hexis hawkeye g machine speed defense. rsa usa 2015

17
Machine Speed Defense

Upload: hexis-cyber-solutions

Post on 26-Jan-2017

339 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Machine Speed Defense

Page 2: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 2

Page 3: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 3

“Godzilla”

Page 4: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 4 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 4

Why machinespeed defense?

Copyright source: http://writing-the-wrongs.blogspot.com/2011_03_01_archive.html

Page 5: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 5 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 5

Cost per compromise;

up 28%

Wasted hours chasingdown false alerts

$11.3 M 395/wkAverage time

to detect a threat

240 Days

Page 6: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 6 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 6

Deborah PlunkettHead of US NSA’s Information Assurance Directorate“We have to build our systems on the assumption

that adversaries will get in.”

Page 7: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 7 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 7

Jon OltsikESG Principal Analyst

“To truly gain an advantage against attackers,security and IT teams need to adopt a proactive approach

to incident response with policy-based automation.”

Page 8: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 8 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 8

How do wemake automation real?

Page 9: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 9 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 9

Detect Verify Remove

Continuous Automated Threat Removal

Page 10: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 10 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 10

HawkEye G Manager

HexisThreat Feed

HawkEye GNetwork Sensor

Detect

Detection InformationMultiple Sources

Third-Party Integrations

FireEye® NX

PAN NGFW + WildFire®

19

HawkEye GHost Sensor

174

Page 11: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 11 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 11

Verify

Introducing ThreatSync™

HexisThreat Feed Third-Party Integrations

HawkEye GNetwork Sensor

Threat FusionThreat AnalyticsIndicator Scoring

Device Incident ScoreThreatSync

FireEye® NX

PAN NGFW + WildFire®

HawkEye GHost Sensor

Page 12: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 12 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 12

HexisThreat Feed Third-Party Integrations

HawkEye GNetwork Sensor

Remove

Policy ManagerCountermeasures

KillQuarantine

BlockExpire

ForensicsFuture

ThreatSync

FireEye® NX

PAN NGFW + WildFire®

HawkEye GHost Sensor

SurgicalAutomatic

Machine Guided

Page 13: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 13 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 13

HexisThreat Feed Third-Party Integrations

HawkEye GNetwork Sensor

Remove

Policy ManagerCountermeasures

KillQuarantine

BlockExpire

ForensicsFuture

ThreatSync

+

FireEye® NX

PAN NGFW + WildFire®

HawkEye GHost Sensor

Page 14: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 14 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 14

Network World: Rated 4.875

Page 15: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 15

What is the key advantage of Continuously and Automatically Removing Threats at Machine Speed?

a. Dramatically reduces time to respond to

threatsb. Force multiplier for incident responders c. Reduces the chance of data lossd. Increases visibilitye. All of the above

???Trivia Question:

Page 16: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 16

What is the key advantage of Continuously and Automatically Removing Threats at Machine Speed?

a. Dramatically reduces time to respond to

threatsb. Force multiplier for incident responders c. Reduces the chance of data lossd. Increases visibilitye. All of the above

???Trivia Question:

Page 17: Hexis HawkEye G Machine Speed Defense. RSA USA 2015

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 17 Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved.

Page 17

Thank you.Please stop by the HawkEye G demo

station.