Cisco Content Security Technology Overview and Update
Total Page:16
File Type:pdf, Size:1020Kb
Cisco Content Security Technology Overview And Update Hrvoje Dogan Security Solutions Architect, SBG [email protected] C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 • Email Security Evolution • Inbound Protection Features • Outbound Control Features Agenda • Web Security Trends • Web Security Appliance and Update • Cloud Web Security and Update C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document. C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Email Threat Landscape Evolution: Inbound HIGH VOLUME LOW VOLUME ? LOW $ VALUE HIGH $ VALUE Past Today Tomorrow ??? Targeted Attacks Virus Outbreaks Blended Phishing Threats Targeted Spam Phishing Network Evasions Inbound Threats Inbound Polymorphic Code Botnets Advanced Conficker Persistent Threats Covert, Sponsored Image Targeted Attacks Code Red Spam Slammer Stuxnet Custom URL Attachment-based Worms C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Email Threat Landscape Evolution: Outbound LOW VOLUME HIGH VOLUME ? LOW $ IMPACT HIGH $ IMPACT Past Today Tomorrow Changing legislation Intellectual property European Union laws Customer asset loss Trade secrets Data breaches State laws Federal laws Outbound Compliance Corporate espionage Province laws Legal documents HIPAA State regulations Credit card numbers PCI Product-planning documents 4 Brand Social security numbers Access email only By 2015, access Access email from behind from over 7B Usage anywhere, anytime corporate firewall mobile devices C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Global Spam Volume Trend Tripled since January Highest level since 2010 Anti-spam industry problem Cisco maintains efficacy leadership Source: http://www.opus1.com/www/whitepapers/antispamresults2013.pdf Volume UP = Count of Spam UP Source: http://www.spamcop.net/spamgraph.shtml?spamyear Source: http://cbl.abuseat.org/totalflow.html C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Jan 2013 – Apr 2014 C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Missed Spam Analysis Offer spam (Micro-category) = Sell goods or services. Categories of Missed Spam (customer submissions since Jan/14) Diplomas Mkt Svcs Casino Majority of Offer spam uses Snowshoe techniques Seminar Link Insurance Malware Dating Porn Luxury Snowshoe spam – technique used by spammers to Drug Loan Stocks Lottery cover their tracks, go under the radar. Its objective is Job to defeat traditional Anti-Spam techniques. Scam short campaigns – morphs fast – constantly changing Phish Anti-Sender Reputation Anti-Content Analysis • Never use the same IP to send • Never use the same series of more than x amount of spam in words more than y period of time. • Never reuse the same images • Never send the same spam • Never use the same URL Offer from the same IP. Not “new” techniques, however, usage has increased Fine line to balance catch rate and false positive C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Opus One Report April 2014 Cisco’sThis graphic email securitywas published solution by demonstrated Opus One in thetheir highest2014 “COMPARING spam capture INDUSTRY-LEADINGrate and the most accurate rate of detection. The results are remarkable given the tradeoffANTI-SPAM between SERVICES” spam capture and false positive rates.All of theFor anti-spam example, solutions a vendor in Gartner’s can catchJuly 2013 100% “Leaders” of spamand “Challengers” if they block Magic every Quadrant message categories but were then tested. the falseIn total, eight vendors were evaluated over the course of a year. positiveThe only ratevendor would mentioned also by be name 100%, is Cisco which (Cisco’s is obviously Email unacceptable.Security Appliance was previously called “Ironport” but Cisco is Ciscophasing consistently out the IronPort outperformed brand name). The the remaining other vendors, vendor names have been obfuscated. with the highest spam capture rate in eight of the twelveTo ensure months consistency measured. and reliability, When Opus another One operated vendor within had the following parameters during the 12-month long analysis from a Januarybetter 2013anti-spam to December catch 2013. rate than Cisco, it came at the cost of a significantly higher false positive rate: from 16 to 40 times worse. Opus One Joel Snyder, April 2014 C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 There is no Silver Bullet Attack Continuum BEFORE DURING AFTER Control Detect Scope Enforce Block Contain Harden Defend Remediate Gaps in protection Point-in-time Malware prevention as new attack defenses can be is not 100% vectors emerge evaded C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Email Security Threat Defense Complete Inbound Protection SenderBase Reputation Filtering Drop Anti-Spam Drop/Quarantine Cisco® SIO Anti-Virus Drop/Quarantine Advanced Malware Protection AMP Drop/Quarantine Outbreak Filters Quarantine/Re-write Real-time URL Analysis cws Re-write Deliver Quarantine Drop URLs C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Cisco SenderBase: Email Reputation Database Threat Intelligence Spam Traps Complaint IP Blacklists • Over 1.6M global devices Reports and Whitelists • Historical library of 40,000 threats • 35% of global email traffic seen per day • 13B+ Worldwide web requests seen per day • 200+ parameters tracked Message Compromised Website • Multi-vector visibility Composition Host Lists Composition Data Data Benefits • 360 degree dynamic threat visibility Global Volume Domain Other Data • Understanding of vulnerabilities and Data Blacklist and exploit technologies Safelists • Visibility into highest threat vehicles • Latest attack trends and techniques IP Reputation Score C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. -10 0 +10 Cisco Confidential 12 DKIM and SPF DNS Email Authentication Your Company Trusted_Partner.com Verified SIGNEDü Cisco ESA Imposter Trusted_Partner.com Drop/Quarantine • Block phishing and spoofing attacks • Apply more liberal policies to AUTHENTICATED external sources C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 DMARC DNS Standardizing Email Authentication DMARC p=reject Trusted_Partner.com Verified SIGNEDü Report Cisco ESA Imposter Drop/Quarantine Trusted_Partner.com • Reduce the exposure of your users to phishing • Tie DKIM and SPF together and address their shortcomings • Identifies actions to take if message authentication fails for sender’s domains • Allows for sending of aggregate reports back to sending domain to inform of message disposition C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 URL Defense Integrated email and web security Rewrite Email Contains URL Send to Cloud BLOCKEDwww.playboy.comBLOCKED Defang BLOCKEDwww.proxy.orgBLOCKED Cisco SIO Replace “This URL is blocked by policy” URL Categorization C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Cisco Zero-Hour Malware Protection Advanced Malware Protection Reputation SourceFire AMP update integration File File Reputation Sandboxing Known File Unknown files are Reputation uploaded for sandboxing Advanced Malware Protection Outbreak Filters Cloud Powered Zero-Hour Telemetry Based Zero-Hour Malware Detection Virus and Malware Detection C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Key Features of AMP • Blocks files known to be malicious File Reputation • Reputation verdicts delivered by AMP cloud intelligence network • Behavioral analysis of unknown files File Sandboxing • Looks for suspicious behavior • Feeds intelligence back to AMP cloud • Continuous analysis of files that have traversed the gateway File Retrospection • Retrospective alerting after an attack when file is determined to be malicious C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Layered Protection across the Attack Continuum Reputation Filtering Block BEFORE Cisco® SIO URL Filtering Block Signature, AV, Spam scanning Block DURING File Reputation Block SourceFire AMP Cloud File Behavior Block AFTER File Retrospection Alert C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Email Security Provides Strong Outbound Control Rate Limiting Encrypt AS/AV Checks Compliance/ DKIM/SPF Outbound DLP Sensitive Data Sender Recipient C97-728331-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Rate Limiting Outbound Rate Limit Per Mail