Vous êtes sur la page 1sur 14

Want to Prevent Attacks?

Think Multi-layered Threat Prevention

[Protected] For public distribution 2012 Check Point Software Technologies Ltd.

[Protected] All rights reserved

Threat Landscape - 2012 & 2013

Exposed, Stolen Credentials and Personal Info


Utah Dept. of Health, 228,000 Social Security numbers exposed Facebook, 45,000 user credentials found on botnet C&C server Global Payments, 1.5M card numbers stolen University of Nebraska, 654,000 student, employee, parent and alumni personal information files exposed Yahoo, 450,000 Contributor Network user credentials stolen LinkedIn, 5.8M user passwords stolen eHarmony, 1.5M passwords stolen

News!: Facebook, Miicrosoft, and Apple attacked, February 2013


[Protected] For public distribution

Threat Landscape - 2012 & 2013

News!: Facebook, Miicrosoft, and Apple attacked, February 2013


[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
3

Could This Type of Attack Affect You?

This type of attack:

Launches from attachment that exploits vulnerability in a PDF or office file

Installs a custom built malware

Communicates with a C&C server


Sends files to attacker

[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

Check Point Multi-Layered Threat Prevention

IPS

Stops exploits of known vulnerabilities

Antivirus

Block download of malware infested files

Anti-Bot

Detect and prevent bot damage Stop zero-day malware in files

Threat Emulation

[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

Check Point Multi-Layered Threat Prevention

IPS

Stops exploits of known vulnerabilities

Protect Against:

Attacks on vulnerabilities Evasion Attacks Buffer Overflow Attacks Sniffers

[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

Check Point Multi-Layered Threat Prevention

Antivirus

Block download of malware infested files

Stop Incoming Malware Attacks

Protect with 300x More Signatures with ThreatCloud

Prevent Access to Malicious Sites

Over 1 Million Malicious Sites

[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

Check Point Multi-Layered Threat Prevention

Anti-Bot

Detect and prevent bot damage

Criminals Hideout

Criminals Communication

Criminals Behavior

Detect Command and Control IP/URL/DNS

Detect unique communication patterns

Detect attack signs and types (spam, click fraud)

[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |

Prevent Bot Damage


Infected Machine Detected
Anti-Bot Software Blade

Block Bot Communication

Only stop traffic between infected hosts and remote operator


[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
9

Check Point Multi-Layered Threat Prevention

IPS

Stops exploits of known vulnerabilities

Antivirus

Block download of malware infested files

Anti-Bot

Detect and prevent bot damage

What about new types of Attacks?


[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
10

INSPECT

EMULATE

SHARE

PREVENT

Stop new attacks with

Check Point Threat Emulation


[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
11

Back to our Attack Example

Attack actions are stopped


Exploits vulnerability Downloads more malware Communicates with a C&C server Sends files to attacker

Check Point IPS Software Blade

Check Point Antivirus Software Blade

Check Point Anti-Bot Software Blade

New Threats ? Check Threat Emulation Software Blade


[Protected] For public distribution 2013 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. |
12

Multi-Layer Threat Prevention Enhanced by ThreatCloud

Real-time collaboration on new attack information


[Protected] For public distribution 2012 Check Point Software Technologies Ltd.
| [Protected] All rights reserved |

13 13

Thank You

Come to the Booth for a Live Demo


2012 Check Point Software Technologies Ltd. | [Protected] All rights reserved

Vous aimerez peut-être aussi