Vdocuments - MX Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto
Vdocuments - MX Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto
Vdocuments - MX Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto
Modern Malware
Cory Grant
Regional Sales Manager
Palo Alto Networks
What are we seeing
Key Facts and Figures - Americas
Application Variants
Bandwidth Consumed
4 | ©2014 Palo Alto Networks. Confidential and Proprietary. Source: Palo Alto Networks, Application Usage and Threat Report. May 2014.
High in Threat Delivery; Low in Activity
11% of all threats observed are code execution exploits within common
sharing applications
Most commonly used applications: email (SMTP, Outlook Web, Yahoo! Mail),
social media (Facebook, Twitter) and file-sharing (FTP)
5 | ©2014 Palo Alto Networks. Confidential and Proprietary. Source: Palo Alto Networks, Application Usage and Threat Report. May 2014.
Low Activity? Effective Security or Something Else?
Bitcoin mining
SPAM
ClickFraud $$$
Citadel
Aurora
TDL-4
Rustock
Poison IVY
Ramnit APT1
Challenge: Is SSL used to protect data and privacy, or to mask malicious actions?
32% (539) of the applications found can use SSL. What is your exposure?
11 | ©2014 Palo Alto Networks. Confidential and Proprietary. Source: Palo Alto Networks, Application Usage and Threat Report. May 2014.
Target data breach – APTs in action
Maintain access
13 | ©2014, Palo Alto Networks. Confidential and Proprietary.
Best Practices
Security from Policy to Application
What assumptions drive your security policy?
Doss your current security implementation provide the visibility and insight
needed to shape your policy?
Assumptions Policy
Visibility
Implementation
&
Insight
Security Perimeter Paradigm
Organized The Enterprise
Attackers
Infection
Escalation
Exfiltration Exfiltration
Is there Malware inside your network today???
Application Visibility
Reduce attack surface
Gozi Freegate
Rustock
Citadel
TDL-4
tcp/443
Challenge: Is SSL used to protect data and privacy, or to mask malicious actions?
1 2 3 4 5
Block
the exploit
Coordinated
Spyware intelligence to
Block spyware, detect and block
C&C traffic active attacks
based on
AV signatures, sources
Block malware and behaviors
Files
Prevent drive-by-
downloads
WildFire
Detect unknown Block new C&C
malware traffic
Adapt to Day-0 threats
WildFire
Cloud
On-Prem