1 / 56

Ides Vanneuville, Palo Alto Networks Sr. Director Systems Engineering EMEA

Modern Malware & Application Control in an infected world with Next-Generation Firewall…and why it needs to be a Next-Generation firewall!. Ides Vanneuville, Palo Alto Networks Sr. Director Systems Engineering EMEA. the need for innovation. t he next big thing.

kerri
Download Presentation

Ides Vanneuville, Palo Alto Networks Sr. Director Systems Engineering EMEA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Modern Malware & Application Control in an infected world with Next-Generation Firewall…and why it needs to be a Next-Generation firewall! Ides Vanneuville, Palo Alto Networks Sr. Director Systems Engineering EMEA

  2. the need for innovation

  3. the next bigthing

  4. it’s time to fix the firewall

  5. it’s time to fix malware protection !

  6. data breach mythology

  7. we invest in protecting our datacenters

  8. rarely the datacenter is attacked directly

  9. no more vulnerability scanning

  10. the new attacker

  11. the attacker is not a bored geek

  12. nation states and organized crime

  13. data breaches in 2011

  14. step one: baitan end-user

  15. step one: baitan end-user spear phishing

  16. step one: baitan end-user

  17. step two: exploit a vulnerability

  18. step three: download a backdoor

  19. step four: establish a back channel

  20. step five: explore and steal

  21. the  state of malware protection

  22. bait protection is needed at all stages exploit download back channel steal

  23.  baitprotection

  24.  exploitprotection exploits come in thru many applications

  25.  exploit protection many months pass between black-hat discovery, white-hat discovery, and protection being available

  26.  download protection targeted attacks mean few instances in the wild

  27.  downloadprotection anti-malware vendors take several days to come up with a signature

  28.  back channelprotection + + not only attacks are targeted and IPS signatures take time to develop, back channels are often encrypted

  29. explore-and-stealprotection minimal internal security means that once inside, an attacker can roam the network freely

  30. blueprint for stopping modern malware

  31. need to protect all applications

  32. response timeis key

  33. automationis a must

  34. a sandboxat the core

  35. perform the analysis for all devices centrally

  36. automatically generate multiplesignatures • Anti-malware download signatures • IPS back-channel signatures • Malware URLs • IPS signatures for identified new vulnerabilities • Deliver signatures within one hour

  37. stopping modern malware in practice

  38. bait protection is needed at all stages exploit download back channel steal

  39. bait protection  • Block unneeded applications • Control file transfers by user, application, and file type • Block access to Malware URLs

  40. exploit protection  • Discover vulnerabilities before the bad guys • IPS signature for newly identified vulnerabilities

  41. discovering Microsoft vulnerabilities number of vulnerability discoveries credited to each vendor over the last 4 years Source: OSVDB; as of June 15th 2011

  42. discovering Adobe Flash vulnerabilities number of vulnerability discoveries credited to each vendor over the last 4 years Source: OSVDB; as of August 15th 2011

  43. download protection  • Anti-Malware signatures available to the entire participant base within one hour of first discovery • Generic drive-by-download protection for HTTP/S downloads

  44. back-channel protection  • Block unknown application traffic • Use heuristics to detect back channel communication • Signatures available for newly discovered malware • Need to decrypt SSL connections to look inside

  45. explore-and-steal protection  • Network segmentation • Control access to data by user and application

  46. the role of NGFW in stopping modern malware

  47. solution has to be enterprise-wide

  48. protection has to be real-time, inline

  49. needs user-based access control

More Related