Context-Aware Security From The Core
Context-Aware Security From The Core
2
2 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Evolving Network Environment and Paradigm Shifts...
4
4 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Products Galore: Solutions Missing
400+
VENDORS
5
5 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Modern Networks
External Endpoints
DNS
Threat
Intel
6
6 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Potential Gaps in Modern Networks
External Endpoints
DNS
C&C/Data
Exfiltration?
DDoS?
Data
Exfiltration?
? C&C?
? ?
Network context? Network context?
Threat
Intel
What’s on What’s on
my network? my network?
7
7 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
DNS – The Critical Yet Vulnerable Asset
8
8 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
The DNS Gap – A Multi Dimensional Threat Vector
Making Your
Infrastructure Work 78% 84% >$500 $1.5M
Against You DNS: most common Of reflection/amplification Per min cost of downtime Average cost per year to
application layer attacks1 attacks use DNS1 due to DDoS attack2 deal with DNS attacks2
The Leading
Culprit in Data
$4M 46% 45%
Average consolidated % of survey respondents that % of survey respondents that
Exfiltration cost of a data breach3 experienced DNS data exfiltration4 experienced DNS tunneling4
APT/Malware
Proliferation
91% 431M #1
Of malware uses DNS New unique pieces of malware in Malware C&C is #1 responsible
Rooted in DNS to carry out campaigns5 20156 vector for crimeware7
#1 #2 #3
Infrastructure Data Protection and Threat Containment
Protection Malware Mitigation and Operations
Better Application and Protect Users and Data Efficiency & Optimization
Service Availability of Security Operations
10 | | ©©2017
10 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Modern Networks: Agile & Secure
External Endpoints
DDoS
DNS DDoS
SIEM
Data
Exfiltration Threat C&C
Intel
11 | | ©©2017
11 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
#1 Infrastructure Protection
Maintain Service and Application Availability
12 | | ©©2017
12 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
#2 Data Protection and Malware Mitigation
Avoid brand damage, financial and legal implications caused by data breaches, malware
13 | | ©©2017
13 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
#3 Threat Containment and Operations
Ease Security Operations, Get Better ROI from Your Security Investments
14 | | ©©2017
14 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Multipronged Approach to Threat Detection
15 | | ©©2017
15 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Leverage Threat Intel Across Entire Security Infrastructure
Infoblox C&C IP List
Dossier
Investigate
Threats
16 | | ©©2017
16 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Security Orchestration & Data Sharing
Accelerating Incident Handling and Response Data to Prioritize Remediation
Application and
Business Context
Threat IPAM • “Metadata” via Extended
Network
Intelligence Attributes: Owner, app, security
Platform Access level, location, ticket number
Control
• Context for accurate risk
assessment and event
prioritization
17 | | ©©2017
17 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
• Try Infoblox Products – Free of
Cost & Risk
• ActiveTrust Cloud eval
18 | | ©©2017
18 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.
Q&A
19 | | ©©2017
19 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved.