SlideShare una empresa de Scribd logo
1 de 42
Descargar para leer sin conexión
PALO ALTO NETWORKS
NEXT-GENERATION
SECURITY PLATFORM
Palo Alto Networks at-a-glance
2 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
CORPORATE	HIGHLIGHTS
• Founded in 2005; first customer
shipment in 2007
• Safely enabling applications and
preventing cyber threats
• Able to address all enterprise
cybersecurity needs
• Exceptional ability to support global
customers
• Experienced team of 3,600+ employees
• Q3 FY16: $345.8 revenue
$MM
REVENUES ENTERPRISE	 CUSTOMERS
$13 $49
$119
$255
$396
$598
$928
$0
$200
$400
$600
$800
$1.000
FY09 FY10 FY11 FY12 FY13 FY14 FY15
4.700
9.000
13,500
19,000
26.000
0
4.000
8.000
12.000
16.000
20.000
24.000
Jul/11 Jul/12 Jul/13 Jul/14 Jul/15
What’s changed?
3 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
THE EVOLUTION OF THE ATTACKER
Asked for the weak spot in the
cybersecurity of their organization,
47% of the Belgian IT decision
makers talks about attacks that
evolve faster than their security.
Innovation at the other side
Known Threats
OrganizationalRisk
Zero-Day Exploits/Vulnerabilities
Unknown & Polymorphic Malware
Evasive Command-and-Control
Lateral Movement
Changing Application Environment
SSL Encryption
Mobile Threats
THE EVOLUTION OF THE ATTACK
Evasive Command and Control
WEKBY Attacks use DNS requests
Evasive Command and Control
WEKBY Attacks use DNS requests
Evasive Command and Control
WEKBY Attacks use DNS requests
The	following	 commands,	and	their	descriptions	are	supported	by	the	malware:
• sifo – Collect	victim	system	information
• drive	– List	drives	on	victim	machine
• list	– List	file	information	for	provided	 directory
• upload	– Upload	a	file	to	the	victim	machine
• open	– Spawn	a	command	shell
Evasive Command and Control
Twitter Based Command Channel
Lateral Movement
Hacking Team
Hacking Team POC’s
Invisibility test
Invisibility	test	- MacOS (Yosemite)	+	AVG	(silent	installer):	during	 the	infection	everything	
was	good;	a	problem	occurred	just	after	we	configured	 the	MacOS'	mail	client	in	order	to	let	
the	agent	retrieve	the	emails:	just	a	few	seconds	after	that	configuration,	 an	AVG	popup	
warned	about	a	trojan detection.	I	closed	the	popup	 in	time	while	the	customer	was	
attending	Serge's	explanation	of	the	received	evidences,	so	the	customer	didn't	see.	The	
emails	were	correctly	retrieved	by	the	agent,	but	we	didn't	have	a	chance	to	check	what	was	
the	object	of	the	detection	(our	trojan or	what	else);
https://wikileaks.org/hackingteam/emails/emailid/19213
Lateral Movement
Hacking Team
http://pastebin.com/raw/0SNSvyjJ
Lateral Movement
Hacking Team
Zero Day Exploits
HT
It	is	known	as	a	"zero-day"	because	
once	the	vulnerability	becomes	
known,	the	software's	author	has	
zero	days	in	which	to	plan	and	advise	
any	mitigation	against	its	
exploitation	(for	example,	by	
advising	workarounds	or	by	issuing	
patches).
Patching is Often Insufficient to Protect Endpoints
14 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
Example:Hacking Team Adobe Flash Zero-Day Exploits
Average days before a zero-day exploit is patched*
312
*Source: https://users.ece.cmu.edu/~tdumitra/public_documents/bilge12_zero_day.pdf
0-day
Market
0-day
Brokers
High-end	exploit	broker	"the	Grugq"	at	a	Bangkok	bar.	
The	bag	of	cash	at	his	feet	is	for	one	of	his	exploit	
developers.	(Photo	credit:	Christopher	Wise/Redux)
GrugQ -- who	takes	a	15%	commission	on	deals	-- said	
that six-figure	deals	are	common,	and	that	he	won't	
touch	a	vulnerability	worth	less	than	$50,000.
Zero Days
You don’t need 0days when there are 1000 days in the network
In	an	unprecedented	 talk	on	Thursday	at	the	USENIX	Enigma	security	conference	in	
San	Francisco, Rob	Joyce,	chief	of	NSA's	Tailored	Access	Operations	(TAO),	
downplayed	the	importance	of	zero-days	and	the	degree	to	which	nation-state	
hackers	like	those	in	his	unit	depend	on	them.
“I	will	tell	you	that	persistence	and	focus	will	get	you	in,	will	achieve	that	exploitation	
without	the	zero-days,”	he	continued	“There's	so	many	more	vectors	that	are	easier,	
less	risky	and	quite	often	more	productive	than	going	down	that	route.”
Unknown & Polymorphic Malware
Unknown & Polymorphic Malware
Unknown & Polymorphic Malware
22 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
Changing Application Environment
SaaS
24 |		©	2015, Palo	Alto	Networks.	Confidential	and	Proprietary.	
MALWARE PROPAGATION
25 |		©	2015, Palo	Alto	Networks.	Confidential	and	Proprietary.	
Share
all files
publicly!
MALICIOUS DATA EXFILTRATION
SSL Encryption
HTTPS Everywhere
These are only normal websites over SSL!
SSL Encryption
Easy to hide
Dridex activity	included	SSL	traffic	to	various	IP	addresses,	mostly	with example.com SSL	
certificates.	 I	also	noted	an	SSL	certificate	for example.net as	shown	below:
Mobile Threats
Android Trojan “Xbot” Phishes Credit Cards and Bank Accnts, Encrypts Devices for Ransom
Failure of legacy security architectures
29 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
Anti-APT for
port 80 APTs
Anti-APT for
port 25 APTs
Endpoint AV
DNS protection cloud
Network AV
DNS protection for
outbound DNS
Anti-APT cloud
Internet
Enterprise Network
UTM/Blades
Limited visibility Manual responseLacks correlation
Vendor 1
Vendor 2
Vendor 3
Vendor 4
Internet	 Connection
Malware	 Intelligence
DNS Alert
Endpoint Alert
AV Alert
SMTP Alert
AV Alert
Web Alert
Web Alert
SMTP Alert
DNS Alert
AV Alert
DNS Alert
Web Alert
Endpoint Alert
IT IS TIME TO TURN THE PAGE
Requirements for the future
DETECT AND PREVENT THREATSAT EVERY POINTACROSS THE ORGANIZATION
At the internet
edge
Between employees
and devices within
the LAN
At the data center
edge, and
between VM’s
At the mobile
device
Cloud
Within private,
public and hybrid
clouds
6 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
Delivering the next-generation security platform
32 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
The Next Generation Firewall Foundations
•App-ID™
•Identify	the	application
•User-ID™
•Identify	the	user
•Content-ID™
•Scan	the	content
Single Pass Parallel Processing Architecture
KISS
Policy	Decision
Firewall
App-ID
Allow	Salesforce
X Allow Salesforce
This IS Safe Application Enablement
Translate a Policy into a Policy
WildFire: Protecting Against The Unknown
Protections developed
with in-line enforcement
across the attack lifecycle
Intelligence correlated across:
Web
Detect unknown
§ Malware
§ Exploits
§ Command-and-control
§ DNS queries
§ Malware URLs
WildFire
WildFire
Threat
Prevention
URL
Filtering
All traffic
SSL encryption
All ports
Perimeter
All commonly
exploited file types
3rd party data
Data center
Endpoint
Email
FTP
SMTP
SMB
Sandboxing The Unknown
But what about the Endpoint
Begin
Malicious
Activity
Authorized
Application
Heap
Spray
ROP
Utilizing
OS Function
37 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
Vendor Patches
§ Download malware
§ Steal critical data
§ Encrypt hard drive
§ Destroy data
§ More…
Vulnerabilities
Traps Blocks Exploit Techniques
Heap
Spray
Traps
EPM
No Malicious
Activity
Authorized
Application
38 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
Traps
Delivering continuous innovation
GlobalProtect
WildFire
AutoFocus
Aperture
Threat Prevention
URL Filtering
10 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
The Prevention Opportunity in the attack lifecycle
40 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
1
Exploit infiltration
3Malware download
2 Vulnerability Exploit
4 Malware installation 5
Command and Control
6 Lateral movement
7
East - West
8
Data exfiltration
Why Palo Alto Networks?
Prevention
Zero-Day
Reduce Risk
Policy
Visibility
Remediation
Detection
Endpoint
Data Center
Mobility
BYOD Management
Vulnerability
Responsive
Exploit
Anti-Malware Forensics
Automation
Private Cloud
Public Cloud
Performance
Scalability
Platform
Segmentation
Applications
Users
Control
Agile
Perimeter
Integrated
Support
Web Security
Command-&-Control
Virtualization
Ecosystem
Context
Correlation
Services
People
Culture
Safe Enablement
Application
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016.

Más contenido relacionado

La actualidad más candente

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for merakiCisco Canada
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceGeorge Fares
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simpleCisco Canada
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 

La actualidad más candente (20)

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 

Destacado

End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewallpillardata
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configurationAlberto Rivai
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logicAlberto Rivai
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configurationAlberto Rivai
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...SWITCHPOINT NV/SA
 
Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016InformatikaFortuno
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails applicationclucasKrof
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Benelux
 

Destacado (16)

End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
Palo Alto Networks - Just another Firewall
Palo Alto Networks - Just another FirewallPalo Alto Networks - Just another Firewall
Palo Alto Networks - Just another Firewall
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
Palo alto networks
Palo alto networksPalo alto networks
Palo alto networks
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016Sophos Corporate Overview And End Poin 2016
Sophos Corporate Overview And End Poin 2016
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Securing your Rails application
Securing your Rails applicationSecuring your Rails application
Securing your Rails application
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
Sophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypesSophos Cloud - breaking the stereotypes
Sophos Cloud - breaking the stereotypes
 

Similar a PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016.

Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...Jisc
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 

Similar a PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016. (20)

Prevention first platform for cyber defence the alternative strategy khipu ...
Prevention first platform for cyber defence the alternative strategy   khipu ...Prevention first platform for cyber defence the alternative strategy   khipu ...
Prevention first platform for cyber defence the alternative strategy khipu ...
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
The Akamai Security Portfolio
The Akamai Security PortfolioThe Akamai Security Portfolio
The Akamai Security Portfolio
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 

Más de SWITCHPOINT NV/SA

CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...SWITCHPOINT NV/SA
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SWITCHPOINT NV/SA
 
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...SWITCHPOINT NV/SA
 
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...SWITCHPOINT NV/SA
 
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...SWITCHPOINT NV/SA
 
Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.SWITCHPOINT NV/SA
 

Más de SWITCHPOINT NV/SA (6)

CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
CISCO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day...
 
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
 
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
EfficientIP presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
VMTurbo presentation used during the SWITCHPOINT NV/SA Quarterly Experience D...
 
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
Nimble Storage presentation used during the SWITCHPOINT NV/SA Quarterly Exper...
 
Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.Aankondiging nieuw product bij SWITCHPOINT NV/SA.
Aankondiging nieuw product bij SWITCHPOINT NV/SA.
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience Day on 7th June 2016.

  • 2. Palo Alto Networks at-a-glance 2 | © 2015,Palo Alto Networks.Confidentialand Proprietary. CORPORATE HIGHLIGHTS • Founded in 2005; first customer shipment in 2007 • Safely enabling applications and preventing cyber threats • Able to address all enterprise cybersecurity needs • Exceptional ability to support global customers • Experienced team of 3,600+ employees • Q3 FY16: $345.8 revenue $MM REVENUES ENTERPRISE CUSTOMERS $13 $49 $119 $255 $396 $598 $928 $0 $200 $400 $600 $800 $1.000 FY09 FY10 FY11 FY12 FY13 FY14 FY15 4.700 9.000 13,500 19,000 26.000 0 4.000 8.000 12.000 16.000 20.000 24.000 Jul/11 Jul/12 Jul/13 Jul/14 Jul/15
  • 3. What’s changed? 3 | © 2016,Palo Alto Networks.Confidentialand Proprietary. THE EVOLUTION OF THE ATTACKER Asked for the weak spot in the cybersecurity of their organization, 47% of the Belgian IT decision makers talks about attacks that evolve faster than their security.
  • 4. Innovation at the other side Known Threats OrganizationalRisk Zero-Day Exploits/Vulnerabilities Unknown & Polymorphic Malware Evasive Command-and-Control Lateral Movement Changing Application Environment SSL Encryption Mobile Threats THE EVOLUTION OF THE ATTACK
  • 5. Evasive Command and Control WEKBY Attacks use DNS requests
  • 6. Evasive Command and Control WEKBY Attacks use DNS requests
  • 7. Evasive Command and Control WEKBY Attacks use DNS requests The following commands, and their descriptions are supported by the malware: • sifo – Collect victim system information • drive – List drives on victim machine • list – List file information for provided directory • upload – Upload a file to the victim machine • open – Spawn a command shell
  • 8. Evasive Command and Control Twitter Based Command Channel
  • 10. Hacking Team POC’s Invisibility test Invisibility test - MacOS (Yosemite) + AVG (silent installer): during the infection everything was good; a problem occurred just after we configured the MacOS' mail client in order to let the agent retrieve the emails: just a few seconds after that configuration, an AVG popup warned about a trojan detection. I closed the popup in time while the customer was attending Serge's explanation of the received evidences, so the customer didn't see. The emails were correctly retrieved by the agent, but we didn't have a chance to check what was the object of the detection (our trojan or what else); https://wikileaks.org/hackingteam/emails/emailid/19213
  • 14. Patching is Often Insufficient to Protect Endpoints 14 | © 2016,Palo Alto Networks.Confidentialand Proprietary. Example:Hacking Team Adobe Flash Zero-Day Exploits Average days before a zero-day exploit is patched* 312 *Source: https://users.ece.cmu.edu/~tdumitra/public_documents/bilge12_zero_day.pdf
  • 17. Zero Days You don’t need 0days when there are 1000 days in the network In an unprecedented talk on Thursday at the USENIX Enigma security conference in San Francisco, Rob Joyce, chief of NSA's Tailored Access Operations (TAO), downplayed the importance of zero-days and the degree to which nation-state hackers like those in his unit depend on them. “I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero-days,” he continued “There's so many more vectors that are easier, less risky and quite often more productive than going down that route.”
  • 19.
  • 22. 22 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
  • 26. SSL Encryption HTTPS Everywhere These are only normal websites over SSL!
  • 27. SSL Encryption Easy to hide Dridex activity included SSL traffic to various IP addresses, mostly with example.com SSL certificates. I also noted an SSL certificate for example.net as shown below:
  • 28. Mobile Threats Android Trojan “Xbot” Phishes Credit Cards and Bank Accnts, Encrypts Devices for Ransom
  • 29. Failure of legacy security architectures 29 | © 2015,Palo Alto Networks.Confidentialand Proprietary. Anti-APT for port 80 APTs Anti-APT for port 25 APTs Endpoint AV DNS protection cloud Network AV DNS protection for outbound DNS Anti-APT cloud Internet Enterprise Network UTM/Blades Limited visibility Manual responseLacks correlation Vendor 1 Vendor 2 Vendor 3 Vendor 4 Internet Connection Malware Intelligence DNS Alert Endpoint Alert AV Alert SMTP Alert AV Alert Web Alert Web Alert SMTP Alert DNS Alert AV Alert DNS Alert Web Alert Endpoint Alert
  • 30. IT IS TIME TO TURN THE PAGE
  • 31. Requirements for the future DETECT AND PREVENT THREATSAT EVERY POINTACROSS THE ORGANIZATION At the internet edge Between employees and devices within the LAN At the data center edge, and between VM’s At the mobile device Cloud Within private, public and hybrid clouds 6 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
  • 32. Delivering the next-generation security platform 32 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
  • 33. The Next Generation Firewall Foundations •App-ID™ •Identify the application •User-ID™ •Identify the user •Content-ID™ •Scan the content
  • 34. Single Pass Parallel Processing Architecture
  • 35. KISS Policy Decision Firewall App-ID Allow Salesforce X Allow Salesforce This IS Safe Application Enablement Translate a Policy into a Policy
  • 36. WildFire: Protecting Against The Unknown Protections developed with in-line enforcement across the attack lifecycle Intelligence correlated across: Web Detect unknown § Malware § Exploits § Command-and-control § DNS queries § Malware URLs WildFire WildFire Threat Prevention URL Filtering All traffic SSL encryption All ports Perimeter All commonly exploited file types 3rd party data Data center Endpoint Email FTP SMTP SMB Sandboxing The Unknown
  • 37. But what about the Endpoint Begin Malicious Activity Authorized Application Heap Spray ROP Utilizing OS Function 37 | © 2016,Palo Alto Networks.Confidentialand Proprietary. Vendor Patches § Download malware § Steal critical data § Encrypt hard drive § Destroy data § More… Vulnerabilities
  • 38. Traps Blocks Exploit Techniques Heap Spray Traps EPM No Malicious Activity Authorized Application 38 | © 2016,Palo Alto Networks.Confidentialand Proprietary.
  • 39. Traps Delivering continuous innovation GlobalProtect WildFire AutoFocus Aperture Threat Prevention URL Filtering 10 | © 2015,Palo Alto Networks.Confidentialand Proprietary.
  • 40. The Prevention Opportunity in the attack lifecycle 40 | © 2016,Palo Alto Networks.Confidentialand Proprietary. 1 Exploit infiltration 3Malware download 2 Vulnerability Exploit 4 Malware installation 5 Command and Control 6 Lateral movement 7 East - West 8 Data exfiltration
  • 41. Why Palo Alto Networks? Prevention Zero-Day Reduce Risk Policy Visibility Remediation Detection Endpoint Data Center Mobility BYOD Management Vulnerability Responsive Exploit Anti-Malware Forensics Automation Private Cloud Public Cloud Performance Scalability Platform Segmentation Applications Users Control Agile Perimeter Integrated Support Web Security Command-&-Control Virtualization Ecosystem Context Correlation Services People Culture Safe Enablement Application