virtualizing network services for personal use only · target’s network. failed to respond to...

29
Virtualizing Network Services Copyright © 2015, iWebGate. All Rights Reserved. For personal use only

Upload: others

Post on 26-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Virtualizing Network Services

Copyright © 2015, iWebGate. All Rights Reserved.

For

per

sona

l use

onl

y

Page 2: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Corporate Snapshot

Share  Price  (as  at  5  March  2015)   A$/share   $0.37  

Issued  capital   m  shares   598.8  

Shares  escrowed  un8l  Dec  2016   m  shares   308.0  

Fully  Diluted  Market  CapitalisaBon   A$m   $221.6  

Cash   A$m   $2.9  

Debt   A$m   $1.3  

Enterprise  Value   A$m   $220.0  

Shares  held  by  Directors   m   120.0  

Es8mated  Free  Float   %   48%  

Chairman   Adam  Sierakowski  

Execu8ve  Director  and  CEO  –  USA   Tim  Gooch  

Managing  Director  –  Asia  Pacific   Mark  Harrell  

Date   Amount  Raised   Raising  Price  

December  2014   A$5.0m   A$0.40  

March  2014   A$1.0m   A$0.16  

December  2013   A$0.75m   A$0.04  

Market  Data   Share  Price  Performance  

Directors  and  Management   Prior  Capital  Raisings  

Note:  iWebgate  Limited  (IWG)  listed  on  the  ASX  in  December  2014  through  a  reverse  takeover  of  MyATM  Holdings  Limited  (MYA)1  

0.0

2.0

4.0

6.0

8.0

10.0

12.0

14.0

16.0

$0.00

$0.10

$0.20

$0.30

$0.40

$0.50

$0.60

$0.70

$0.80

Volu

me

(mm

)

Shar

e Pr

ice

(A$)

Volume Share Price

Note 1: The vendors of iWebGate controlled 81% of IWG post-reverse takeover

For

per

sona

l use

onl

y

Page 3: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Market Perception

#1: Firewalls are Safe

so they must be safe #2: We Setup Our Networks #3: Other friendly networks

don’t present a risk

?

For

per

sona

l use

onl

y

Page 4: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Firewall & VPN Epidemic

Primary / Core Network

More Devices (weak points)

Inadequate Network Segregation

VPNs

Dark Side:

Security & Apps Installed on the Network

For

per

sona

l use

onl

y

Page 5: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Universal Problem

Immature Network Segmentation

For

per

sona

l use

onl

y

Page 6: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Principle of Separation

or For

per

sona

l use

onl

y

Page 7: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Market Opportunity

Poor

Segregation

Inadequate  Security  

Cost  &  Complexity  

Asset  Transfer  

Highly  Inefficient  

SMEs

Large Enterprise

Cloud Networks

On-Premise Networks

For

per

sona

l use

onl

y

Page 8: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Segregate (layer) Networks

Primary / Core Network

Network In Front of

Existing Network

Sub Network

proper segmentation using:

- Emulated Services

- Gateways

- Proxies

One Software Platform

For

per

sona

l use

onl

y

Page 9: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Global Awards

iWebGate was recently granted a patent from the United States Patent and Trademark Office (USPTO) for its Virtual Invisible Networking (VIN) technology. The Virtual Services Platform (VSP) patent is currently under review by the USPTO. Industry awards include but are not limited to:

Worldwide Winner

National Winner

International Winner

$2m Grant 1st International Company accepted into Cyber Incubator

Global Security Challenge

Telstra Innovation Challenge

Asia Pacific ICT Alliance

(APICTA)

Commercialisation Australia

Northrop Grumman (USA)

For

per

sona

l use

onl

y

Page 10: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

US Government

Implementing a sub-network in a Demilitarized Zone (DMZ) to separate an enterprise’s private / primary networks from all other networks including the Internet has been recognized as an industry “best practice”.

1.  The cost of server hardware, software and system administration has placed a proper DMZ sub-network beyond the reach of almost all SMEs and encouraged other enterprises with highly fragmented and widely distributed networks to cut corners

2.  The current VPN approaches circumvent the DMZ sub-network defensive layer

For

per

sona

l use

onl

y

Page 11: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

CA Outcomes

Indirect to Market Channel Partners

Cloud Deployment

1)  Organisations touching the networks (iaas, telco, isp, data centre) 2)  Strategic network partners (primes) 3)  Software developers

1)  Major cloud providers 2)  Needed to punch through firewalls (VPN was extremely restrictive) F

or p

erso

nal u

se o

nly

Page 12: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Network In Front

Deceives Attackers

No Direct Exposure

New Area of Attack For

per

sona

l use

onl

y

Page 13: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Many Attack Vectors

Source: Verizon 2014 Data Breach Investigations Report

For

per

sona

l use

onl

y

Page 14: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Defense In Depth

Old Thinking

For

per

sona

l use

onl

y

Page 15: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Cyber Kill Chain

Passive Search

Org Charts

IPs

Port Scans

Service Providers

External Hosts

Payload Creation

Malware

Delivery System

Spear Phishing

Infected Website

Service Provider

Vulnerability

Poor Configuration

Weapon Activation

Establish Foothold

3rd Party Compromise

Trojan or Backdoor

Establish Persistence

Escalate Privileges

Acquire Usernames

and Password

Channel to Target

Lateral Movement

Internal Recon

Maintain Persistence

Further Compromise

Additional Persistence

Data Exfiltration

Recon   Weaponize   Delivery   Exploita8on   Installa8on   Command  &  Control  

Ac8ons  on  Objec8ves  

New Thinking

Problem … Many Systems Required

For

per

sona

l use

onl

y

Page 16: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Target - Kill Chain Analysis F

or p

erso

nal u

se o

nly

Page 17: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Target - Key Findings

Gave network access to a small third-party vendor with weak security, allowing attackers to gain a foothold in Target’s network.

Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers were installing malware.

Attackers appear to have successfully moved from less sensitive areas of Target’s network to areas storing consumer data. Failed to properly isolate its most sensitive network assets.

Failed to respond to multiple warnings from the company’s anti-intrusion software regarding the escape routes used to exfiltrate data.

SME – Weakest Link

Analysis Paralysis

Poor Segregation

Lack of Resources

Outcome:

CEO stepped down

Many C-Level execs fired

40m credit cards stolen

70m personal records stolen

46% drop in profits

$260m financial loss

$100m terminal upgrade

For

per

sona

l use

onl

y

Page 18: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

No Boundaries

Networks, connections, devices and data must be properly segregated

For

per

sona

l use

onl

y

Page 19: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Segregate Connectivity

Segregate Devices

LaunchPad Segregate Networks

Virtual Services Suite F

or p

erso

nal u

se o

nly

Page 20: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Virtualization History

Nicira – raised $50m, acquired by VMware for $1.26b in 2012

Inseime - $135m funded start up, acquired by Cisco for $863m in Nov 2013

Contrail – startup acquired by Juniper for $176m in Dec 2012

1998

Network Services Virtualized

2007 2014

Multi $Billion Market

Networks Virtualized (SDN)

Servers Virtualized

For

per

sona

l use

onl

y

Page 21: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Virtualization Process

Virtualize Servers

Virtualize Networks

Set & Forget

Virtualize Network Services

For

per

sona

l use

onl

y

Page 22: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Automated Processes

Primary / Core Network

Segregate Networks (software abstraction)

Security

Enterprise Apps

For

per

sona

l use

onl

y

Page 23: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

3rd Party Integration

We are not just making a computer networking product. We are combining the

skills of diverse people to make something no one person or company can create alone.

For

per

sona

l use

onl

y

Page 24: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Workspace Suite Providers

iWebGate will aim to build value by addressing this space

Possible recognition by competitors and/or new market entrants

For

per

sona

l use

onl

y

Page 25: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

2015 Targets

Virtual Services

separate all networks

Create the Best

Network Segregation Product

3 ISPs | 3 Strategic Resellers | 6 Major Software Partners

For

per

sona

l use

onl

y

Page 26: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Pricing Model (example)

Secure Proxy LP

$30+ per host / month

No Up Front Fees

MFA: 20c per active user

Filter Layer Revenue+

Add-on Security: $2k+

Desktop Connect LP

$10 per user / month

No Up Front Fees

MFA: 20c per active user

Custom Branding

? Freemium Model

VPN LP

$10 per user / month

No Up Front Fees

MFA: 20c per active user

Custom Branding

Replaces VPN

Additional Revenue:

Mobile Device Management

$5 per user / month

No Up Front Fees

Device Authentication

Cross Platform

App Integration

Third Party Licenses (Add-Ons), Large Enterprise Deployments, System Integration, Consultancy, Customization

1: 8+ (license : service ratio)

For

per

sona

l use

onl

y

Page 27: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Pricing Example

By way of example, if we sell to a reseller or organisation with 7,000 users, iWebGate’s technology could be deployed across many different networks for a broad range of services. Assuming four services were adopted using iWebGate’s technology, the average revenue per month per user of $17 is extrapolated as follows:

File Backup $35k per month VPN LP $35k per month Desktop Connect $35k per month Multi Factor Authentication $14k per month TOTAL - $119k per month For

per

sona

l use

onl

y

Page 28: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Current Possibilities

Rapid and scalable deployment of:

§  Desktop connectivity

§  Virtual networking (VPN replacement)

§  Proxy security (forward & reverse)

§  File filtering and sharing

§  Single sign on access

§  Multi factor authentication

§  Encrypted VoIP

§  Behavioral Analysis

§  Advanced persistent threat

§  Enterprise ‘Ready’ mobility applications For

per

sona

l use

onl

y

Page 29: Virtualizing Network Services For personal use only · Target’s network. Failed to respond to multiple automated warnings from the company’s anti-intrusion software that the attackers

Current Focus

SecureState

Skyscraper (IWG data storage)

Telstra

Northrop Grumman

Antecea

Haitech

For

per

sona

l use

onl

y