+ All Categories
Home > Technology > Cognitive Security - Corporate Introduction ('12)

Cognitive Security - Corporate Introduction ('12)

Date post: 08-May-2015
Category:
Upload: gabriel-dusil
View: 1,747 times
Download: 1 times
Share this document with a friend
Description:
Download the original PowerPoint version here: http://gdusil.wordpress.com/2012/06/30/cose-corporate-introduction/ Check out my blog "Multiscreen & OTT for the Digital Generation" @ gdusil.wordpress.com. Corporate leaders face complex challenges in balancing security spending against the evolving risks that internet commerce presents. This has resulted in new and advanced levels of protection needed to facilitate these strategic objectives. Expert Security addresses the need to implement more robust and cost effective levels of expertise, and also helps to bridge the gap to higher, and more expensive - and often culturally adverse - outsourced solutions. As companies expand, their need for additional layers of protection it is paramount to ensure asset protection. Network Behavior Analysis are the building blocks of Expert Security, and offers a viable solution to modern sophisticated cyber-attacks. This presentation was prepared to outline our corporate overview and market positioning of Cognitive Security.
27
Gabriel Dusil VP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com [email protected]
Transcript
Page 1: Cognitive Security - Corporate Introduction ('12)

Gabriel Dusil VP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com [email protected]

Page 2: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 2, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Origins Research began in 2006 Company established in 2009 Funded by U.S. Army, Navy & Air Force

Experts in Network Behavior Analysis

Mission Providing detailed intelligence to detect

modern sophisticated network attacks

Headquarters Prague, Czech Republic & Silicon Valley, CA

Security Innovation

Page 3: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 3, www.cognitive-security.com

© 2012, gdusil.wordpress.com Verizon – ‘11 Data Breach Investigations Report

Point of Entry Compromise

50% attacks take days to months of reconnaissance for a successful breach

Compromise Discovery

70% of victims allow a breach to persist for weeks to months before detecting a compromise

Page 4: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 4, www.cognitive-security.com

© 2012, gdusil.wordpress.com

• Managed Security Services • Security Monitoring & Management

• Network Behavior Analysis • Anomaly Detection

• Web Security, Content Filtering • SIEM • Web-Application Firewalls • IDS & IPS • Vulnerability Management • IAM

• Firewalls • Email Security • Anti-Virus • VPN (SSL & IPsec)

SIEM = Security Information & Event Management)

IDS & IPS = Intrusion Detection & Prevention System

AAA = Authentication, Authorization, & Accounting

IAM = Identity & Access Management

VPN = Virtual Private Network, SSL = Secure Sockets Layer

Page 5: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 5, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Network Behavior Analysis Cost effective Expert Security for

enterprises, telcos & governments Important security layer & a higher

wall for modern-day protection

Firewall

email Security Web Security

IDS & IPS

Network Behavior Analysis

Security as a Service

Footprint reduction, scripts, etc.

APT, Zero-Day, Exploit Kits & Polymorphic malware…

Virus, Trojans, Span, etc.

Filtering, XXS SQL Inj., etc.

Attack Patterns malware, etc.

Page 6: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 6, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 7: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 7, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Cognitiv

e A

naly

st

Cost Effective & Robust Network Behavior Analysis for Enterprise

High Throughput Traffic Volumes - Telco, Mobile, ISP & NSP

High Resolution & Attack sensitivity - custom for Governments

Page 8: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 8, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Patching, 21%

Awareness, 7%

IAM, 11%

Audits, 8%

Malware Analysis, 14%

Threat Research,

8%

Incident Response,

12%

Vulnerability Analysis, 10%

Log Anal., 8%

Monitoring Employees,

4% Corporate Governance Device or Network Misconfig Restricted Apps, Policy Violations Irregular Behavior & Misuse

Diagnostics Support Vulnerability & Pen-testing Forensics Analysis Incident & Response

Advanced Cyber-Attacks Trojans, Botnets, C2 & Exploit Kits Spyware & Info leaks Brute Force & Insider Attacks Denial of Service (DoS) Polymorphic Malware

Modern Sophisticated Attacks Advanced Persistent Threats Reconnaissance & Sabotage Zero-Day Attacks

Responsibilities of a Security Administrator

Information Week - Strategic Security Survey '11

Patching, 21%

Awareness, 7%

IAM, 11%

Audits, 8%

Malware Analysis, 14%

Threat Research,

8%

Incident Response,

12%

Vulnerability Analysis, 10%

Log Anal., 8%

Monitoring Employees,

4%

Page 9: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 9, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 10: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 10, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 11: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 11, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 12: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 12, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Heavy DNS Use &

Sophisticated Scans Periodic

Polling - Command & Control

Unexpected new service

or Outlier Client Outbound

Encrypted sessions (eg. SSH)

Peer 2 Peer Network Behavior

Unclassified Behavior -

Unexpected Anomaly

Page 13: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 13, www.cognitive-security.com

© 2012, gdusil.wordpress.com

No Signatures! No Signature limitations Attackers will exploit:

• Delays in writing signatures • Delay to install new signatures • Clients ignoring updates due to

resource constraints

Cost Competitive Cost effective Expert Security

Artificial Intelligence Strength of 8 Detection Algorithms

• Highly Accurate Attack detection

Peer-Reviewed Algorithms • Tested by the scientific community

Long-Duration Trust Modeling • Analyzing current behavior against

past assessments

Unique Self-configuration • Challenge Agents ensures system

is operational

Hacker Circumvention Resistance • Game Theory optimization ensures

system behavior is not predicable

State-of-the-art Auto-Tuning • Minimal deployment resources

needed

Page 14: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 14, www.cognitive-security.com

© 2012, gdusil.wordpress.com

1 1

1 1 1

1

1

0 0

0

0 0

0 0

0 1 1 1

1 1 1

1

1

0 0

0

0 0

0 0

0 1

Page 15: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 15, www.cognitive-security.com

© 2012, gdusil.wordpress.com

1 1

1 1 1

1

1

0 0

0

0 0

0 0

0 1 1 1

1 1 1

1

1

0 0

0

0 0

0 0

0 1

Page 16: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 16, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Cognitive Analyst classifies trustfulness of data, then

is separated from

Then further separated into…

assessed into over event categories, & into severity levels

which can not be immediately classified

Page 17: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 17, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Comparing Near real-time data to the past Historical threat data is

incorporated to detect sophisticated attacks

Using the most sophisticated self-learning techniques in the Security Industry today Using 8 independent

Anomaly Detection Algorithms

Aggregating multiple threat sources into clusters

Severity 8

Normal

Unclassified

Page 18: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 18, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Severity Assignment

Layer

Event Generation

Layer

Trustfulness Assessment

Layer

Ne

twork

Tra

ffic

Unclassified Behavior

. . .

CTS = Cognitive Trust Score

CognitiveTrustScore

Knowledge Fusion

TrustModeling

Detection Algorithms

Al1 → 0.7TM1 → 0.5

Al2 → 0.2

Al3 → 0.9TM2 → 0.7

CTS→ 0.7Al4 → 0.4

Al5→ 0.3TM3 → 0.4

Al6 → 0.2

Al7 → 0.4TM4 → 0.6

Al8 → 0.5

Page 19: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 19, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Artificial Intelligence • Continually tunes to the client’s

environment • Highly accurate by combining

several advanced algorithms Auto-Learning Engine

• Self-Optimizing

Scalable Architecture • Decentralized & Distributed • Parallel Processing for attack

detection in high speed networks

(hh:mm) Start

System connected to network data source

Self-Initialization

2 Algorithms

3 Algorithms

Self-Configuration

all Algorithms

Online

Self-Optimization

Knowledge Fusion - active

Page 20: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 20, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 21: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 21, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Pharma Chemical

Defence Energy, Oil&Gas

Finance Manufacturing

Mobile

ISP & NSP

Hosting

Defence

Intelligence

Utilities

Cognitive1 Cognitive10 CognitiveExpert

Behavior Monitoring

Expert Services

Distribution

Bronze Silver Gold Platinum

Consulting Training Forensics

Advanced Threat Diagnostics

Attack Forensics Detecting Modern Sophisticated Attacks

Appliance VM or ISO Image Software

R&D Software Development Research

Security Monitoring Services

Fraud Theft of Corporate Secrets

Sabotage Terrorism

Government Sponsored Attacks

Downtime Lost Productivity Tarnished Image

Page 22: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 22, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 23: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 23, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Security Innovation Delivering Forward-thinking

Security Solutions Thought Leadership

R&D Expertise Cost-effective Research &

Development resources Quick development turn-around Flexible integration with OEMs,

MSSPs, & device manufacturers

Intuitive Management Interface Easy-to-Use Dashboard Granular attack detection analysis

Product Reliability 5th Generation Network Behavior

Analysis platform

Privacy Concerns Data anonymity is maintained

Page 25: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 25, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Page 26: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 26, www.cognitive-security.com

© 2012, gdusil.wordpress.com

• Corporate leaders face complex challenges in balancing security spending against the evolving risks that internet commerce presents. This has resulted in new and advanced levels of protection needed to facilitate these strategic objectives. Expert Security addresses the need to implement more robust and cost effective levels of expertise, and also helps to bridge the gap to higher, and more expensive - and often culturally adverse - outsourced solutions. As companies expand, their need for additional layers of protection it is paramount to ensure asset protection. Network Behavior Analysis are the building blocks of Expert Security, and offers a viable solution to modern sophisticated cyber-attacks. This presentation was prepared to outline our corporate overview and market positioning of Cognitive Security.

Page 27: Cognitive Security - Corporate Introduction ('12)

Experts in Network Behavior Analysis Page 27, www.cognitive-security.com

© 2012, gdusil.wordpress.com

Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis, Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident Response, Security as a Service, SaaS, Managed Security Services, MSS, Monitoring & Management, Advanced Persistent Threats, APT, Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern Sophisticated Attacks, MSA, Non-Signature Detection, Artificial Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive Security, Cognitive Analyst, Forensics analysis


Recommended