SlideShare a Scribd company logo
1 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Self-defending IoT devices & gateways
East Midlands Cyber Security Forum
Matt Aldridge, Solutions Architect
maldridge@webroot.com
2 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
» BrightCloud Threat Intelligence:
– IP Reputation
– Web Reputation
– Web Classification
– File Reputation
– Collective -> Predictive
» SecureAnywhere™ Web Security Service
» SecureAnywhere™ Agent
» Gateway Solutions
» Device/Thing Solutions
Applying Collective Threat Intelligence to the IoT and IIoT
3 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
IoT Gateway with Secure Proxy
Network
Perimeter
BCTI
WSS
IoT Gateway
Internet
Features:
- SSL Decryption
- URL Policy Management
- BotNet & CC Blocking
- MaliciousFile Scanning
- White / Black List
- Rapid Deployment
Limitations:
- No Inbound IP Blocking
- Low Volume Use Case
4 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
IoT Gateway with BCTI SDK – URL & IP
Network
Perimeter
BCTI
IoT Gateway
Internet
Features:
- Most Secure Solution
- Massive Volume
- Lower Cost
- Full Inbound IP Blocking
Limitations:
- More Complex Implementation
- “On Appliance” Management
5 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
IoT Gateway with IP Blocking and Secure Gateway
Network
Perimeter
BCTI
IoT Gateway
Internet
Limitations:
- Low Volume Use Case Outbound
WSS
IP
Rep
Features:
- More Secure Solution
- Full Inbound IP Blocking
- Outbound
- SSL Decryption
- URL Policy Management
- BotNet & CC Blocking
- MaliciousFile Scanning
- White / Black List
6 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
» Devices very long-lived
» Interoperability testing costs millions: change averse
» Evolution limited by hardware capacity & legacy software
Existing IIoT Devices: The Problem
7 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Hardware Separation – On Device IP/URL Verification
Hardware
OS
Separation Kernel
IP/URL
Check
Internet
BCTI
IP
Rep
URL
Cat
Bad IP
Bad URL
8 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Hardware Separation – Firmware Update Verification
OS
Separation Kernel
Secure
Memory –
File
Hashing
Internet
Webroot
Global File
Database
Physical Hardware
Device
1
2
3
4
9 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Webroot SecureAnywhere™ Agent
Implemented
- Windows XP, Vista, 7, 8, 10
- OS X
- Windows Embedded 7 & 8 (Full Run-time)
- Android
In Progress
- Windows 10 IoT Core
- Windows POSReady 7
- Windows Embedded 7 & 8 (Headless)
Roadmap
- Linux Variants
10 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Webroot SecureAnywhere™ Web Security Service
Implemented
- Windows XP, Vista, 7, 8, 10
- OS X
In Progress
- Intel Edison (Yocto)
- Intel Edison (Windows 10 IoT Core)
- Raspberry PI (Raspbian)
- Linux (Generic)
- Router/Gateway (Generic)
11 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
» Dynamic executable classifier
– On-device machine learning deployment
– Analyses files in network data streams
– Supplied in SDK form
– First version will cover Windows PE files
– No reliance on signatures
Other Forthcoming Solutions
12 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information
Thank you! Any questions?
Matt Aldridge, Solutions Architect
maldridge@webroot.com

More Related Content

PDF
Cloud services and it security
PDF
Global Mandate to Secure Cloud Computing
PDF
PDF
CSA Introduction 2013 David Ross
PDF
CSA Standards Development Summary
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PDF
Cybersecurity frameworks globally and saudi arabia
PDF
Cloud Security Governance
Cloud services and it security
Global Mandate to Secure Cloud Computing
CSA Introduction 2013 David Ross
CSA Standards Development Summary
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Cybersecurity frameworks globally and saudi arabia
Cloud Security Governance

What's hot (19)

PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Service Organizational Control (SOC 2) Compliance - Kloudlearn
PDF
Workshop on CASB Part 2
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
CASB — Your new best friend for safe cloud adoption?
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PPT
Securing Servers in Public and Hybrid Clouds
PPTX
Cloud computing Risk management
PPTX
Secure remote access to AWS your users will love
PDF
Enterprise Cloud transformation z pohledu Oracle
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
Optimize IT Infrastructure
PPTX
Security and governance in the cloud
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PDF
Cloud Security Demystified
PDF
SECURING THE CLOUD DATA LAKES
PDF
Secaa s cat_10_network_security_implementation_guidance
PDF
SD-WAN - comSpark 2019
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Workshop on CASB Part 2
Rethinking Cybersecurity for the Digital Transformation Era
CASB — Your new best friend for safe cloud adoption?
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Securing Servers in Public and Hybrid Clouds
Cloud computing Risk management
Secure remote access to AWS your users will love
Enterprise Cloud transformation z pohledu Oracle
Rethinking Cybersecurity for the Digital Transformation Era
Optimize IT Infrastructure
Security and governance in the cloud
Maximize your cloud app control with Microsoft MCAS and Zscaler
Cloud Security Demystified
SECURING THE CLOUD DATA LAKES
Secaa s cat_10_network_security_implementation_guidance
SD-WAN - comSpark 2019
NIST Cybersecurity Framework (CSF) on the Public Cloud
Ad

Viewers also liked (20)

PDF
Internet of Things - how secure is it?
PDF
Econocom - identifying funding for success
PDF
Mike Gillespie - The Internet of Everything
PDF
Qonex - Securing the IoT
PDF
Ransomware - Mark Chimely
PPTX
IISP East Midlands Sept 2014 - Jim Shields presentation
PPTX
IISP Sept 2014 presentation
PDF
Managing and insuring cyber risk - a risk perspective
PDF
Governance - the Role of the Board
PPTX
Horizon introduction
PPTX
Redscan - Insider threat case study
PDF
Achieving Cyber Essentials
PDF
Managing and insuring cyber risk - coverage of insurance policies
PDF
Trustworthy Software
PDF
Be careful what you wish for: the great Data Protection law reform - Lilian E...
PDF
The Impact of the General Data Protection Regulation - 10th May 2016
PDF
General Data Protection Regulation: what do you need to do to get prepared? -...
PDF
How to avoid becoming the next victim of ransomware
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
PPTX
Insider threat event presentation
Internet of Things - how secure is it?
Econocom - identifying funding for success
Mike Gillespie - The Internet of Everything
Qonex - Securing the IoT
Ransomware - Mark Chimely
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP Sept 2014 presentation
Managing and insuring cyber risk - a risk perspective
Governance - the Role of the Board
Horizon introduction
Redscan - Insider threat case study
Achieving Cyber Essentials
Managing and insuring cyber risk - coverage of insurance policies
Trustworthy Software
Be careful what you wish for: the great Data Protection law reform - Lilian E...
The Impact of the General Data Protection Regulation - 10th May 2016
General Data Protection Regulation: what do you need to do to get prepared? -...
How to avoid becoming the next victim of ransomware
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Insider threat event presentation
Ad

Similar to Webroot - self-defending IoT devices & gateways (20)

PPTX
Seguridad Corporativa Con Internet Explorer 8(1)
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
The Internet of Things: We've Got to Chat
PPTX
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
PDF
IPv6IntegrationBestPracticesfinal.pdf
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
PDF
Will SDN kill Ethernet Fabrics?
PPTX
Internet of Things and Edge Compute at Chick-fil-A
PPTX
501 ch 5 securing hosts and data
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PDF
CreatiFI FIWARE technologies presentation 31.10.2014 Helsinki
PDF
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
PDF
BOSNOG NAC stack 2018
PDF
IPv6 Security Talk mit Joe Klein
PPTX
Windows Azure Security & Compliance
PDF
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PDF
The evolving threat in the face of increased connectivity
PPTX
IoT-Device-Security-DRAFT-slide-presentation
Seguridad Corporativa Con Internet Explorer 8(1)
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
The Internet of Things: We've Got to Chat
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
IPv6IntegrationBestPracticesfinal.pdf
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Policy in OpenStack - Martin Casado, CTO, VMware - OpenStackSV 2014
Will SDN kill Ethernet Fabrics?
Internet of Things and Edge Compute at Chick-fil-A
501 ch 5 securing hosts and data
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
CreatiFI FIWARE technologies presentation 31.10.2014 Helsinki
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
BOSNOG NAC stack 2018
IPv6 Security Talk mit Joe Klein
Windows Azure Security & Compliance
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
IoT Security Imperative: Stop your Fridge from Sending you Spam
The evolving threat in the face of increased connectivity
IoT-Device-Security-DRAFT-slide-presentation

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
The Rise and Fall of 3GPP – Time for a Sabbatical?
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”

Webroot - self-defending IoT devices & gateways

  • 1. 1 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Self-defending IoT devices & gateways East Midlands Cyber Security Forum Matt Aldridge, Solutions Architect maldridge@webroot.com
  • 2. 2 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information » BrightCloud Threat Intelligence: – IP Reputation – Web Reputation – Web Classification – File Reputation – Collective -> Predictive » SecureAnywhere™ Web Security Service » SecureAnywhere™ Agent » Gateway Solutions » Device/Thing Solutions Applying Collective Threat Intelligence to the IoT and IIoT
  • 3. 3 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information IoT Gateway with Secure Proxy Network Perimeter BCTI WSS IoT Gateway Internet Features: - SSL Decryption - URL Policy Management - BotNet & CC Blocking - MaliciousFile Scanning - White / Black List - Rapid Deployment Limitations: - No Inbound IP Blocking - Low Volume Use Case
  • 4. 4 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information IoT Gateway with BCTI SDK – URL & IP Network Perimeter BCTI IoT Gateway Internet Features: - Most Secure Solution - Massive Volume - Lower Cost - Full Inbound IP Blocking Limitations: - More Complex Implementation - “On Appliance” Management
  • 5. 5 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information IoT Gateway with IP Blocking and Secure Gateway Network Perimeter BCTI IoT Gateway Internet Limitations: - Low Volume Use Case Outbound WSS IP Rep Features: - More Secure Solution - Full Inbound IP Blocking - Outbound - SSL Decryption - URL Policy Management - BotNet & CC Blocking - MaliciousFile Scanning - White / Black List
  • 6. 6 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information » Devices very long-lived » Interoperability testing costs millions: change averse » Evolution limited by hardware capacity & legacy software Existing IIoT Devices: The Problem
  • 7. 7 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Hardware Separation – On Device IP/URL Verification Hardware OS Separation Kernel IP/URL Check Internet BCTI IP Rep URL Cat Bad IP Bad URL
  • 8. 8 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Hardware Separation – Firmware Update Verification OS Separation Kernel Secure Memory – File Hashing Internet Webroot Global File Database Physical Hardware Device 1 2 3 4
  • 9. 9 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Webroot SecureAnywhere™ Agent Implemented - Windows XP, Vista, 7, 8, 10 - OS X - Windows Embedded 7 & 8 (Full Run-time) - Android In Progress - Windows 10 IoT Core - Windows POSReady 7 - Windows Embedded 7 & 8 (Headless) Roadmap - Linux Variants
  • 10. 10 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Webroot SecureAnywhere™ Web Security Service Implemented - Windows XP, Vista, 7, 8, 10 - OS X In Progress - Intel Edison (Yocto) - Intel Edison (Windows 10 IoT Core) - Raspberry PI (Raspbian) - Linux (Generic) - Router/Gateway (Generic)
  • 11. 11 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information » Dynamic executable classifier – On-device machine learning deployment – Analyses files in network data streams – Supplied in SDK form – First version will cover Windows PE files – No reliance on signatures Other Forthcoming Solutions
  • 12. 12 | Monday, February 01, 2016 | Webroot Inc. | Proprietary and Confidential Information Thank you! Any questions? Matt Aldridge, Solutions Architect maldridge@webroot.com