Dal cloud un aiuto per contrastare il malware, e un pizzico di
Transcription
Dal cloud un aiuto per contrastare il malware, e un pizzico di
Dal cloud un aiuto per contrastare il malware, e un pizzico di compliance Francesco Armando, Technical account manager Roma, 12 Aprile 2016 Qualys-che? 2 Extensible Cloud Platform Highly Scalable Architecture PC Integrated CM AM AM VM VM PCI PC QS MDS CM AM VM PCI MDS PC WAS QS WAF MDS LM WAS CM PCI PC LM QS WAF Suite of PCI PCPC MDS WAS WAS WAF LM WAF LM Applications AMAM VMVM PCI QSQS MDS t Policy Compliance r ce t 3B Scans Per Annum Qualys API Analytics and Reporting Engines Reporting & Dashboards Remediation & Workflows Erlang Distributed Correlation ElasticSearch Clusters Solr Lucene Idexing Oracle & BFFS Storage Distributed Sensors 3 100B Detections 1T Security Datapoints W Blue Chip Global Customer Base 40% Fortune 500 and 24% of the Forbes Global 2,000 8,800+ Customers 8 of top 10 in Software 8 of top 10 in Technology 8 of top 10 in Biotechnology DAIMLER 8 of top 10 in Retail 7 of top 10 in Banking 7 of top 10 in Media 6 of top 10 in Telecommunications 6 of top 10 in Chemical 6 of top 10 in Car Manufacturing 5 of top 10 in Business Services Based on Forbes Global 2000 Classification 4 AssetView with ElasticSearch and Dynamic Dashboards Instant Query across millions of IT Assets Vulnerability Risk Analysis dashboard Unified Assets’ View Synchronisation with Splunk, ServiceNow & Others Dynamic and customizable dashboards 5 Disruptive Cloud Agent Platform Continuous Security across On-Premise, Endpoints and Elastic Cloud Environments Beam-up info in real-time Lightweight 2Mb Agents Centrally Managed and self-updating Delta-based approach 66 AssetView Inventory Service Bring IT & Security together Provides free Cloud Agent for Inventory Included with Vulnerability Management Integrated in the Qualys Cloud Platform 77 APT? 10 (dieci!) CVE sono alla base almeno del 95% degli attacchi andati a buon fine descritti nel DBIR di Verizon del 2015 e 2014. Easy & Manageable… Vulnerability Management File Integrity Monitoring Malware Protection IOC Detection Continuous Monitoring Asset Discovery & Sync. Endpoint Detection & Response Policy Compliance Enterprise Certificate Management Security Assessment Questionnaire Web Application Security Patch Management Centrally Managed – Single pane of glass - Self Updating 10 Surveillance,IoT,Scalable? Qualys. 12 Qualys. Qualche numero. 13 Why Vulnerability Management? DON’T GET BREACHED! Majority of breaches happen due to exploitation of known vulnerabilities Discover assets & Report & Search Prioritize Threats Remediate/Patch AssetView ThreatPROTECT Patch vulns at scale Vulnerability Management Management* 15 9 8 Vulnerabilities Published (1000’s) 7 6 5 4 3 2 1 0 2010 1 2011 2012 2013 2014 2015 17 "Organizations would need access to all threat intelligence indicators in order for the information to be helpful—a Herculean task" Verizon Data Breach Report - 2015 1 Introducing ThreatPROTECT Quickly and accurately pinpoint assets across entire environment that have highest exposure to latest threats Company Confidential 19 PublicExploit EasyExploit ZeroDay NoPatchAvailable AcGvelyAHacked HighDataLoss HighLateral Movement DenialofService Qualys Research Lab Global 24x7 team 2 ThreatPROTECT Actionable Threat Intelligence Holistic and Contextual View of the Threat Landscape Visualize & Prioritize Remediation efforts 21 farmando@qualys.com Nasdaq: QLYS