respond to any threats that have

breached the network

Page 8: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

8

The Technologies Behind It

Botnet DetectionIP & Client ReputationSandboxing

Network FirewallAnti-Virus

Two Factor AuthenticationIntrusion Prevention

Secure Email GatewayWeb Application Firewall

End Point Protection

PeopleProcessTechnology

Threat IntelligenceZero Day ResearchContinuous updates

Page 9: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

9

FortiGuard Lab

FortiGuard Services

Advanced Threat Protection in Action

FortiGate

FortiMail

FortiWeb

FortiClient

Page 10: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

10

FortiGuard Lab

FortiGuard Services

Advanced Threat Protection in Action

FortiGate

FortiMail

FortiWeb

FortiSandbox

FortiClient

Page 11: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

11

Integration, Integration, Integration

File Submission

File Submission

Detailed Status Report

FSA Dynamic Threat DB Update

Control Host Quarantine

FortiSandbox

FortiClientFortiGate

1

2

3b

1

Real-time engine and intelligence updates

Enforce Network Quarantine

3c

File Status result for auto File Hold &

Quarantine

2

FSA Dynamic Threat DB Update

1 File submission for Analysis

2 Respective analysis results are returned

4 4

3a

3a

Remediation Auto File Quarantine on Host with option to hold file until result

Query

3b Manual Host Quarantine by Admin

3c Manual Source IP Quarantine using Firewall

Protection

4 Proactive dynamic Threat DB update to gateway and host

Page 12: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

12

Founded in 2000, 1st shipment 2002, IPO 2009 HQ: Sunnyvale… 100+ offices worldwide

Employees: 3900+ 255,000+ customers

Over 2 million devices shipped

#1 unit share worldwide in network security (IDC)

Market-leading tech… 257 patents, 228 pending

Balanced business across segments

Balanced revenue and growth around the globe

APAC21%

Americas44%

EMEA35%

FortinetRevenue

By RegionQ3 2015

Entry-Level Ap-pliances

36%

Mid-Range Appliances

26%

High-End Ap-pliances

38%

FortiGateRevenue

By SegmentQ3 2015

Custom ASIC-based scalable architectureFortiASIC

Custom, convergedNetworking + Security OSFortiOS

Industry-leading, validatedThreat ResearchFortiGuard

Global Infrastructure & Support FortiCare

A Global Leader and Innovator in Network SecurityFortinet Quick Facts

Page 13: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

13

Proven, Certified SecurityFortiGuard Labs Threat Intelligence Powers Fortinet Products

Per Minute21,000Spam emails intercepted

390,000Network Intrusion Attempts resisted

460,000Malware programs neutralized

160,000Malicious Website accesses blocked

50,000Botnet C&C attempts thwarted

43 millionWebsite categorization requests

Per Week46 millionNew & updated spam rules

120Intrusion prevention rules

1.8 millionNew & updated AV definitions

1.4 millionNew URL ratings

8,000Hours of threat research globally

Total Database190Terabytes of threat samples

18,000Intrusion Prevention rules

5,800Application Control rules

250 millionRated websites in 78 categories

200Zero-day threats discovered

Based on Q2 2015 dataImage: threatmap.FortiGuard.com

Page 14: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

14

NSS Labs Validates Our AdvantageFortinet Is Consistently “Recommended” While Top Competitors Are Not

NGFW

Breach Detection

X-axis = TCO per protected Mbps, ‘Value’ Y-axis = Security Effectiveness

Upper right quadrant = “Recommended” Lower left quadrant = “Caution” Other quadrants “Neutral”

Next Generation IPS

Aug. 2015Apr. 2015

Sept. 2014

Page 15: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

FortiSandboxProtection against unknown treaths

Page 16: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

16

FortiSandbox – 5 Steps to Better Performance

Call Back Detection

Full Virtual Sandbox

Code Emulation

Cloud File Query

AV Prefilter

• Quickly simulate intended activity – Fortinet patented CPRL• OS independent & immune to evasion – high catch rate

• Apply top-rated anti-malware engine

• Examine real-time, full lifecycle activity in the sandbox to get the threat to expose itself

• Check community intelligence & file reputation

• Identify the ultimate aim, call back & exfiltration• Mitigate w/ analytics & FortiGuard updates

Page 17: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

17

Scenario 1

Scenario» 0day protection against realtime communications threats like HTTP(s).

Ex. Malicious websites

Use FortiGate Use FortiSandbox

» Cloud» On Premise

or

Page 18: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

18

Scenario 2

Scenario» 0day protection against realtime communications threats like HTTP(s).

Ex. Malicious websites» 0day protection for mail threats. Ex. Cryptolocker mails

Use FortiGate Use FortiMail Use FortiSandbox

» Cloud» On Premise

or

Page 19: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

19

Scenario 3

Scenario» 0day protection against realtime communications threats like HTTP(s).

Ex. Malicious websites» 0day protection for mail threats. Ex. Cryptolocker mails» 0day protection for Road Warriors

Use FortiGate Use FortiMail Use FortiClient Use FortiSandbox

Page 20: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

20

Deployment Example

Confidential

One Solution for the Enterprise

FSA working in Device Mode and Sniffer Mode

Signature Updates

Span Port

Signature Updates

Page 21: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

21

4 week FSA catching statistic

Known malicious content detected by step 1/2/3

Suspicious content detected in VM

Belgian customer• FG1500D cluster• AV profile with FSA

integration• Multiple VDOMs• FSA1000D

Page 22: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

Threat Landscape & Evolving IT Infrastructure

Page 23: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

23

Threat Landscape & Evolving IT Infrastructure

WAN

Internet

Cloud

HomeOffice

Internal Network(100 Gbps+)

BranchOffice

PrivateCloud

EdgeGateway

Data Center

ISFW

ISFWISFW

ISFWISFW

ISFW

External

Internal

FortiGate ISFW Features: Very high performance Ultra-low latency High port density 1, 10, 40 & 100 GbE interfaces Detection and proactive protection Quick deployment and operational ease Proven FortiGuard threat intelligence

Page 24: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]

24

Cybersecurity PlatformSeamless Security Across the Entire Attack Surface

USERS

NETWORK

DATA CENTER

ATP Framework Allows Threat Intelligence Sharing and Alerting

Secure Access

Network Security Application Security

FortiGuard Threat Intelligence & Services

FortiGate

Client Security

CloudSecurity

Page 25: Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]