1 / 22

Combating Modern Malware The Next Generation of Cyber Security

Targeted at critical assets: High Value Enterprises targeted National Infrastructure targeted Federal/Government Agencies targeted. Modern targeted Malware is used for: Cyber Crime Cyber Espionage Cyber Warfare. FireEye, Inc. Confidential. 2. Modern Malware the new malicious vector . Risin

dayton
Download Presentation

Combating Modern Malware The Next Generation of Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Combating Modern Malware The Next Generation of Cyber Security FireEye, Inc. Confidential

    2. FireEye, Inc. Confidential 2 Modern Malware the new malicious vector Malware is pervasive in today’ Internet landscape. Internet is constantly raining malware, like acid rain, on all connected to it.. Malware – malicious bits hide like poisoned needles in what appears to benign content and benign network traffic. The easily pass in and out of networks, without detection There is no safe harbor on the Internet – due to ability of highly sophisticated malware to bypass all existing traditional defenses These malicious bits can be constructed to be: thieves or spies or even bombs Two types: broadly targeted and narrowly targeted Malware is pervasive in today’ Internet landscape. Internet is constantly raining malware, like acid rain, on all connected to it.. Malware – malicious bits hide like poisoned needles in what appears to benign content and benign network traffic. The easily pass in and out of networks, without detection There is no safe harbor on the Internet – due to ability of highly sophisticated malware to bypass all existing traditional defenses These malicious bits can be constructed to be: thieves or spies or even bombs Two types: broadly targeted and narrowly targeted

    3. Rising Tide of Cyber Espionage FireEye, Inc. Confidential From US military and government targets, DIB targets, to recent industrial espionage From US military and government targets, DIB targets, to recent industrial espionage

    4. Characterizing Modern Malware Confidential

    5. Total Collapse of Current Technologies Confidential

    6. Modern Malware Infection Cycle For Government Use Only

    7. Breaking the Advanced Persistent Threat Confidential Stop What You Know About Detect What You Don’t Know About Block callbacks to stop data loss and buy time for IT remediation Block known, inbound attacks : STOP NEW INFECTIONS Block known, outbound callbacks : STOP MALICOUS DATA THEFT Detect unknown, 0-day malware : STOP TARGETED ATTACKS Dynamically capture & block callbacks : STOP TARGETED DATA THEFT Stop What You Know About Detect What You Don’t Know About Block callbacks to stop data loss and buy time for IT remediation Block known, inbound attacks : STOP NEW INFECTIONS Block known, outbound callbacks : STOP MALICOUS DATA THEFT Detect unknown, 0-day malware : STOP TARGETED ATTACKS Dynamically capture & block callbacks : STOP TARGETED DATA THEFT

    8. FireEye Malware-VM™ Filter KEY POINT: More in-depth with the FireEye Malware VM analysis * Proprietary VM technology * Ability to detect even VM aware malware * Runs the full OS and browser software stack KEY POINT: More in-depth with the FireEye Malware VM analysis * Proprietary VM technology * Ability to detect even VM aware malware * Runs the full OS and browser software stack

    9. MAX Cloud protects globally

    10. FireEye, Inc. Confidential

    11. Enterprise Deployment Architecture Confidential

    12. FireEye, Inc. Confidential 12

    13. Next Generation of Malware Protection Confidential

    14. FireEye, Inc. Confidential 14

    15. FireEye, Inc. Confidential 15

    16. 16 Copyright 2009 FireEye, Inc. All rights reserved

    17. 17 Copyright 2009 FireEye, Inc. All rights reserved

    18. 18 Copyright 2009 FireEye, Inc. All rights reserved

    19. 19 Copyright 2009 FireEye, Inc. All rights reserved

    20. FireEye, Inc. Confidential 20

    21. FireEye, Inc. Confidential 21

    22. FireEye, Inc. Confidential 22

    23. Integrated FireEye/Juniper Enterprise Deployment Architecture KEY POINT: Multiple types of MPS appliances for the corporate network, branch offices, and even for research purposes. Malware Analysis Central Management SystemKEY POINT: Multiple types of MPS appliances for the corporate network, branch offices, and even for research purposes. Malware Analysis Central Management System

More Related