SlideShare a Scribd company logo
© Copyright Fortinet Inc. All rights reserved.
Advanced Threat Protection
Alessandro Berta – Systems Engineer
15 Aprile 2016
2
Why Talk about Advanced Threat Protection
“New Studies Reveal Companies are Attacked an
Average of 17,000 Times a Year.”
“Companies like J.P. Morgan Plan to Double
Spending on Cyber security…”
“Cybercrime Will Remain a Growth Industry for the
Foreseeable Future.”
“The Reality of the Internet of Things is the
Creation of More Vulnerabilities.”
“43% of firms in the United States have experienced
a data breach in the past year.”
3
Companies should be concerned
 Prevention techniques sometimes fail, so detection and response tools,
processes, & teams must be added
FACT:
GOAL: Reduce time to Find/Detect incidents
Reduce time to Investigate incidents
Reduce time to Remediate incidents
229days
Average time attackers were on a network before detection
67%
Victims were notified by an external entity
4
Random Detection
(average ~200 days,
prior to response)
DURATION
IMPACT
The Impact: Extended Compromise, Data Loss, Headlines…
5
Kill Chain of an Advanced Attack
Spam
Malicious
Email
Malicious
Web Site
Exploit
Malware
Command &
Control Center
Bots leverage legitimate IPs to pass
filters. Social engineering fools recipient.
Malicious
Link
Bot Commands
& Stolen Data
Anti-spam
Web Filtering
Intrusion Prevention
Antivirus
App Control/
IP Reputation
Fast flux stays ahead
of web ratings
Zero-days pass IPS
Compression passes
static inspection
Encrypted communication
passes controls
6
Idon’tknowware Is A Big Part of Problem
Known
Good
Known
Bad
Probably
Good
Very
Suspicious
Somewhat
Suspicious
Might be
Good
Completely
Unknown
Whitelists Reputation:
File, IP, App, Email
App Signatures
Digitally signed files
Blacklists
Signatures
Heuristics
Reputation:
File, IP,
App, Email
Generic Signatures
Code
Continuum
Security
Technologies
Sandboxing
Sources:
Verizon 2015 Data Breach Investigations Report, April 2015
7
Enter Sandboxing
Spam
Malicious
EmailMalicious
Link
Malicious
Web Site
Exploit
Malware
Bot Commands
& Stolen Data
Command &
Control Center
Spam
Malicious
Link
Exploit
Malware
Bot Commands
& Stolen Data
Sandbox
Anti-spam
Web Filtering
Intrusion Prevention
Antivirus
App Control/
IP Reputation
8
Random Detection
(average 200 days,
prior to response)
DURATION
IMPACT
Sandbox Only
Detection &
Response (days)
A Good Sandbox Reduces Dwell Time, Risk, Impact
9
Introducing FortiSandbox
 Flags objects within traffic for more inspection
 Runs objects in a contained environment,
analyzing activity
 Provides a malicious or low/medium/
high risk rating
 Uncovers and distributes threat
intelligence for remediation/protection
 Detects call back attempts related
to sophisticated attacks
 3 modes of operation
» Sniffer: span port mode to capture all packets
» On-demand: manual submission & analysis of files
» Integrated: with FortiGate, FortiMail, FortiWeb, FortiSwitch and/or FortiClient
Network Traffic
Cloud
File Query
AV
Prefilter
Code
Emulation
Full
Sandbox
Callback
Detection
10
VMs NA 2+ 8 28
Form
Cloud service integrated
with FortiGate
Virtual appliance Physical appliance Physical appliance
FortiSandbox 1000D
FortiSandbox Platform Options
FortiSandbox VM
FortiSandbox 3000D
FortiSandbox Cloud
11
FortiSandbox – 5 Steps to Better Performance
Call Back Detection
Full Virtual Sandbox
Code Emulation
Cloud File Query
AV Prefilter
• Quickly simulate intended activity – Fortinet patented CPRL
• OS independent & immune to evasion – high catch rate
• Apply top-rated anti-malware engine
• Examine real-time, full lifecycle activity in the sandbox
to get the threat to expose itself
• Check community intelligence & file reputation
• Identify the ultimate aim, call back & exfiltration
• Mitigate w/ analytics & FortiGuard updates
12
 Top-rated Breach Detection (NSS
Labs Recommended)
» 99% detection
» Results delivered w/in 1 min most of
the time
Top Rated Sandbox
Independent third-party
tested & validated!
13
FortiGuard FortiOS
FortiClient FortiManager
FortiWeb FortiAnalyzer
FortiMail
FortiSandboxFortiGate
ADVANCED THREAT
PROTECTION FRAMEWORK
5.4
CloudVirtual
Physical
14
ATP Framework in Action
Unknown URLs and Files
submission to FortiSandbox
FortiSandbox
FortiGate
FortiWeb
FortiMail
FortiClient
Web
Server
Mail
Server
Extended and fast protection
Internet
Full NGFW inspection performed on FortiGate.
At risk objects sent to FortiSandbox Reputation, behavior and other
analysis performed by FortiMail.
At risk messages held for
additional FortiSandbox analysis.
15
Detect to Mitigate to Prevent
Updates to
Preventative Security
 Updated IP sender
reputations
 New web site ratings
used for web filtering
 New IPS rules and
botnet detection to
block command and
control traffic
 Updated anti-malware
detection for this and
similar attachments
Detection and analysis
 Sandbox object behavior analysis
& details
 Suspicious activity: privilege
modification, file creation,
modification & deletion
 Malicious activity: initiated traffic,
encrypted traffic, DNS query
 File names, URLs, IP addresses
Immediate Remediation
 Block email sender IP from delivering any other messages to employees.
 Prevent communication with this command & control
 Quarantine recipient devices
 Confirm compromise and remove malicious files
16
How To Move From Detection/Response To Prevention?
Random Detection
(average 229 days,
prior to response)
DURATION
IMPACT
Sandbox
Only
Detection &
Response (days)
Sandbox +
FortiMail/
FortiClient
Prevention
(0-second)
Sandbox +
FortiGate/FortiWe
b Detect & Respond
(minutes)
17
Only ATP Solution NSS Recommended Edge to Endpoint
TODAY’S
SECURITY IS
BORDERLESS
19
SLOW IS
BROKEN
COMPLEXITY
IS THE ENEMY
OF SECURITY
Single Framework
FortiAP, FortiSwitch FortiGate FortiWeb
FortiMail
FortiGuard
Threat Intelligence & Services
Advanced Threat Protection
FortiSandbox
USERS
NETWORK
DATA CENTER
FortiClient Fortinet
Cloud
#1 UNIT SHARE
WORLDWIDE
In Network Security (IDC)
OVER
2MILLION
DEVICES SHIPPED
MARKET LEADING
TECHNOLOGY
257 PATENTS
228 PENDING
FortiOS 5.4
Advanced
Security
Network
Performance
SECURITY FOR A NEW WORLD IS
SECURITY WITHOUT COMPROMISE

More Related Content

PPTX
Advanced Threat Protection
PPTX
160415 lan and-wan-ctap
PPTX
Evento 15 aprile
PPTX
PPTX
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PPT
FireEye
PPSX
SonicWALL Advanced Features
Advanced Threat Protection
160415 lan and-wan-ctap
Evento 15 aprile
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
FireEye
SonicWALL Advanced Features

What's hot (20)

PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
PPTX
This is Next-Gen IT Security - Introducing Intercept X
PPTX
FireEye Engineering
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
Cerdant Security State of the Union
PPT
Sophos Utm Presentation 2016
PPTX
Thinking Differently About Security Protection and Prevention
PPTX
Sophos Next-Generation Enduser Protection
PPTX
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
FireEye - Breaches are inevitable, but the outcome is not
PPTX
Cisco Web and Email Security Overview
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PPTX
Taking the battle to Ransomware with Sophos Intercept X
PPTX
Intercept X - Sophos Endpoint
PPTX
Preventing Today's Malware
PPTX
Detection and Response with Splunk+FireEye
PPTX
Content Analysis System and Advanced Threat Protection
Anatomy of an Attack - Sophos Day Belux 2014
This is Next-Gen IT Security - Introducing Intercept X
FireEye Engineering
Make Every Spin Count: Putting the Security Odds in Your Favor
Cerdant Security State of the Union
Sophos Utm Presentation 2016
Thinking Differently About Security Protection and Prevention
Sophos Next-Generation Enduser Protection
Advanced Threat Protection - Sandboxing 101
FireEye - Breaches are inevitable, but the outcome is not
Cisco Web and Email Security Overview
FireEye Use Cases — FireEye Solution Deployment Experience
Taking the battle to Ransomware with Sophos Intercept X
Intercept X - Sophos Endpoint
Preventing Today's Malware
Detection and Response with Splunk+FireEye
Content Analysis System and Advanced Threat Protection
Ad

Viewers also liked (20)

PPTX
PDF
UTM を超えた統合セキュリティ アプライアンス Cisco ASA 5506-X/5508-X/5516-X
PPTX
Allot Cloud/Trends H2/2014 Slideshare
PDF
Allot Content Delivery Networks (CDN)
PDF
FortiWeb
PPTX
Malware-Troyanos-javier
PPTX
Reverse Engineering Malware
PPTX
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
PPTX
Proofing against malware
PDF
OWASP AppSec USA 2011 - Dismantling Web Malware
ODP
Linuxday 2014 Amato - Shellshock
PDF
Linuxday 2013-amato
PDF
Web 2.0 e dintorni
PDF
Amato HackInBo 2013
PPTX
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
PDF
Hashbot.com - Acquisizione e Validazione
PPT
Firma Digitale
PDF
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
PDF
ARM 7: ThaiCERT Operations and Priorities
PPSX
Bluecoat Services
UTM を超えた統合セキュリティ アプライアンス Cisco ASA 5506-X/5508-X/5516-X
Allot Cloud/Trends H2/2014 Slideshare
Allot Content Delivery Networks (CDN)
FortiWeb
Malware-Troyanos-javier
Reverse Engineering Malware
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Proofing against malware
OWASP AppSec USA 2011 - Dismantling Web Malware
Linuxday 2014 Amato - Shellshock
Linuxday 2013-amato
Web 2.0 e dintorni
Amato HackInBo 2013
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Hashbot.com - Acquisizione e Validazione
Firma Digitale
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
ARM 7: ThaiCERT Operations and Priorities
Bluecoat Services
Ad

Similar to ATP (20)

PPTX
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
PDF
Fortinet, держи марку!
PPTX
Fortinet sandboxing
PDF
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
PDF
Atp course description
PDF
Integrated Secure Networking - Fortinet
PPTX
Scot Secure 2015
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Brochure-FortiGuard-Security-Services
PPTX
Fortinet Tanıtım
PPSX
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
PDF
Revolutionizing Advanced Threat Protection
PPTX
Fortinet k
PPTX
Network Security - Fortinet, Dublin June 2017
PPTX
FortiMail
PDF
Check Point SandBlast and SandBlast Agent
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Advanced Threat Defense Intel Security
PDF
Understanding Advanced Threats and How to Prevent Them
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Fortinet, держи марку!
Fortinet sandboxing
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
Atp course description
Integrated Secure Networking - Fortinet
Scot Secure 2015
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Brochure-FortiGuard-Security-Services
Fortinet Tanıtım
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
Revolutionizing Advanced Threat Protection
Fortinet k
Network Security - Fortinet, Dublin June 2017
FortiMail
Check Point SandBlast and SandBlast Agent
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Advanced Threat Defense Intel Security
Understanding Advanced Threats and How to Prevent Them

More from Lan & Wan Solutions (20)

PPTX
CYBER THREAT ASSESSMENT
PDF
Nuova presentazione Lan & Wan Solutions Fortinet Partner
PDF
Nuova presentazione Lan & Wan Solutions
PDF
Mc business solutions set
PDF
Mc partner playbook
PPTX
160415 lan and-wan-secure-access-architecture
PPTX
PPTX
Secure Access Architecture
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
Scheda tecnica hspa 08
PPS
Antenne filari
PPS
Antenne multifilari
PPTX
Emea nutanix overview presentation emea
PPTX
PPTX
Software defined security-framework_final
PPTX
Rinnova ora presentazione per meeting e seminari diretti ai clienti
CYBER THREAT ASSESSMENT
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions
Mc business solutions set
Mc partner playbook
160415 lan and-wan-secure-access-architecture
Secure Access Architecture
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Scheda tecnica hspa 08
Antenne filari
Antenne multifilari
Emea nutanix overview presentation emea
Software defined security-framework_final
Rinnova ora presentazione per meeting e seminari diretti ai clienti

Recently uploaded (20)

PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
A Brief Introduction About Julia Allison
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Training And Development of Employee .pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPT
Data mining for business intelligence ch04 sharda
PPTX
Amazon (Business Studies) management studies
PPT
Chapter four Project-Preparation material
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
A Brief Introduction About Julia Allison
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Unit 1 Cost Accounting - Cost sheet
COST SHEET- Tender and Quotation unit 2.pdf
HR Introduction Slide (1).pptx on hr intro
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Training And Development of Employee .pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Data mining for business intelligence ch04 sharda
Amazon (Business Studies) management studies
Chapter four Project-Preparation material
WRN_Investor_Presentation_August 2025.pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx
Belch_12e_PPT_Ch18_Accessible_university.pptx
Chapter 5_Foreign Exchange Market in .pdf
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Power and position in leadershipDOC-20250808-WA0011..pdf
Dragon_Fruit_Cultivation_in Nepal ppt.pptx

ATP

  • 1. © Copyright Fortinet Inc. All rights reserved. Advanced Threat Protection Alessandro Berta – Systems Engineer 15 Aprile 2016
  • 2. 2 Why Talk about Advanced Threat Protection “New Studies Reveal Companies are Attacked an Average of 17,000 Times a Year.” “Companies like J.P. Morgan Plan to Double Spending on Cyber security…” “Cybercrime Will Remain a Growth Industry for the Foreseeable Future.” “The Reality of the Internet of Things is the Creation of More Vulnerabilities.” “43% of firms in the United States have experienced a data breach in the past year.”
  • 3. 3 Companies should be concerned  Prevention techniques sometimes fail, so detection and response tools, processes, & teams must be added FACT: GOAL: Reduce time to Find/Detect incidents Reduce time to Investigate incidents Reduce time to Remediate incidents 229days Average time attackers were on a network before detection 67% Victims were notified by an external entity
  • 4. 4 Random Detection (average ~200 days, prior to response) DURATION IMPACT The Impact: Extended Compromise, Data Loss, Headlines…
  • 5. 5 Kill Chain of an Advanced Attack Spam Malicious Email Malicious Web Site Exploit Malware Command & Control Center Bots leverage legitimate IPs to pass filters. Social engineering fools recipient. Malicious Link Bot Commands & Stolen Data Anti-spam Web Filtering Intrusion Prevention Antivirus App Control/ IP Reputation Fast flux stays ahead of web ratings Zero-days pass IPS Compression passes static inspection Encrypted communication passes controls
  • 6. 6 Idon’tknowware Is A Big Part of Problem Known Good Known Bad Probably Good Very Suspicious Somewhat Suspicious Might be Good Completely Unknown Whitelists Reputation: File, IP, App, Email App Signatures Digitally signed files Blacklists Signatures Heuristics Reputation: File, IP, App, Email Generic Signatures Code Continuum Security Technologies Sandboxing Sources: Verizon 2015 Data Breach Investigations Report, April 2015
  • 7. 7 Enter Sandboxing Spam Malicious EmailMalicious Link Malicious Web Site Exploit Malware Bot Commands & Stolen Data Command & Control Center Spam Malicious Link Exploit Malware Bot Commands & Stolen Data Sandbox Anti-spam Web Filtering Intrusion Prevention Antivirus App Control/ IP Reputation
  • 8. 8 Random Detection (average 200 days, prior to response) DURATION IMPACT Sandbox Only Detection & Response (days) A Good Sandbox Reduces Dwell Time, Risk, Impact
  • 9. 9 Introducing FortiSandbox  Flags objects within traffic for more inspection  Runs objects in a contained environment, analyzing activity  Provides a malicious or low/medium/ high risk rating  Uncovers and distributes threat intelligence for remediation/protection  Detects call back attempts related to sophisticated attacks  3 modes of operation » Sniffer: span port mode to capture all packets » On-demand: manual submission & analysis of files » Integrated: with FortiGate, FortiMail, FortiWeb, FortiSwitch and/or FortiClient Network Traffic Cloud File Query AV Prefilter Code Emulation Full Sandbox Callback Detection
  • 10. 10 VMs NA 2+ 8 28 Form Cloud service integrated with FortiGate Virtual appliance Physical appliance Physical appliance FortiSandbox 1000D FortiSandbox Platform Options FortiSandbox VM FortiSandbox 3000D FortiSandbox Cloud
  • 11. 11 FortiSandbox – 5 Steps to Better Performance Call Back Detection Full Virtual Sandbox Code Emulation Cloud File Query AV Prefilter • Quickly simulate intended activity – Fortinet patented CPRL • OS independent & immune to evasion – high catch rate • Apply top-rated anti-malware engine • Examine real-time, full lifecycle activity in the sandbox to get the threat to expose itself • Check community intelligence & file reputation • Identify the ultimate aim, call back & exfiltration • Mitigate w/ analytics & FortiGuard updates
  • 12. 12  Top-rated Breach Detection (NSS Labs Recommended) » 99% detection » Results delivered w/in 1 min most of the time Top Rated Sandbox Independent third-party tested & validated!
  • 13. 13 FortiGuard FortiOS FortiClient FortiManager FortiWeb FortiAnalyzer FortiMail FortiSandboxFortiGate ADVANCED THREAT PROTECTION FRAMEWORK 5.4 CloudVirtual Physical
  • 14. 14 ATP Framework in Action Unknown URLs and Files submission to FortiSandbox FortiSandbox FortiGate FortiWeb FortiMail FortiClient Web Server Mail Server Extended and fast protection Internet Full NGFW inspection performed on FortiGate. At risk objects sent to FortiSandbox Reputation, behavior and other analysis performed by FortiMail. At risk messages held for additional FortiSandbox analysis.
  • 15. 15 Detect to Mitigate to Prevent Updates to Preventative Security  Updated IP sender reputations  New web site ratings used for web filtering  New IPS rules and botnet detection to block command and control traffic  Updated anti-malware detection for this and similar attachments Detection and analysis  Sandbox object behavior analysis & details  Suspicious activity: privilege modification, file creation, modification & deletion  Malicious activity: initiated traffic, encrypted traffic, DNS query  File names, URLs, IP addresses Immediate Remediation  Block email sender IP from delivering any other messages to employees.  Prevent communication with this command & control  Quarantine recipient devices  Confirm compromise and remove malicious files
  • 16. 16 How To Move From Detection/Response To Prevention? Random Detection (average 229 days, prior to response) DURATION IMPACT Sandbox Only Detection & Response (days) Sandbox + FortiMail/ FortiClient Prevention (0-second) Sandbox + FortiGate/FortiWe b Detect & Respond (minutes)
  • 17. 17 Only ATP Solution NSS Recommended Edge to Endpoint
  • 21. Single Framework FortiAP, FortiSwitch FortiGate FortiWeb FortiMail FortiGuard Threat Intelligence & Services Advanced Threat Protection FortiSandbox USERS NETWORK DATA CENTER FortiClient Fortinet Cloud #1 UNIT SHARE WORLDWIDE In Network Security (IDC) OVER 2MILLION DEVICES SHIPPED MARKET LEADING TECHNOLOGY 257 PATENTS 228 PENDING FortiOS 5.4
  • 22. Advanced Security Network Performance SECURITY FOR A NEW WORLD IS SECURITY WITHOUT COMPROMISE

Editor's Notes

  • #2: Hello. Today we are going to talk about advanced attacks and advanced threat protection from Fortinet. We’ll also go into some detail on FortiSandbox, a key element of Fortinet’s complete advanced threat protection solution.
  • #3: The threat landscape just keeps escalating and these days there is a lot of scrutiny over IT security because a successful data breach can be headline news. Certainly we’ve seen many very high profile companies and brands in the news with massive data breaches. The risk environment has made a lot of organizations start to pay more attention to their security measures. Viruses and hackers are not new, so what’s changed? There are many more different types of devices attacked to the network than ever before. And this Internet of Things includes many devices that do not have the ability to maintain regular security updates and it includes many devices and applications made for consumer use that are now being used within the enterprise. The cybercrime economy has matured and is a profitable industry that is more accessible than ever to black hat entrepreneurs. There is much higher awareness of the risk due to laws requiring public disclosure of a breach and the subsequent press coverage some breaches get. Hackers are getting even more sophisticated in how they orchestrate attacks in order to get around existing security coverage.
  • #4: You may have any number of excellent security technologies in place already in your organization – things such as firewalls, VPNs, authentication, antivirus, web filtering, IPS, and antispam. This is good and these solutions will prevent a lot of threats from ever impacting your organization. However, nothing is 100% and sometimes advanced attacks will find a way to get through these prevention techniques. You need to be ready to deal with these types of advanced targeted attacks. In recent breaches it took 229 days on average to detect an attack that’s gotten on the network if it has managed to slip past existing defenses. And in 67% of the time the victim organizations only learned about the breach from an external entity. Clearly no organization wants to be part of this statistic. The goal behind advanced threat detection is to prevent what attacks you can and then, accepting that some things will get through, to reduce the time to find and detect an attack. And once youv’e identified an attack, reduce the time it takes to investigate and analyze the threat. Finally, with this intelligence in hand you can more quickly remediate any impact on your organization.
  • #6: So how does an advanced attack work? Here’s a snapshot of a typical kill chain for an advanced attack and the typical security technologies that are in play in order to block that attack and break the kill chain. The number one, most popular method for initiating an advanced attack is to send a malicious email to the target. This email may have a malicious file attachment or a URL that connects to a malicious web site. You hope your anti-spam will stop this email from ever reaching an end user target. However there are ways to get around antispam and other email gateway security techniques. For example Bots may leverage legitimate (but compromised) IPs from which to send the email or they may use targeted spear phishing techniques and social engineering to get through filters and to entice an end users to click on a URL. They may encrypt a malicious attachment to hide it from AV scanning. If an email with a malicious URL gets through and an end user clicks on that URL link, you hope your web filtering protection will stop the user from ever connecting to that malicious web site and in many cases this will work. However, some attackers use a fast flux approach, only using a site for a few days or a few hours – harvesting what they can before moving on to another URL. If the end user connects with the malicious web site, that site will launch exploits at the user and you hope your Intrusion prevention will block the attack. However exploits can slip through by taking advantage of zero-day vulnerabilities, new variants, and encryption. If an exploit gets through, you hope you will catch any malware it tries to deliver with your antivirus. And many times this will work but sometimes it doesn’t. Malware can use file compression, encryption, and new malware variants to get through an AV filter. If that malware gets into the organization, it will try to proliferate and it will look for valuable data to collect. Eventually it will try to exfiltrate stolen data or simply go out to try to pull more threats into the organization and here’s where your application control and IP reputation controls may be able to identify and stop a connection to a command & control center. But if it doesn’t (maybe because the traffic was encrypted) your organization is breached.
  • #8: Here’s how the addition of sandboxing changes the protection game in an enterprise. It’s still a very good idea to have all those traditional preventative techniques in place. They are the fastest, most efficient way to prevent attacks from ever getting into your organization. However, by adding sandbox to back up these techniques you now have the chance to catch all those threats that can slip by because it is unknown by your preventative techniques such as antispam, IPS, AV, etc. And once your sandbox has analyzed a threat, you get useful insights that can be used to mitigate the threat. Both by remediating any exposure to it you may have had and by using that new threat intelligence to improve the preventative technologies you have in place.
  • #10: Flags suspicious (or high risk) objects within network traffic for more inspection Runs objects in a secure virtual environment, analyzing system, site, communication and download activity Provides a low, medium or high risk rating, leveraging packaged FortiGuard expertise Uncovers threat lifecycle information for remediation and updated protection Allows for information sharing with FortiGuard experts and global intelligence network Fortinet’s FortiOS network security platform provides the foundation for the Advanced Threat Protection Framework, while the deep security expertise of its FortiGuard Labs pervades the framework: Highlights Top performance (Ixia, NSS Labs) firewall appliance platforms for access control of high performance networks Top-rated (NSS Labs, Virus Bulletin, AV Comparatives), real-world threat prevention Top-rated (NSS Labs), real-world threat detection- 99% effectiveness for breach detection Leading security expertise (140+ zero-day discovers) to speed incident response and underpin the entire Framework A broad range of partners who contribute to the continuous monitoring and improvement of security
  • #11: You have your choice of platform for FortiSandbox. It is available as a physical or virtual appliance. There are two physical appliance options, the 1000D with 8 VMs and the 3000D with 28 VMs, and the highly flexible virtual appliance that scales from a few as 2 VMs up to 56 VMs. For organization that may not want to manage an on-premise solution, there is the FortiSandbox Cloud service available as an integrated option on the FortiGate. There are pros and cons for both the cloud and appliance options. FortiSandbox Cloud may easier to add to an existing FortiGate installation. It can process an unlimited number of files/hour but because it is a cloud service it may introduce some latency. The cloud service is only available as an integrated solution with FortiGate. FortiSandbox Appliances may deliver results faster and they don’t send files to the cloud for analysis but they also require some additional hardware management and have limits on the number of files they can process per hour. Appliances can be deployed as standalone solutions, in a lab for on-demand analysis or as an integrated solution with FortiGate. Fortinet believes it benefits customers to give them the flexibility to choose the platform they want.
  • #12: However, sandboxing is resource and time intensive. It takes time to let a file run so you can analyze its behavior. Fortinet’s FortiSandbox solution is architected to optimize both security effectiveness and speed to results. It is not simply a sandbox, it uses a multi step approach to evaluate and analyze objects, starting with the most efficient technologies and stepping up to more resource intensive approaches as needed. FortiSandbox goes through 5 steps. Step 1: objects are run though Fortinet’s top-rated AV engine. This AV prefilter uses a larger, more extended threat database from FortiGuard Labs in order to catch more variants and older variants of malware. Step 2: FortiSandbox performs a cloud query to see if this file has been previously identified (in some systems this is referred to as a file reputation check) Step 3: the code is put through a simulator and Fortinet’s patented Compact Pattern Recognition Language is used to analyze the code to see if any malicious or suspicious patterns can be identified Steps 1 through 3 are typically performed in just a few seconds. On average these three steps are able to identify over 60% of threats. Step 4: the code is placed in a full virtual sandbox environment and allowed to run. The behavior lifecycle of the code is observed and if the object is malicious, it will expose itself. Step 5: The activity in the sandbox is analyzed to identify if it is malicious or suspicious and the activity is documented. The object is assigned a risk rating and is then reported out. New findings from this analysis can be shared with FortiGuard Labs in order to create new security updates in order to improve the extended FortiGuard security ecosystem.
  • #13: Fortinet also participates in NSS Labs testing for NGFW and Breach Detection Systems. These are the results of the Breach Detection Systems industry tests in 2014. As you can see in the chart, Fortinet tested high for effectiveness and well for performance and value, detecting 99% of threats and delivering results in under 1 minute the majority of the time. The vertical axis shows the security effectiveness results from the test and the horizontal axis shows the performance/value results. Fortinet’s FortiSandbox fell into the upper right quadrant in results and thus earned a Recommended rating from NSS Labs.
  • #14: Left box Label FortiClient Label the different sandbox icons Physical Virtual Cloud and leave ‘FortiSandbox’ below them Delete “All modules communicate” and related icon. Make TimeToProtect bigger, centered more
  • #16: By implementing an Advanced Threat Protection Framework the process of learning, remediating and improving security follows a natural flow. In the Detection and Analysis phase the sandbox identifies suspicious threat activities such as privilege modification and file creation or deletion as well as known malicious behavior such as initiated network traffic or DNS queries. The sandbox can learn details from its analysis in form of file names, URLs, IP addresses and more that can be used in remediation and added to security updates. With the details of a threat attack, including its source and destination from FortiSandbox, it is much easier to instigate immediate remediation activities such as blocking an email sender IP from sending more messages to employees, preventing communications with known command & control addresses, and to quarantine compromised devices within the network to prevent the spread of malware. Finally, the threat information learned by the sandbox has multiple uses. Malicious IP addresses and URLs identified can be added to web filtering and IP reputation lists. File characteristics can be used to create new IPS rules and anti-malware signatures. All this feeds into security updates to improve the protection delivered by all the solutions in the framework.
  • #18: In fact, organizations looking to take a coordinate approach to combating advanced threats benefit from NSS Labs Recommended components including: FortiGate as NGFW and NGIPS in the data center and at the edge FortiWeb in front of external-facing web servers that often serve as entry points to the network FortiClient for Enterprise Endpoint Protection covering users on and off the network FortiSandbox for continuous analysis of seemingly benign objects and sites to detect the most sophisticated attacks that might slip through your defenses.