גיא אילון websense
Post on 03-Jul-2015
185 Views
Preview:
TRANSCRIPT
© 2010 Websense, Inc. All rights reserved. web security | data security | email security
Modern Security Game
Being Outside and feeling Inside
Being Safe Everywhere
Guy Eilon – Websense Mediterranean Regional Manager
Web Technology Trends
Along with Web 2.0, however, comes new risk as traditional URL
filtering and antivirus are rendered ineffective.
Employees are working from everywhere
Dynamic, interactive Web 2.0 technologies have transformed
the Web into a core business application platform
© 2010 Websense, Inc. All rights reserved.
Blocking access is not the answer – increasingly the business needs broad
Web access to compete and enable employees to get the job done.
Data now lives outside your network, more
so if you use SaaS applications.
Web
Tra
ffic
Source: Alexa Internet, Inc. , January 2010
• Constantly changing content
• Billions of varied pages per site
• Web 2.0 attacks are here
• Data Leakage problems with bad business
practices
• Advanced Persistent Threats using Web 2.0
• Current events, regional, genre sites
• Less user-generated content
• Highest volume of compromised sites
• Junk, personal, scam, adult, etc.
• Million of new sites appear daily
• Targeted attacks hosted here
and send their data here
Today’s Webscape
3© 2009 Websense, Inc. All rights reserved.
Static URL Filtering is Dead
Gambling
Social
Networking
Inappropriate
Content
Video or Audio
Streaming
Auctions
© 2010 Websense, Inc. All rights reserved.
Understanding the URL is not enough. You must understand
and control the content on the page.
Traditional URL
filters, classify
this as “Search”
Is it really?
Without Websense
6
With Websense
7
Antivirus Can’t Keep Up
http://securitylabs.websense.com/
© 2010 Websense, Inc. All rights reserved.
Number of Web viruses not detected by top 5 AV engines each day
AV is a baseline “known threat” Web security layer – but AV alone is not the solution
No AV protections
exist for hundreds of
emergent threats
each day
Compromised Sites
71% of Malicious Websites
are compromised websites
Just 1 attack = 82,000
compromised sites!
©2010 All Rights Reserved. Websense, Inc. 10
Threats Span Multiple Vectors
Email with URL Website downloads
Trojan malware
Confidential data
harvested
Hacker collects
data from web
site
User visits
popular site
Website downloads
Trojan malware
Confidential data
harvested
Hacker collects
data via IRC chat
USB dropped in
car park
Confidential data
harvested
Hacker collects
data with SMTP
engine
© 2010 Websense, Inc. All rights reserved.
Example 1 – Blended Threat
12
Example 2 – Social Network scams
13
Don’t Trust Search Results
14
User Trust Targeted Attacks
13.7 percent of searches for
trending news/buzz words (as
defined by Yahoo Buzz & Google
Trends) will lead to malware.
Search engine optimization (SEO)
poisoning attacks target the top
searches enabling hackers to drive
traffic to their sites.
Threat Landscape
15
35 percent of malicious
Web attacks include
data stealing code
58 percent of data
stealing attacks are
conducted over the Web
Confidential Data Customer Data
Regulated Data Financial Data
The Issues you Face
Today’s Web is powerful and has strong business
value
The use of Web 2.0 technology has dramatically
expanded dynamic content and the attack surface
Our Users and Data lives Everywhere
Attackers are actively utilising the new Web in order
to get into your sensitive Data
Traditional security technologies are not effectively
addressing today’s issues
New detection methods are needed for modern
threats
© 2010 Websense, Inc. All rights reserved. 16
Rising Total Cost of Ownership
Websense
© 2010 Websense, Inc. All rights reserved. 18
Introducing…
What does this all lead to ???
?
The TRITON Architecture
ApplianceSaaS Software
WebSecurity
DataSecurity
EmailSecurity
Unified Content Security
Unified
Management
© 2010 Websense, Inc. All rights reserved.
Unified
Platform
Unified
Solution
The TRITON Unified Management
© 2010 Websense, Inc. All rights reserved.
TRITON: The First and Only TruHybrid™ Solution
On-premise
In-the-cloud
How Not to Unify Technology
© 2010 Websense, Inc. All rights reserved.
© 2010 Websense, Inc. All rights reserved. web security | data security | email security
New York
San Diego
Sao Paulo
Tokyo
SydneyCape
Town
Mumbai
London Headquarters
© 2010 Websense, Inc. All rights reserved. web security | data security | email security
New York
San Diego
Sao Paulo
Tokyo
SydneyCape
Town
Mumbai
London Headquarters
Unparalleled Visibility
Where Your Users are Going
Where Your Data is Going
Where You Are at Risk
Key Takeaways
Websense delivers the best security– The only solution with real-time protection
against zero-day and scripted malware
– The only solution with real-time content classification across all 95 categories
– Enterprise-class Security against Blended Threats including Web, Email and DLP
At the lowest cost of ownership– The only solution with unified management of
on-premise and SaaS deployment platforms
– The only unified Web, data, and email security solution
Websense is a strategic choice– Firmly established leadership across Web, data
and email segments
– Unified platform that can meet multiple challenges today and scale for tomorrow
© 2010 Websense, Inc. All rights reserved. 28
© 2010 Websense, Inc. All rights reserved. web security | data security | email security
…And remember
Your Data’s Security and
Your Web’s Security are
Critical Anywhere and at Anytime.
Websense Delivers
© 2010 Websense, Inc. All rights reserved. 30
top related