firepower services - key features 061615

1
FireSight Manager Cisco Talos Talos is backed by sophisticated infrastructure and systems that provide exceptional visibility from the aggregation and analysis of unrivaled telemetry data. The result is a security intelligence cloud producing "big intelligence" and reputation analysis that track threats across networks, endpoints, mobile devices, virtual systems, web, and email. This provides a holistic understanding of threats, their root causes, and scopes of outbreaks, translating into leading security effectiveness for Cisco security solutions. The team's expertise spans software development, reverse engineering, vulnerability triage, malware investigation, and intelligence gathering. 1 FirePower Services FirePower Services - Conceptual View Advanced Next-Generation Threat Protection Advanced Threat Security Intelligence Advanced Malware Cisco Collective Security Intelligence - Billions of web requests and emails - Millions of malware samples - Open Source data sets - Millions of network intrusions 1 Snort.org, ClamAV, Razorback & SpamCop 2 Policy L3/4, App Ctrl, Geo & URL Next-Gen IPS Security Intelligence AMP IoCs Multi-Vector Correlation AMP Endpoint 3 8 9 5 6 7 FireSight Technologies BEFORE DURING AFTER Visibility 4 Open Source Communities These "non-proprietary" communities provide an invaluable source of development significantly enhancing advance detection and protection capabilities. Talos maintains the official rule sets and communities of Snort.org, ClamAV, SenderBase.org and SpamCop. 2 ThreatGrid ThreatGRID securely crowd-sources malware from a closed community providing a global view of malware attacks, campaigns and their distribution. You can quickly correlate a single sample’s characteristics against millions of other samples to fully understand its behaviors in a historical and global context to effectively defend against the broadest variety of threats and minimize attacks. 3 Cisco AMP for Networks AMP for Networks continuously monitors, analyzes, and records all file activity, regardless of disposition, even after initial inspection at the network control point. If AMP observes suspicious or malicious activity, or if a previously deemed “good” file turns “bad,” security teams are sent a retrospective alert and an indication of compromise. AMP also provides visibility into exactly what happened. Security teams can see the complete recorded history of the threat, essentially rolling back time on malware, and quickly get answers to crucial security questions, such as: Where did the malware come from? What systems were affected? What is the threat doing? How do we stop it? IoCs Multi-Vector Correlation Sophisticated attackers exploit multiple vectors often with blended threats that combine various evasive methods such as phishing emails, innocuous payloads, stealthy network profiling, infrequent call outs, etc. - having the ability to correlate and tabulate suspect behaviors across the varied attack planes, integrating network and file level activity, allows enhanced accuracy and earlier identification of infected hosts. 8 AMP Endpoint and Correlation Point-in-time detection alone will never be 100 percent effective. It takes only one threat that evades detection to compromise your environment. Using targeted context-aware malware, sophisticated attackers have the resources, expertise, and persistence to outsmart point-in-time defenses and compromise any organization at any time. Furthermore, point-in-time detection is completely blind to the scope and depth of a breach after it happens, rendering organizations incapable of stopping an outbreak from spreading or preventing a similar attack from happening again. Cisco AMP for Endpoints goes beyond point-in-time detection, delivering a lattice of detection capabilities combined with big data analytics, to continuously analyze files and traffic on endpoints to determine if advanced malware is present (Figure 2). Sophisticated machine-learning techniques evaluate more than 400 characteristics associated with each file to analyze and block advanced malware. The combination provides protection that goes beyond traditional point-in-time detection. Retrospective security, the ability to roll back time on attacks, can detect and alert you to files that become malicious after the initial point of entry. 9 FireSight Technology Context may be the single most important factor in evaluating threats and reducing noise. FireSight is the industry's only Security solution to passively learn volumes of data about each unique environment we protect. This includes host information, vulnerabilities, web applications, files, client applications, to name a few. This rich information is leveraged for dynamic tuning, impact assessment and correlation. The data is visualized in FireSight Manager [Context Explorer]. 4 Next-Generation IPS The FirePOWER Next-Generation IPS (NGIPS) solution sets a new standard for advanced threat protection by integrating: Real-time contextual awareness, Intelligent security automation, Superior performance, Flexible deployment options and 30k plus rules. No other solution on the market today offers the visibility, automation, flexibility, and scalability required to protect today’s dynamic network environments against increasingly sophisticated threats. 5 Security Intelligence Threat intelligence (IP Reputation) is essential at examining outbound communications to identify malicious activity. Powered by Talos, Security Intelligence provides blacklisting and alerting / blocking botnets, attackers, spam sources and other malicious destinations. 6 Intrusion Prevention - FireSight Contextual Awareness - Intelligent Automation - Impact Assessment IP Reputation - Detect Compromised Hosts (CnC, Botnet, IRC, etc.) File Reputation - Heuristics - Forensic Analysis - Threat Feeds - Retrospection Centralized Management - Context Visualization - Provisioning - Reporting - Analyst Dashboards Deployment Options: - Appliance - ASA-X - ISR (UCS-E) - Virtual 7

Upload: anthony-lobosco

Post on 16-Dec-2015

10 views

Category:

Documents


0 download

DESCRIPTION

Cisco Security

TRANSCRIPT

  • FireSight Manager

    Cisco TalosTalos is backed by sophisticated infrastructure and systems that provide exceptional visibility from the aggregation and analysis of unrivaled telemetry data. The result is a security intelligence cloud producing "big intelligence" and reputation analysis that track threats across networks, endpoints, mobile devices, virtual systems, web, and email. This provides a holistic understanding of threats, their root causes, and scopes of outbreaks, translating into leading security effectiveness for Cisco security solutions. The team's expertise spans software development, reverse engineering, vulnerability triage, malware investigation, and intelligence gathering.

    1

    FirePower Services

    FirePower Services - Conceptual ViewAdvanced Next-Generation Threat Protection

    Advanced Threat

    SecurityIntelligence

    Advanced Malware

    Cisco Collective Security Intelligence- Billions of web requests and emails- Millions of malware samples- Open Source data sets- Millions of network intrusions

    1

    Snort.org, ClamAV,

    Razorback & SpamCop

    2

    PolicyL3/4, App

    Ctrl, Geo & URL

    Next-GenIPS

    Security Intelligence AMP

    IoCsMulti-VectorCorrelation

    AMPEndpoint

    3

    8

    9

    5 6 7

    FireSight Technologies

    BEFORE DURING AFTER

    Visibility4

    Open Source CommunitiesThese "non-proprietary" communities provide an invaluable source of development significantly enhancing advance detection and protection capabilities. Talos maintains the official rule sets and communities of Snort.org, ClamAV, SenderBase.org and SpamCop.

    2

    ThreatGridThreatGRID securely crowd-sources malware from a closed community providing a global view of malware attacks, campaigns and their distribution. You can quickly correlate a single samples characteristics against millions of other samples to fully understand its behaviors in a historical and global context to effectively defend against the broadest variety of threats and minimize attacks.

    3

    Cisco AMP for NetworksAMP for Networks continuously monitors, analyzes, and records all file activity, regardless of disposition, even after initial inspection at the network control point. If AMP observes suspicious or malicious activity, or if a previously deemed good file turns bad, security teams are sent a retrospective alert and an indication of compromise. AMP also provides visibility into exactly what happened. Security teams can see the complete recorded history of the threat, essentially rolling back time on malware, and quickly get answers to crucial security questions, such as: Where did the malware come from? What systems were affected? What is the threat doing? How do we stop it?

    IoCs Multi-Vector CorrelationSophisticated attackers exploit multiple vectors often with blended threats that combine various evasive methods such as phishing emails, innocuous payloads, stealthy network profiling, infrequent call outs, etc. - having the ability to correlate and tabulate suspect behaviors across the varied attack planes, integrating network and file level activity, allows enhanced accuracy and earlier identification of infected hosts.

    8

    AMP Endpoint and CorrelationPoint-in-time detection alone will never be 100 percent effective. It takes only one threat that evades detection to compromise your environment. Using targeted context-aware malware, sophisticated attackers have the resources, expertise, and persistence to outsmart point-in-time defenses and compromise any organization at any time. Furthermore, point-in-time detection is completely blind to the scope and depth of a breach after it happens, rendering organizations incapable of stopping an outbreak from spreading or preventing a similar attack from happening again.

    Cisco AMP for Endpoints goes beyond point-in-time detection, delivering a lattice of detection capabilities combined with big data analytics, to continuously analyze files and traffic on endpoints to determine if advanced malware is present (Figure 2). Sophisticated machine-learning techniques evaluate more than 400 characteristics associated with each file to analyze and block advanced malware. The combination provides protection that goes beyond traditional point-in-time detection. Retrospective security, the ability to roll back time on attacks, can detect and alert you to files that become malicious after the initial point of entry.

    9

    FireSight TechnologyContext may be the single most important factor in evaluating threats and reducing noise. FireSight is the industry's only Security solution to passively learn volumes of data about each unique environment we protect. This includes host information, vulnerabilities, web applications, files, client applications, to name a few. This rich information is leveraged for dynamic tuning, impact assessment and correlation. The data is visualized in FireSight Manager [Context Explorer].

    4

    Next-Generation IPSThe FirePOWER Next-Generation IPS (NGIPS) solution sets a new standard for advanced threat protection by integrating: Real-time contextual awareness, Intelligent security automation, Superior performance, Flexible deployment options and 30k plus rules. No other solution on the market today offers the visibility, automation, flexibility, and scalability required to protect todays dynamic network environments against increasingly sophisticated threats.

    5 Security IntelligenceThreat intelligence (IP Reputation) is essential at examining outbound communications to identify malicious activity. Powered by Talos, Security Intelligence provides blacklisting and alerting / blocking botnets, attackers, spam sources and other malicious destinations.

    6

    Intrusion Prevention- FireSight Contextual Awareness- Intelligent Automation- Impact Assessment

    IP Reputation- Detect Compromised Hosts (CnC, Botnet, IRC, etc.)

    File Reputation- Heuristics- Forensic Analysis- Threat Feeds - Retrospection

    Centralized Management- Context Visualization- Provisioning- Reporting- Analyst Dashboards

    Deployment Options:- Appliance- ASA-X- ISR (UCS-E)- Virtual

    7