Bloxfest 2016 - SEC-01 - Security Vision Strategy
Bloxfest 2016 - SEC-01 - Security Vision Strategy
Malicious Visibility
Intent
Authoritative Distributed Database
• Protect DNS
• Break the Malware Control Plane
SaaS/
Cloud
Reflection
DNS DoS
Exploits
Vulnerability
Scanning Endpoint
Infoblox
DDI &
Active
Trust
APT/
Malware
Product Advanced DNS DNS Firewall ActiveTrust™ & Dossier Secure Data Exchange
Strategy Protection (DDoS) Threat Insight Ecosystem API’s
Technology Ecosystem
Strategy Analytics
Threat Intelligence
Data Sharing
Secure DNS: Infoblox Advanced DNS Protection
Protecting critical DNS services
Legitimate Traffic
• Hardened OS
• Dedicated
Infoblox platforms
Threat-rule designed to
Server
withstand DDOS
attacks
Automatic Updates
• Signatures to
(Threat Adapt) Infoblox detect and block
Advanced DNS
Protection Infoblox Advanced
exploitation of
(External DNS) DNS Protection vulnerabilities
(Internal DNS)
Data for
Reports
Grid Master
Reporting
and Analytics
Reports on attack types, severity
Breaking the Malware Control Plane
Malware & Data Exfiltration
Threat Intel Platform
• Malware containment and control
• DNS Firewall: Ubiquitous visibility and blocking
• Adding high quality Threat Intelligence
• Offer additional 3rd party Threat data INTERNET
Central Office / Data Center Devices On Premise Devices Roaming Devices • Data exfiltration prevention
with Mobile Client with Mobile Client • Malware containment and control
On Premise Off Premise
Threat Intel Data Exchange - Ecosystem
Verified, validated
threat intelligence Contextual Threat Data,
ActiveTrust
Indicators of Compromise
DNS Firewall
as-a-service
Context Driven Threat Intelligence Driving Operational
Efficiency
Network Context and Control Collective Threat Intelligence
Context-Aware Security
• Prioritize response to threats based on enterprise context and risk
• Protect by instantly blocking malicious activity on both on-premise and
off-premise devices; share threat data with ecosystem for additional action
• Predict threats using ecosystem, vertical and geo data
Security Analytics Strategy
Leveraging Threat
Intelligence, DDI and What’s on my network?
Are devices compliant to policy?
3rd party data to Are admins compliant to policy?
provide
• New and Deeper
insights into threats Infoblox:
Actionable Which devices are infected & how?
• Automation of Network How do I prioritize security events
Intelligence and eval risk?
analysis and How do I auto-gather data to do
compliance to save incident response?
A DHCP assignment signals the Fixed IP addresses are typically DNS is the first step in almost every
insertion of a device on to the assigned to important devices: activity, good or bad.
network
• Data center servers, network DNS query data provides a “client-
• Includes context: Device info, MAC, devices, etc. centric” record of activity
lease history
• IPAM provides “metadata” • Includes internal activity inside the
• DHCP is an audit trail of devices on (additional business context) via security perimeter
the network EAs: Owner, app, security level,
location, ticket number • Includes BYOD and IoT devices
INTERNET
3
INTRANET
Malware/APT
1 3
2 Infoblox DNS Firewall
1 An infected device brought into the office. 3 Infoblox DNS Firewall blocks endpoint DNS query
and sends alert to Carbon Black. 5 An update will occur every 2 hours (or more
often for significant threat).