Context-aware Security from the Core 1 | 2017

Context-aware Security from the Core 1 |  2017

Context-aware Security from the Core 1 | 2017 Infoblox Inc. All Rights Reserved. Agenda Changing Network Dynamics Closing the DNS Gap Infoblox Solutions Why Infoblox Hands on lab introduction 2 | 2017 Infoblox Inc. All Rights Reserved. Evolving Network Environment and Paradigm Shifts... Active Internet Users Connected Devices

Network Evolution Digital Transformation Internet of Things 3.4 Billion1 Active internet users worldwide in 2016, +25% over last year 21 Billion2 Connected devices by 2020, +30% over last year Networks are being transformed Cloud, SDN, others Digital transformation is happening faster than you think

New trends like IoT are increasing the attack surface 1. 2. 3. 3 Internet Live Stats (http://www.internetlivestats.com/internet-users/) http://www.cnbc.com/2016/02/01/an-internet-of-things-that-will-number-ten-billions.html https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf | 2017 Infoblox Inc. All Rights Reserved. ...Are Leading to Increased Exposure to Cyber Threats Organizations are facing an unprecedented challenge of data breaches 4 | 2017 Infoblox Inc. All Rights Reserved.

Products Galore: Solutions Missing 400+ VENDORS 5 | 2017 Infoblox Inc. All Rights Reserved. DNS The Critical Yet Vulnerable Asset i 6 | 2017 Infoblox Inc. All Rights Reserved. The DNS Gap A Multi Dimensional Threat Vector Making Your Infrastructure Work Against You 78%

DNS: most common Of reflection/amplification application layer attacks1 attacks use DNS1 $4M The Leading Culprit in Data Exfiltration Average consolidated cost of a data breach3 91% APT/Malware Proliferation Rooted in DNS Ineffective Threat Intelligence 7 1. 2. 3. 4.

| 84% Of malware uses DNS to carry out campaigns5 70% of survey respondents that felt Threat Intel is not timely8 Arbor WISR2016 Report Ponemon Institute Study The Cost of Denial-of-Service Attacks. March 2015 Source: Ponemon Institute, 2016 Cost of Data Breach Study Source: SC Magazine, Dec 2014, DNS attacks putting organizations at risk, survey finds 2017 Infoblox Inc. All Rights Reserved. >$500 Per min cost of downtime due to DDoS attack2 46% % of survey respondents that experienced DNS data exfiltration4

431M New unique pieces of malware in 20156 46% % of survey respondents unable to prioritize the threat by category8 $1.5M Average cost per year to deal with DNS attacks2 45% % of survey respondents that experienced DNS tunneling4 #1 Malware C&C is #1 responsible vector for crimeware7 45% % of survey respondents lacked context

for threat intel to make it actionable8 1. Verizon 2016 Data Breach Investigations Report 2. Source: Ponemon Institute, 2015 Second Annual Study on Exchange Cyber Threat Intelligence Three Aspects of Security #1 #2 Infrastructure Protection Data Protection and Malware Mitigation Better Application and Service Availability 8 | 2017 Infoblox Inc. All Rights Reserved. Protect Users and Data #3

Threat Containment and Operations Efficiency & Optimization of Security Operations Why Infoblox? 9 | 2017 Infoblox Inc. All Rights Reserved. Multipronged Approach to Threat Detection Reputation Signature Behavior Detect & Prevent communications to malware, C2, Ransomware Infrastructure protection for critical core services

Patented Streaming Analytics Technology Carrier-grade deep packet inspection Detect & Prevent Data Exfiltration Instant identification of popular tunneling tools Machine Learning Government-grade Threat Intelligence Ecosystem 10 | 2017 Infoblox Inc. All Rights Reserved. Leverage Threat Intel Across Entire Security Infrastructure Infoblox C&C IP List

CSV File SURBL Phishing & Malware URLs JSON Spambot IPs RBL Zone File C&C & Malware Host/Domain RPZ TIDE Define Data Policy, Governance & Translation Marketplace Custom TI W WW

DNS Dossier Investigate Threats RESULT: 11 | Single-source of TI management 2017 Infoblox Inc. All Rights Reserved. Faster triage S IE M Threat Prioritization Importance of a Robust, Scalable & Hybrid Architecture Your Public Cloud IaaS Infoblox Cloud ActiveTrust

Threat Intel HQ Grid Master (HA pair) Your Private Cloud IaaS Grid Master Candidate @Recovery Site Grid Member with DNS Firewall Network Insight Grid Member Reporting & Analytics Infoblox Grid Grid Member DNS / DHCP Edge Network/ Remote

Office DHCP 12 | 2017 Infoblox Inc. All Rights Reserved. Grid Member DNS / DHCP Branch Office Microsoft DNS, DHCP Lets see it in action Welcome to the hands-on-lab 13 | 2017 Infoblox Inc. All Rights Reserved. to Engagement NextPath Steps Try Our Products Free of Cost & Risk

ActiveTrust Cloud eval ActiveTrust (on-premises) eval Security(PCAP) assessment Engage with Infoblox to discuss your security architectures 14 | 2017 Infoblox Inc. All Rights Reserved. Next Steps 15 | 2017 Infoblox Inc. All Rights Reserved.

Recently Viewed Presentations

  • Heat Transfer in Flux layers Using CON1D

    Heat Transfer in Flux layers Using CON1D

    Mold powders with higher solidification temperatures require less taper (due to lower heat flux). Extra length in Funnel In thin slab casting there is a taper induced by the change in perimeter of the wide face, because of the funnel...
  • Choice page Tudalen ddewis

    Choice page Tudalen ddewis

    www.wjec.co.uk - GCSE D&T. View all teaching specifications, Specimen assessment materials, Teacher Guidance documents, Principal Examiner reports for each Unit 1 focus area examination, Principal Moderator's report for Unit 2 CAT, Teachers' Assessment Materials and Guidance. www.wjecservices.co.uk (Centre specific account...
  • NvR slides - UKCAB

    NvR slides - UKCAB

    STALWART STALWART Follow-up monthly to w32 then every 4m until 12m after last patient randomised Primary outcome measure = Change in CD4 count from baseline to w32 Study powered to detect a 50 cell difference b/w arms (especially important for...
  • ACRP 02-70 Wetland Mitigation A Guidebook for Airports

    ACRP 02-70 Wetland Mitigation A Guidebook for Airports

    What is a wetland? U.S. Army Corps of Engineers (USACE) and U.S. Environmental Protection Agency (USEPA) define wetlands as: 3 …areas that are inundated or saturated by surface or groundwater at a frequency and duration sufficient to support, and that...
  • utsc.utoronto.ca

    utsc.utoronto.ca

    COLLECT: Browse more than 13,000 dates sets posted by StatCrunch members, or use the survey tool to collect data. CRUNCH: Quickly analyze data and interpret results using an exten
  • The Grenadines Biodiversity - OAS

    The Grenadines Biodiversity - OAS

    The St Vincent & Grenadines Forestry Department Marine Focus The Geology The origin Volcanic Caribbean Island Arc The Grenadine Bank A continuous shallow bank between The Grenadines and Grenada Approx. 34 Islands and Cays 8 Islands inhabited Climate Small Islands;...
  • ISSUES

    ISSUES

    Dangling modifiers are often caused by authors starting their sentences with -ing verbs. While it is not a rule that you can NEVER start a sentence this way, beware of dangling modifiers that may appear! Starting a sentence with an...
  • Recipe for Steel - ESP Specialty Steel

    Recipe for Steel - ESP Specialty Steel

    Recipe for Steel ("Pig Iron") Iron (or iron-bearing material) Coke (baked coal) Limestone. Oxygen and Water. Heat to 3400˚ F. Limestone promotes slag formation when the iron ore is melted. It combines with the acid impurities and floats to the...