Bit9 7.2 + Carbon Black 4.2 Product Releases

Automate, or Die
Building a Continuous Response Architecture
Alon Sadeh
System Engineer
Mary Ann Fitzsimmons
Sales Director
©2014 Bit9. All Rights Reserved
Compromise is Inevitable
Breaches up
Days to
Discover*
Total cost of US
breaches
Discovered
Externally**
Attacker only has to be successful
once…but defender has to stop
of attacks
Million
Average Cost***
* M-Trends
** VDBIR
***Ponemon, Verizon
Hosts Compromised
Signature
available
DETECTION THRESHOLD
Goal for attacker is to
compromise as many
endpoints as possible
Time
Hosts Compromised
ADVANCED
OPPORTUNISTIC
Traditional Defenses Were Designed for Opp. Attacks
Signature
available (if ever)
DETECTION THRESHOLD
Goal for attacker is to
compromise as few
endpoints as possible
Time
?
70%
of Malware is
Used Only Once
Tailored Attacks Require
Tailored Defenses
Tailored Defenses Require Integration
AUTOMATE,
INTEGRATE, or DIE
Security
as a
unified process
vs
a collection of
solutions
Arm Your Endpoints!
Organizations continue to
spend a lot of money on
network security solutions, but
it’s the endpoint that is the
ultimate target of advanced
threats and attacks.
July 2014
Carbon Black: Industry’s Best ETDR Solution
First & only solution with continuous endpoint recording and live response
CONTINUOUS RECORDING
LIVE RESPONSE
CONTINUOUS endpoint recorder
IMMEDIATE endpoint threat isolation
INSTANT, aggregated threat intel.
LIVE endpoint investigation
COMPLETE kill chain analysis
REAL-TIME attack termination
CUSTOMIZED detection
COMPREHENSIVE threat remediation
Reduce Dwell Time By Prioritizing Data Collection
Breach Discovered
(attacker identified)
Compromised
Compromised
(attackerpresent)
present)
(attacker
Breach
Discovered
Recovered
(attacker
(attacker identified)
expelled)
Proactively collecting data here is
automated, efficient & conclusive
DWELL TIME
Recovered
(attacker expelled)
Reactively collecting data here is time
consuming, expensive & incomplete
Eliminate expensive data collection process
Optimize security team
Instant answers to complex IR questions
Avoid blind reimaging
Zero end-user/endpoint impact
Reduce dwell time
DWELL TIME
Expand Detection Beyond the Moment of Compromise
Traditional
Focus
Only See Individual
Detection Event
Missed without
continuous data
collection
You can’t know what’s
bad ahead of time
Lateral
Movement
& User
Accounts
Exfiltration
& Data
Gathering
Weeks to Months (Years)
Abnormal
Behavior
Prioritize Alerts with Data Collection & Threat Intelligence
Threat Intelligence
ALERT FATIGUE
ACTIONABLE ALERTS
Too many alerts to
manage & prioritize
Accelerate threat discovery
Customize detection for organization
Detect every threat vector
Narrow focus by understanding data
!
!
!
!
!
!
!
!
!
!
Discovery
!
!
Detection
!
!
Respond at the Moment of Discovery
User visits
website
!
Downloads PDF
Instantly “Roll back the tape” with
a recorded history to understand
Learn from investigation to build
scope
detection moving forward
DISCOVERED
Deleted Payload
Payload
Deleted
User visits
website
Is sent
malicious
Java applet
Spawns first
stage payload
Spawns second
stage payload
Injects code
into Windows
Explorer
Lateral
Movement
Prioritize investigations
with applied threat
intelligence
Takes malicious
actions
DISCOVERED
DISCOVERED
Spawns second
stage payload
Injects code
into Windows
Explorer
Takes
Takesmalicious
malicious
actions
actions
Drive Action on Endpoints with Live Response
✓
IDENTIFY ROOT CAUSE &
REMEDIATE MACHINE
BLOCK NETWORK
COMMUNICATION
KILL ATTACK
Deleted payload
Use one IR solution
without dropping
PROCESS admin. credentials
Built by responders for responders
Customize on-sensor actions by executing third-party tools
Remove IT out of SecOps equation
User visits
website
Is sent malicious
Java applet
Spawns first
stage payload
Spawns second
stage payload
Injects code
into Windows
Explorer
Takes malicious
actions
ISOLATED
MODERN VIEW
Responders manage multiple tools for continuous recording & live response
One comprehensive IR solution
Security
as a
unified process
vs
a collection of
solutions
Tailored Defenses Require Automation
AUTOMATE, or DIE
Connect: Integrate & Automate the Entire Security Stack
Open APIs to integrate
with third-party
and in-house tools
We’ve integrated Bit9 + Carbon Black
into our entire security stack.
– Senior Architect, Leading Internet Entertainment Provider
Public API; User Community; Developer Relations
Moving from Integration to Automation
Alert Generated
CROSS CHECK
For context
Alert Enriched
Blocks IPs
Remediation
Actions
Kill Process,
Gathers Forensics
User Profile &
Behaviors
Threat Intelligence
Device History
Enrolls User in
Education Training
Bit9 + Carbon Black: Arm Your Endpoints
Threat Intelligence Cloud
Threat Indicators
Attack Attribution
Reputation
The Most Comprehensive Endpoint Threat
Protection Solution
The Leading Endpoint Threat Detection
and Response Solution
For IT and Security Teams Managing Desktops,
Servers, and Fixed-function Devices
For Security Operations Center
and Incident Response Teams
+
+
+
World’s most widely deployed application
control/whitelisting solution
Single agent for visibility, detection, response,
prevention
Trust-based and policy-driven
+
+
+
Only solution with continuous recording; live
response; threat isolation, termination and
remediation
Real-time customizable detection
Complete kill chain analysis based on recorded
history and attack visualization
Supported Operating Systems
Open API and Integrations
Network Security,Supported
Analytics Operating
and SIEM, Systems
In-House & Custom Tools
Thank you
We’re at hole 15
Win gift card and golf shirts and setup
your demo of Bit9 + Carbon Black