Preempt Behavioral Firewall -- Top Use Cases

Preempt Behavioral Firewall -- Top Use Cases
Security teams today struggle to find practical approaches to dealing
with the threat of cyberattacks, breaches and insider threats without
disrupting their business or overloading analysts. Despite promises,
traditional User and Entity Behavior Analytics (UEBA) tend to generate
many false positives and require manual investigation. On the other
hand, enforcement methods such as a next-generation firewalls lack an
understanding of user behavior, and simple Allow or Deny responses
risk disrupting the business.
The Preempt Behavioral Firewall bridges these two perspectives by
pairing user behavior to detect threats with a contextual automated
response that redirects risky user behavior and proactively stop threats
without disrupting the business. Policies take into account a user or
entity’s role, behavior, and the target of their actions. Flexible response
options can redirect user behavior, confirm a threat, or block once a
threat is verified. This provides enormous flexibility, which lends itself
to a wide variety of use cases.
Use Cases
Active Policy-Based Threat
Prevention
Proactive Visibility and
Management of Risky
Behavior
Increased Operational
Efficiency
Active Policy-Based Threat Prevention
Today many organizations are reluctant to take action based on behavioral analytics. Incidents are often
inconclusive or unreliable and enforcement options are often limited to crude Block or Allow options. This
gives security teams only extreme responses to incomplete information.
The Preempt Behavioral Firewall offers automated responses that continually learn and align with the
needs of the business. Suspicious behavior can force a re-authentication or challenge by multi-factor
authentication to verify identity. Weak or exposed passwords can force a password change. Users can be
demoted, isolated, or ultimately blocked based on risk. All responses can be automated based on policy to
ensure that risks are mitigated with minimal impact to users, and without manual intervention from staff.
Compromised Accounts- Attackers use compromised credentials to spread laterally through the
network turning a small system-level compromise into an enterprise-level compromise. Abnormal
behavior can be automatically challenged via multi-factor authentication and subsequently trigger 3rdparty response orchestration, isolation of the host, or notification to security analysts based on policy.
Compromised Users or Devices- Find signs of malware or an attacker on a device such as abnormal
or unknown protocols in use, attempts to escalate privileges, or the presence of new or unmanaged
devices on the network.
Compromised Privileged Users and Service Accounts- Track privileged users such as
administrators and prioritize their risk scores to drive more aggressive response policies. The same
approach can be applied to service accounts, which are often hard to manage, yet can provide an
attacker with easy access to key servers and data.
Compromised Hashes/Tickets- Techniques such as Pass-the-Hash and Pass-the-Ticket have
long been critical tools for attackers to move laterally within the network. Preempt detects these
techniques and once again can challenge the affected user via multi-factor authentication or by
blocking or isolating the affected host.
Attacks Against Active Directory Infrastructure- Preempt constantly analyzes an organization’s
authentication infrastructure for signs of abuse including brute-force attacks, Golden Ticket attacks,
forged PAC files, or attempts to harvest data from Active Directory.
Insider Access Abuse- The presence of a malicious insider or simply a naive or impatient end-user
can quickly unravel the best laid plans of the security team. By learning normal working hours,
locations, as well as the typical assets and applications of a user, the solution can challenge and
respond to any anomalous behavior.
Proactive Visibility and Management of Risky Behavior
End-users represent the greatest and most unpredictable risk to the security of enterprise data. Whether
due to a simple mistake, a malicious insider, or a determined attacker, the path to a breach almost always
goes through a user.
The Preempt Behavioral Firewall continuously tracks and scores the behavior of every end user, privileged
user, and host in the context of the assets being accessed. This multi-dimensional approach reveals when an
individual user is at risk as well as the impact to the overall risk of the organization. Preempt then provides
the option to turn insight into action that reduces the internal attack surface. Insights include:
Weak Passwords- Weak passwords are easily cracked by attackers to gain access to the network and
its assets. Detect the use of weak passwords in the network to pinpoint insecure users and optionally
force the user to reauthenticate and or change password based on policy.
Stale Accounts- Easily identify accounts of former employees, partners, and contractors in the network.
Detect the use of any stale accounts, challenge suspicious usage, or notify staff based on policy.
Account Sharing- Quickly identify users or devices that are sharing accounts within the network.
Challenge the user to determine the true identity or notify staff based on policy.
Management of Privileged Users- The more privileged a user is, the more valuable they are. Both
rogue admins and privileged account takeovers from an attacker are a big concern for Security teams.
Privileged accounts are automatically recognized and suspicious or risky behavior of a privileged user
can be prioritized.
Protection of High-Value Assets- Easily monitor and prioritize high-value users or assets such as
executives or sensitive servers and databases. Contextual policies ensure higher value assets receive
higher risk scores in response to any malicious or risky behavior.
Additional Insights- There are many other insights that the solution can provide including
identifying and tracking service accounts (as well as whether they should have cloud access or not),
gaining visibility for other data sources and more.
Increased Operational Efficiency
Security operations teams are overloaded and understaffed, and most UEBA products generate far more
alerts than their team can possibly analyze. This often results in mountains of data that is often only analyzed
after a breach.
The Preempt Behavioral Firewall helps overstressed teams by providing a layer of automation to verify and
triage events and resolve false positives. Instead of putting the burden on humans to hunt and investigate,
the solution can verify and validate the threat without manual intervention. This ultimately helps drive faster,
more efficient investigations, alert review, incident response, and forensic analysis.
Event Triage and Prioritization- By cutting through the sea of extraneous events and alerts, security
teams can focus on the few critical items that truly matter. Priority alerts can be triggered when a
suspicious host fails a challenge such as multi-factor authentication, and high value users, key assets,
and privileged accounts can be automatically prioritized based on policy.
Incident Response- Incident responders are constantly measured on metrics of the times to detection,
response, and fix. With Preempt, they can accelerate IR timelines and mitigation of incident damage
with an automated solution that quickly identifies threats, pinpoints the users and devices at the heart
of the problem, and isolates them from the network.
Forensic Analysis- Preempt provides quick, meaningful insight into the behavior of any user, account,
or device. Analysts can dig into a full chronology of the entity’s behavior with insight into how behavior
deviated from previous norms.
Automatic Reduction of Alerts- Adaptive responses not only confirm and stop malicious events, but
also prevents alerts for benign anomalies. For example, If a user is suspected of being compromised
with malware, but completes a second fact of authentication, then the alert can be automatically
resolved based on policy. This reduces the total volume of alerts, but does so with certainty and these
activities are being audited for future reference.
Conclusion
While we have addressed several of the most common use cases of the Preempt Behavioral Firewall, this is
by no means an exhaustive list. At it’s heart, the solution is built on a policy engine that allows you to match
user, behaviors, and assets into policy that meets the needs of your organization. Based on these criteria, you
can invoke a wide range of responses that can escalate based on the situation. This ensures you can always
take action that strikes the appropriate balance between security and enablement.
About Preempt
Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that
couples User and Entity Behavior Analysis and Adaptive Response to provide the most proactive solution for both detecting and
automatically responding to security threats.
Copyright 2017. All Rights Reserved. 020517-UC Learn more about us at www.Preempt.com