Dell Security Overview
Eddie Chan Security Solution Consultant Dell Security Solutions Dell | Hong Kong & Taiwan
Dell Security Overview Eddie Chan Security Solution Consultant - - PowerPoint PPT Presentation
Dell Security Overview Eddie Chan Security Solution Consultant Dell Security Solutions Dell | Hong Kong & Taiwan Agenda Session One 2016 Threat Report Update Session Two SonicWALL C APT URE Advanced Threat Protection Service
Eddie Chan Security Solution Consultant Dell Security Solutions Dell | Hong Kong & Taiwan
Security Products
Internal Use Only – Dell Confidential
automation
related information (i.e. 1M Sensors, Honeypots, Sandboxing)
intelligence
research organizations
Internal Use Only – Dell Confidential
Malware attacks blocked by Dell firewalls in 2015
Dell - Internal Use - Confidential
6
Website downloads Text messages (SMS) Email/Phishing Portable devices (USB)
Internal Use Only – Dell Confidential
Dell - Restricted - Confidential
Exploit kits evolved with greater speed, heightened stealth and novel shape-shifting abilities
mechanisms to evade security systems
techniques, such as URL pattern changes
redirection techniques (i.e. Steganography)
entrapment techniques
Dell - Internal Use - Confidential
11
黑客鎖電腦檔案 索金鑰費 中小企下載圖片中招 付款失敗資料救不回
Ransomware effect for differences business area
Dell - Restricted - Confidential
HTTPS hits as percentage of total hits
SSL/TLS encrypted traffic rises sharply, leading to more under-the-radar hacks
61% 39%
By Jeremy Kirk, IDG News Service, Jul 27, 2015
You can’t protect what you can’t see — attacks unseen by most firewalls “…redirection code planted in the malicious advertisements uses SSL/TLS (Secure Sockets Layer/Transport Layer,…” “…redirection code planted in the malicious advertisements uses SSL/TLS (Secure Sockets Layer/Transport Layer,…”
Dell - Restricted - Confidential
Notable trends in Android attacks
generated PIN to the typical ransomware lock screen
library file, rather than a classes file
prime target for Android malware
Dell - Restricted - Confidential
Popular malware families continued to morph from season to season and differed across geographic regions
Dell - Internal Use - Confidential
19
Predictions for 2016
threat scanning will continue to rage, as companies fear performance trade-offs
because major browser vendors have stopped supporting Flash plugins
through the vulnerabilities of Near Field Communication (NFC)
Final Takeaways
Internal Use Only – Dell Confidential
Recommendations
IAM VPN AV
App Control
2FA
IPS
Patch Manag ement
Encry ption
PAM
DPI CFC SIEM Educa tion Sand box
AV
monit
logs DLP
Identity Network Endpoint Data
Forensics Behavioral analysis
Before During After Defend Detect Discover
Combine technologies from each tower that cross the time boundaries
Layered Security - most effective better together strategy
Obey the 3 D’s Defend:: Before an attack fortify your position to
give yourself the best chance of preventing a breach.
Detect:: During an attack ensure your tools see the
threat and act quickly to prevent it
Discover:: After penetration ensure visibility un-
masks the threat quickly to minimize loss.
February 2016
devices
* Source: Dell Security 2016 Threat Report
SuperMassive 9200-9600
Introducing Dell SonicWALL Capture
Advanced Threat Protection Service
Cloud service detects and blocks zero-day threats at the gateway
threats than single sandbox technology
file-size limitation
signatures
TZ SOHO – TZ600 NSA 2600 – 6600
Internal Use Only – Dell Confidential
Increase security effectiveness against zero-day threats
more threats, can’t be evaded
no file size limitation
26
Internal Use Only – Dell Confidential
VMRAY with Dell SonicWALL
Internal Use Only – Dell Confidential
lastline with Dell SonicWALL
Internal Use Only – Dell Confidential
lastline in NSS LABs report in 2015
Internal Use Only – Dell Confidential
Monitoring and reporting
30
Internal Use Only – Dell Confidential
Internal Use Only – Dell Confidential
Internal Use Only – Dell Confidential
Internal Use Only – Dell Confidential
Internal Use Only – Dell Confidential
April 2016
April 2016
39
Dell Software
Privilege Management Challenges
Fact: 69% of confirmed security incidents were perpetuated by insiders, and increased more than 300% between 2011 and 2012 Fact: More than half were former employees who regained access via backdoors or corporate accounts that were never disabled
40
Dell Software
Why are they difficult to manage?
Applications Admins Helpdesk Developers Vendors Applications Devices Mainframes Databases Servers
41
Dell Software
Huge security and compliance risk?
Very Powerful No individual accountability
42
Dell Software
Solve the challenges
Task 1 Task 2 Task 3 User A User B User C
Granular delegation & command control Monitoring & logging Secure & efficient management
43
Dell Software
Secure and efficient management
Privilege Safe
Request Authorization Issuance Change Devices Servers Applications Databases Mainframes
44
Dell Software
Privileged Password Manager
–AES 256 Encrypted
–Dual or more release controls
and scripts
–“Last use” –Time-based
45
Dell Software
Session Management
(IN THE ROADMAP)
Pre-set time limits Full DVR-like recording Allow only certain commands
46
Dell Software
Who to talk to and what to listen for
Manual process, application access, assigning accountability, access reporting
IT Manager
Potential breach, audit reports, compliance
Security officer
Manual process, too much responsibility
Administrator
48
Problem: static passwords are inefficient, unsecure and expensive
professional/personal accounts
– Users use the same password for multiple accounts – Complex passwords are written down – Passwords are only changed when required
$850,000 per year resetting passwords
important to prove identity of users accessing the network
49
Answer: two-factor authentication
2FA
50
A two-factor authentication solution should be:
51
Defender Architecture and Scalability
– Leverages existing investment in Active Directory
– Identity, roles, and rules stored in and retrieved from AD – Management through ADUC
– Standards Based
– RADIUS – OATH – LDAP – PAM
– Scales with Active Directory – Automated replication and backup of Defender data – Multiple points of authentication for load balancing and redundancy
52
Defender Administration Tool
user’s record
53
Defender Web-Based Management Portal
54
Helpdesk
55
Defender Tokens
vendors
56
Defender hardware tokens
Go-7 Go-6 YubiKey
57
Defender software tokens
Android BlackBerry iOS Windows Phone GrIDsure SMS Java Windows E-mail
58
Defender Hardware Token Self Registration
59
Defender Hardware Token Self Registration
60
Defender Applications
(with SSO), Dell Software (CAM, ARS, TPAM, D1IM, Sonic Wall…), OWA, Custom (via Client SDK--C#, C++, Java)
61
Qualifying Questions
Internal Use Only – Dell Confidential
KB Article Best Practice Defender with NGFW
http://support- public.cfm.software.dell.com/31228_best_practice_defender_with_ngfw_ver1.2.pdf
Dell - Restricted - Confidential