SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Cisco ThreatGrid:  Malware Analysis and Threat Intelligence
2© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
§  Explain AMP ThreatGRID as an architecture
§  Demo AMP ThreatGRID
Agenda
4© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Malware Analysis and Threat Intelligence Solution
5© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ThreatGRID Advantage
Unified Malware Analysis and Threat Intelligence – Key Features
•  Proprietary analysis delivers unparalleled insight into malicious activity
•  High-speed, automated analysis and adjustable runtimes
•  Does not expose any tags or indicators that malware can use to detect that it is being observed
•  100,000s of samples analyzed daily (6-10 million per month)
•  SaaS delivery (no hardware) or Appliance (as needed)
•  Search and correlate all data elements of a single sample against billons of sample artifacts collected and analyzed
over years (global and historic context)
•  Enable the analyst to better understand the relevancy of sample in question to one’s environment
•  Clearly presented information for all levels of the IT Security team: Tier 1-3 SOC Analysts, Incident Responders &
Forensic Investigators, and Threat Intel Analysts
•  Web portal, Glovebox (User Interaction), Video Replay, Threat Score, Behavioral Indicators and more
•  Architected from the ground up with an API to integrate with existing IT security solutions (Automatically receive
submissions from other solutions and pull the results into your environment)
•  Create custom threat intelligence feeds with context or leverage automated batch feeds
Data Fidelity &
Performance
Scalability & Flexibility
Context & Data
Enrichment
Usability
Integration &
Architecture
6© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ThreatGRID Connectivity: Cloud SaaS Model
Can Be Access via a Web Browser
Security tools can access and
integrate using the ThreatGRID API
Files can be submitted for analysis
All of the results can be easily retrieved
Samples can be compared and searched for
The analyst can also interact with
the sample and change the runtime
from 5 to 30 minutes
Malware analysis, threat intelligence
correlation and feeds retrieval can
be automated and integrated with
existing security solutions
Threat intelligence can be enriched
7© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ThreatGRID Connectivity: Appliance Model
Can Be Access via a Web Browser
Security tools can access and
integrate using the ThreatGRID API
Files can be submitted for analysis
All of the results can be easily retrieved
Samples can be compared and searched for
The analyst can also interact with
the sample and change the runtime
from 5 to 30 minutes
Malware analysis, threat intelligence
correlation and feeds retrieval can
be automated and integrated with
existing security solutions
Threat intelligence can be enriched
But no data is sent to
cloud from appliance
8© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Malware Protection Everywhere
AMP Threat Grid Malware Analysis and Intelligence
Dedicated FirePOWER
Appliance
Web & Email
Security Appliances
Private Cloud
Cloud Based Web Security &
Hosted Email
Mac
OS X
VirtualMobile
PC
FirePOWER Services
on ASA
Enterprise
Capabilities
Continuous &
Zero-Day Detection
Advanced Analytics
And Correlation
9© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Demo
10© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Thank you.

More Related Content

PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Next Generation Security
PDF
Advanced threat security - Cyber Security For The Real World
PDF
Presentation cisco cloud security strategy
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PDF
Cisco Security Architecture
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Scalar Security Roadshow - Toronto Presentation
Tomorrow Starts Here - Security Everywhere
Next Generation Security
Advanced threat security - Cyber Security For The Real World
Presentation cisco cloud security strategy
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Security Architecture
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...

What's hot (20)

PDF
Cisco Security Presentation
PDF
Cisco's 2016 Annual Security report
PPTX
IPS Best Practices
PDF
Cisco connect winnipeg 2018 accelerating incident response in organizations...
PDF
SourceFire IPS Overview
PDF
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Cisco amp for meraki
PDF
Talk2 esc4 muscl-ids_v1_2
PDF
The Four Horsemen of Mobile Security
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
Pactera - Cloud, Application, Cyber Security Trend 2016
PDF
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PDF
Talk1 esc3 muscl-standards and regulation_v1_1
PDF
Cisco umbrella overview
PDF
Scalar Security Roadshow - Ottawa Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Cisco Security Presentation
Cisco's 2016 Annual Security report
IPS Best Practices
Cisco connect winnipeg 2018 accelerating incident response in organizations...
SourceFire IPS Overview
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Building Up Network Security: Intrusion Prevention and Sourcefire
Sourcefire Webinar - NEW GENERATION IPS
Cisco amp for meraki
Talk2 esc4 muscl-ids_v1_2
The Four Horsemen of Mobile Security
Scalar Security Roadshow - Vancouver Presentation
Pactera - Cloud, Application, Cyber Security Trend 2016
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Talk1 esc3 muscl-standards and regulation_v1_1
Cisco umbrella overview
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Calgary Presentation
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Ad

Similar to Cisco ThreatGrid: Malware Analysis and Threat Intelligence (20)

PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
PDF
Winning Strategy For Hybrid Cloud Environments
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PDF
CISSP-2022 Update domain 3 certification handouts
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
PDF
What are the best tools used in cybersecurity in 2023.pdf
PPTX
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
PDF
Cisco Content Security
PPTX
API Security: Essential Practices for Developers
PDF
Cisco SecureX.pdf
DOCX
Best Practices, Types, and Tools for Security Testing in 2023.docx
PPTX
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Bridging the Security Testing Gap in Your CI/CD Pipeline
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk for Enterprise Security featuring User Behavior Analytics
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
Winning Strategy For Hybrid Cloud Environments
Splunk for Enterprise Security Featuring User Behavior Analytics
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
CISSP-2022 Update domain 3 certification handouts
CONFidence2015: Real World Threat Hunting - Martin Nystrom
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
What are the best tools used in cybersecurity in 2023.pdf
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Cisco Content Security
API Security: Essential Practices for Developers
Cisco SecureX.pdf
Best Practices, Types, and Tools for Security Testing in 2023.docx
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Ad

More from Cisco Canada (20)

PDF
Cisco connect montreal 2018 net devops
PDF
Cisco connect montreal 2018 iot demo kinetic fr
PPTX
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
PDF
Cisco connect montreal 2018 vision mondiale analyse locale
PDF
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
PDF
Cisco connect montreal 2018 collaboration les services webex hybrides
PDF
Integration cisco et microsoft connect montreal 2018
PDF
Cisco connect montreal 2018 compute v final
PDF
Cisco connect montreal 2018 saalvare md-program-xr-v2
PDF
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
PDF
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect Toronto 2018 DevNet Overview
PDF
Cisco Connect Toronto 2018 DNA assurance
PDF
Cisco Connect Toronto 2018 network-slicing
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco Connect Toronto 2018 sixty to zero
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco connect montreal 2018 collaboration les services webex hybrides
Integration cisco et microsoft connect montreal 2018
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 sixty to zero

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
NewMind AI Monthly Chronicles - July 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf

Cisco ThreatGrid: Malware Analysis and Threat Intelligence

  • 2. 2© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 3. 3© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential §  Explain AMP ThreatGRID as an architecture §  Demo AMP ThreatGRID Agenda
  • 4. 4© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Malware Analysis and Threat Intelligence Solution
  • 5. 5© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ThreatGRID Advantage Unified Malware Analysis and Threat Intelligence – Key Features •  Proprietary analysis delivers unparalleled insight into malicious activity •  High-speed, automated analysis and adjustable runtimes •  Does not expose any tags or indicators that malware can use to detect that it is being observed •  100,000s of samples analyzed daily (6-10 million per month) •  SaaS delivery (no hardware) or Appliance (as needed) •  Search and correlate all data elements of a single sample against billons of sample artifacts collected and analyzed over years (global and historic context) •  Enable the analyst to better understand the relevancy of sample in question to one’s environment •  Clearly presented information for all levels of the IT Security team: Tier 1-3 SOC Analysts, Incident Responders & Forensic Investigators, and Threat Intel Analysts •  Web portal, Glovebox (User Interaction), Video Replay, Threat Score, Behavioral Indicators and more •  Architected from the ground up with an API to integrate with existing IT security solutions (Automatically receive submissions from other solutions and pull the results into your environment) •  Create custom threat intelligence feeds with context or leverage automated batch feeds Data Fidelity & Performance Scalability & Flexibility Context & Data Enrichment Usability Integration & Architecture
  • 6. 6© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ThreatGRID Connectivity: Cloud SaaS Model Can Be Access via a Web Browser Security tools can access and integrate using the ThreatGRID API Files can be submitted for analysis All of the results can be easily retrieved Samples can be compared and searched for The analyst can also interact with the sample and change the runtime from 5 to 30 minutes Malware analysis, threat intelligence correlation and feeds retrieval can be automated and integrated with existing security solutions Threat intelligence can be enriched
  • 7. 7© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ThreatGRID Connectivity: Appliance Model Can Be Access via a Web Browser Security tools can access and integrate using the ThreatGRID API Files can be submitted for analysis All of the results can be easily retrieved Samples can be compared and searched for The analyst can also interact with the sample and change the runtime from 5 to 30 minutes Malware analysis, threat intelligence correlation and feeds retrieval can be automated and integrated with existing security solutions Threat intelligence can be enriched But no data is sent to cloud from appliance
  • 8. 8© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Malware Protection Everywhere AMP Threat Grid Malware Analysis and Intelligence Dedicated FirePOWER Appliance Web & Email Security Appliances Private Cloud Cloud Based Web Security & Hosted Email Mac OS X VirtualMobile PC FirePOWER Services on ASA Enterprise Capabilities Continuous & Zero-Day Detection Advanced Analytics And Correlation
  • 9. 9© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Demo
  • 10. 10© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 11. 11© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential