1 / 19

Rapid Threat Response From 7 Days to 7 Seconds

Rapid Threat Response From 7 Days to 7 Seconds. Agenda. Changing Threat Landscape Evolution of NAC to Security Automation Intro to Bradford Networks Leveraging Integration and Correlation Rapid Threat Response Business Impact. Profile of Today’s Advanced Cyber Threats. Phishing

idalia
Download Presentation

Rapid Threat Response From 7 Days to 7 Seconds

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Rapid Threat ResponseFrom 7 Days to 7 Seconds

  2. Agenda Changing Threat Landscape Evolution of NAC to Security Automation Intro to Bradford Networks Leveraging Integration and Correlation Rapid Threat Response Business Impact

  3. Profile of Today’s Advanced Cyber Threats Phishing Email on End User’s Device User’s Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack surface is now3x what is was just a few years ago.

  4. The Enterprise Today … Dynamic, Complex Devices Users SAFE Network BLINDSPOT Visibility Datacenter SAFE SAFE Policies SAFE Secure BACKDOOR Enforcement Network Access Control Assessing the Risk of Every User and Device Risk

  5. Network Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N

  6. Flexible Network Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices

  7. Policy Enforcement Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access

  8. Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version

  9. Gaining and Removing Network Access Criteria for Gaining Network Access Criteria for Removing Network Access Network Access Control Security Information & Event Management Active Directory Visibility Intrusion Detection Systems Antivirus Network Access Policies Patch Management Trusted Configurations Risk Indication Advanced Persistent Threat Detection Mobile Device Management Self-Service Onboarding Threat / Device Correlation Security Intelligence & Big Data Analytics Application Whitelisting Endpoint Visibility & Compliance Threat Investigation Workflows Control Network Access Network Change Automation Rapid Threat Response Connect Reassign Reconfigure Isolate Investigate Block

  10. Evolution of NAC NAC 3.0 Security Automation Rapid Threat Response Minimize Threat Think Time Threat Investigation Simplify Investigation Workflows NAC 2.0 BYOD Consumerization/ BYOD Enable Safe Network Provisioning Endpoint Compliance NAC 1.0 Safe Onboarding Ensure Safe Devices Self-Service Onboarding Enable Scalable Onboarding

  11. Rapid Threat Response 

  12. Cyber Threat Lifecycle Attack To Compromise Compromise To Detection Detection To Containment Attack Compromise Detection Containment Cyber Threat Lifecycle

  13. Why Detection to Containment Takes 7 Days Escalating Total Cost More Impact on Brand Impact Threats Are Targeted and Complex Fragmented IT Skills Silos of Security Information More Records Breached Theft Detection to Containment Time Too Many Security Events

  14. Getting Threat Response Down to 7 Seconds Cyber Security Strategy Visibility Prevention Detection Response Manual Automation 7 SECONDS Threat Intelligence Threat Containment Remediate Device Block Device Restrict Access Determine Motive Trace Method Uncover Mistakes

  15. About Bradford Networks Leader in Rapid Threat Response SMARTEDGE PLATFORM SmartEdge Integration Platform Network Visibility Rapid Threat Response Remediate monitor Profile Isolate Live Inventory of Network Connections (LINC) Block Correlate Best Buy Rating From SC Magazine Network Analytics and Forensics

  16. SmartEdge Platform BYOD Endpoint Protection SIEM SmartEdge Platform Network Firewalls Detection User Time Applications Connection Device

  17. Rapid Threat Response (RTR) Essentials … Live Inventory of Wired, Mobile and VPN Connections Integrated High Fidelity Security Alerts Business-Criticality of User and Endpoints Real-Time and Flexible Control of Network Access

  18. Network Sentry/RTR in Action Detection Response 7 SECONDS Threat Containment IP Address Block Device + User Name + Security Group + Device Type + Operating System + Wired Adapters + Wireless Adapters + Installed Applications + Network Location + Connection Port Restrict Access Remediate Device

  19. Business Impact with Bradford Networks Reduce Threat Response Time From Days to Seconds Automate Response and Reduce Burden on Security Staff Quickly Contain Threats, Prevent Propagation Minimize Cost , Protect Brand, Protect Assets

More Related