SlideShare a Scribd company logo
ADVANCED THREAT PROTECTION
SANDBOXING 101

KEVIN FLYNN
PRODUCT MARKETING
OCTOBER, 2013

Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

1
ADVANCED THREAT PROTECTION SOLUTION
LIFECYCLE DEFENSE
The Blue Coat ATP solution delivers the
industry’s most comprehensive
protection through the following:
1) Lifecycle Defense: Protection that
maps to three threat stages: Realtime blocking for known threats and
malware sources (malnets);
Advanced threat analysis for
unknown threats; and Dwell time
reduction for latent threats
2) Adaptive Malware Analysis:
Dynamic APT protection that
analyzes unknown threats and
shares information with other
systems in the security infrastructure
to increase protection efficiency for
unknown and latent threats
3) Network Effect: APT information
sharing between 75M users in
15,000 organizations through a
feedback loop into the Blue Coat
Global Intelligence Network
Blue Coat Confidential – Internal Use Only

STAGE 3

STAGE 1

Resolve &
Remediate
Threats
Discovered on
the Network

Block &
Enforce
All Known Threats
GLOBAL
INTELLIGENCE
NETWORK

STAGE 2
Detect &
Analyze
Unknown Threats

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

2
WHY SANDBOXING?
DETECTING & ANALYZING UNKNOWN THREATS

 Traditional network
defenses are great at
dealing with known-threats,
terrible at dealing with
unknown-threats
 Unknown threats require
dynamic analysis (aka
detonation) in the form of a
virtual machine and/or
bare-metal or emulation
sandbox

 Tight integration is
necessary between the
sandbox and your web
gateway
Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

3
BLUECOAT SANDBOX
MALWARE ANALYSIS APPLIANCE
CORE TECHNOLOGY
Hybrid Analysis
Unmatched intelligence


SandBox emulation



IntelliVM virtualization

Behavioral Patterns
Expose targeted attacks


Detection patterns



Open source patterns



Custom patterns

Plug-in Architecture
Extend detection and processing


Interact with running malware



Click-through dialogs and installers

Blue Coat Confidential – Internal Use Only

SandBox

IntelliVM

Software x86
emulator

Full Windows XP or
Win 7 licensed
software

Hardware emulation

Hardware virtualization

Generates numerous
low-level events –
page faults,
exceptions, etc.

Generates high-level
events – file, registry,
network, process, etc.

Emulated network
access and services

Real network access
and services

Hook-based event
introspection

KernelScout filter
driver captures lowlevel events

Add your own
patterns

Add your own patterns

Supports EXEs and
DLLs

Wide range of file
support

Portable executable
memory dumps

Extend processing
with plugins

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

4
BEHAVIORAL DETECTION PATTERNS
INTELLIVM PROFILES AND PLUGINS
 Generic and malware campaign specific patterns
• Trojan, spyware, worm, ransomware

 Extensive pattern library
•
•
•
•

Core patterns (incl. WebPulse info)
Create your own patterns
All matching patterns will trigger
Global and user-specific patterns

 Risk scoring
• Set by highest matched pattern
• Scores update with new patterns
• Script notification triggers for further action

Patterns can detect targeted and single-use
malware, and do not rely on signature-based
detection methodologies
Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

5
MALWARE APPLIANCE
KEY FEATURES
Malware Appliance
Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance
– Automated bulk sample processing and risk scoring
– Parallel processing on up to 40 virtual machines per appliance
Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM
IntelliVMs – Replicate actual production environments including custom applications
Plugins – Interact with malware, click through installers, extend custom processing
Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining
Open Patterns – Detection criteria is never hidden; Users can add custom patterns
Powerful RESTful API – Full programmatic access for integration and automation
Pub-Sub API – Secure notifications of analysis task status and task completion
Remote management, security, and health status monitoring eases deployment

Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

6
BLOCKING, DETECTION & ANALYSIS

ProxySG + CAS + Malware Analysis Appliance (Sandbox)

Proxy SG

Content Analysis System
Malware Analysis System

Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

7
WWW.BLUECOAT.COM

Blue Coat Confidential – Internal Use Only

Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

8

More Related Content

PDF
CAS MAA Infographic
Blue Coat
 
PDF
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 
PDF
Revolutionizing Advanced Threat Protection
Blue Coat
 
PPTX
Content Analysis System and Advanced Threat Protection
Blue Coat
 
PPTX
Advanced Threat Protection
Lan & Wan Solutions
 
PPSX
SonicWALL Advanced Features
David Perkins
 
PPTX
Preventing Today's Malware
David Perkins
 
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 
CAS MAA Infographic
Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 
Revolutionizing Advanced Threat Protection
Blue Coat
 
Content Analysis System and Advanced Threat Protection
Blue Coat
 
Advanced Threat Protection
Lan & Wan Solutions
 
SonicWALL Advanced Features
David Perkins
 
Preventing Today's Malware
David Perkins
 
Make Every Spin Count: Putting the Security Odds in Your Favor
David Perkins
 

What's hot (20)

PPTX
Thinking Differently About Security Protection and Prevention
David Perkins
 
PPTX
Cerdant Security State of the Union
David Perkins
 
PDF
Advanced Threat Defense Intel Security
xband
 
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
PDF
Cyber Kill Chain vs. Cyber Criminals
David Sweigert
 
PPTX
Taking the battle to Ransomware with Sophos Intercept X
Sophos Benelux
 
PDF
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
PPTX
Humla workshop on Android Security Testing - null Singapore
n|u - The Open Security Community
 
PPTX
Two for Attack: Web and Email Content Protection
Cisco Canada
 
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension Inc.
 
PDF
Managing third party libraries
n|u - The Open Security Community
 
PPTX
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
PDF
Cisco amp for endpoints
Cisco Canada
 
PDF
Cisco amp everywhere
Cisco Canada
 
PDF
Talos threat-intelligence
xband
 
PPTX
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
PDF
Cisco amp for networks
Cisco Canada
 
PDF
Security Implications of the Cloud - CSS ATX 2017
Alert Logic
 
PDF
Cisco NGFW AMP
Cisco Canada
 
Thinking Differently About Security Protection and Prevention
David Perkins
 
Cerdant Security State of the Union
David Perkins
 
Advanced Threat Defense Intel Security
xband
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
Cyber Kill Chain vs. Cyber Criminals
David Sweigert
 
Taking the battle to Ransomware with Sophos Intercept X
Sophos Benelux
 
Security Implications of the Cloud - CSS Dallas Azure
Alert Logic
 
Humla workshop on Android Security Testing - null Singapore
n|u - The Open Security Community
 
Two for Attack: Web and Email Content Protection
Cisco Canada
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension Inc.
 
Managing third party libraries
n|u - The Open Security Community
 
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
Cisco amp for endpoints
Cisco Canada
 
Cisco amp everywhere
Cisco Canada
 
Talos threat-intelligence
xband
 
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
Cisco amp for networks
Cisco Canada
 
Security Implications of the Cloud - CSS ATX 2017
Alert Logic
 
Cisco NGFW AMP
Cisco Canada
 
Ad

Viewers also liked (16)

PPTX
Wccp introduction final2
bui thequan
 
PPTX
Cloud Sandboxing Solution for Cyber Ranges
QualiQuali
 
PDF
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
PDF
Enhancing Authentication to Secure the Open Enterprise
Symantec
 
PDF
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Eliza Hedegaard
 
PDF
DLP Executive Overview
Kim Jensen
 
PPTX
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
PPT
Hack In Paris 2011 - Practical Sandboxing
Tom Keetch
 
PDF
Secure and Simple Sandboxing in SELinux
James Morris
 
PDF
2010-11 The Anatomy of a Web Attack
Raleigh ISSA
 
PDF
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
PDF
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
NetCraftsmen
 
PDF
Stopping zero day threats
Zscaler
 
PPSX
Bluecoat Services
ChessBall
 
PPT
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
SolarWinds
 
PPT
Redefining Endpoint Security
Burak DAYIOGLU
 
Wccp introduction final2
bui thequan
 
Cloud Sandboxing Solution for Cyber Ranges
QualiQuali
 
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Enhancing Authentication to Secure the Open Enterprise
Symantec
 
Mimecast Case Study - Targeted Threat Protection - Berrymans Lace Mawer
Eliza Hedegaard
 
DLP Executive Overview
Kim Jensen
 
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
Hack In Paris 2011 - Practical Sandboxing
Tom Keetch
 
Secure and Simple Sandboxing in SELinux
James Morris
 
2010-11 The Anatomy of a Web Attack
Raleigh ISSA
 
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
Infoblox Cloud Solutions - Cisco Mid-Atlantic User Group
NetCraftsmen
 
Stopping zero day threats
Zscaler
 
Bluecoat Services
ChessBall
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
SolarWinds
 
Redefining Endpoint Security
Burak DAYIOGLU
 
Ad

Similar to Advanced Threat Protection - Sandboxing 101 (20)

PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
PDF
Custom defense - Blake final
Minh Le
 
PPTX
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
PDF
Advanced Endpoint Protection
Mustafa YÜKSEL
 
PDF
Symantec Endpoint Suite
MarketingArrowECS_CZ
 
PPTX
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
PPTX
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Ingram Micro Cloud
 
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
PDF
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
CyberPro Magazine
 
PPTX
Endpoint Security Pres.pptx
NBBNOC
 
PPTX
Cyber Incident Response Proposed Strategies
Dam Frank
 
PPTX
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
PDF
WithSecure Deepguard WhitePaper
lincktello
 
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
 
PDF
Complete Endpoint protection
xband
 
PPTX
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
PDF
Marlabs cyber threat management
Rajendra Menon
 
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault
 
PDF
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Custom defense - Blake final
Minh Le
 
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Advanced Endpoint Protection
Mustafa YÜKSEL
 
Symantec Endpoint Suite
MarketingArrowECS_CZ
 
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015
Ingram Micro Cloud
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
CyberPro Magazine
 
Endpoint Security Pres.pptx
NBBNOC
 
Cyber Incident Response Proposed Strategies
Dam Frank
 
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
WithSecure Deepguard WhitePaper
lincktello
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
mahadikamol123
 
Complete Endpoint protection
xband
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Marlabs cyber threat management
Rajendra Menon
 
How to Detect a Cryptolocker Infection with AlienVault USM
AlienVault
 
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 

More from Blue Coat (9)

PDF
Education is the Key to Fighting Cyber Crime
Blue Coat
 
PDF
What is Heartbleed?
Blue Coat
 
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
 
PDF
Empowering the Campus Network
Blue Coat
 
PDF
Why Your Mobile Device Isn’t As Secure As You Think
Blue Coat
 
PDF
How Safe Is YOUR Social Network?
Blue Coat
 
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Blue Coat
 
PDF
Are You a Hacker's Target?
Blue Coat
 
PDF
How To Catch A Hidden Spammer
Blue Coat
 
Education is the Key to Fighting Cyber Crime
Blue Coat
 
What is Heartbleed?
Blue Coat
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
 
Empowering the Campus Network
Blue Coat
 
Why Your Mobile Device Isn’t As Secure As You Think
Blue Coat
 
How Safe Is YOUR Social Network?
Blue Coat
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Blue Coat
 
Are You a Hacker's Target?
Blue Coat
 
How To Catch A Hidden Spammer
Blue Coat
 

Recently uploaded (20)

PPTX
C Programming Basics concept krnppt.pptx
Karan Prajapat
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PDF
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
C Programming Basics concept krnppt.pptx
Karan Prajapat
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
Software Development Company | KodekX
KodekX
 
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Captain IT
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Software Development Methodologies in 2025
KodekX
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
NewMind AI Monthly Chronicles - July 2025
NewMind AI
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Doc9.....................................
SofiaCollazos
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 

Advanced Threat Protection - Sandboxing 101

  • 1. ADVANCED THREAT PROTECTION SANDBOXING 101 KEVIN FLYNN PRODUCT MARKETING OCTOBER, 2013 Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 1
  • 2. ADVANCED THREAT PROTECTION SOLUTION LIFECYCLE DEFENSE The Blue Coat ATP solution delivers the industry’s most comprehensive protection through the following: 1) Lifecycle Defense: Protection that maps to three threat stages: Realtime blocking for known threats and malware sources (malnets); Advanced threat analysis for unknown threats; and Dwell time reduction for latent threats 2) Adaptive Malware Analysis: Dynamic APT protection that analyzes unknown threats and shares information with other systems in the security infrastructure to increase protection efficiency for unknown and latent threats 3) Network Effect: APT information sharing between 75M users in 15,000 organizations through a feedback loop into the Blue Coat Global Intelligence Network Blue Coat Confidential – Internal Use Only STAGE 3 STAGE 1 Resolve & Remediate Threats Discovered on the Network Block & Enforce All Known Threats GLOBAL INTELLIGENCE NETWORK STAGE 2 Detect & Analyze Unknown Threats Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 2
  • 3. WHY SANDBOXING? DETECTING & ANALYZING UNKNOWN THREATS  Traditional network defenses are great at dealing with known-threats, terrible at dealing with unknown-threats  Unknown threats require dynamic analysis (aka detonation) in the form of a virtual machine and/or bare-metal or emulation sandbox  Tight integration is necessary between the sandbox and your web gateway Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 3
  • 4. BLUECOAT SANDBOX MALWARE ANALYSIS APPLIANCE CORE TECHNOLOGY Hybrid Analysis Unmatched intelligence  SandBox emulation  IntelliVM virtualization Behavioral Patterns Expose targeted attacks  Detection patterns  Open source patterns  Custom patterns Plug-in Architecture Extend detection and processing  Interact with running malware  Click-through dialogs and installers Blue Coat Confidential – Internal Use Only SandBox IntelliVM Software x86 emulator Full Windows XP or Win 7 licensed software Hardware emulation Hardware virtualization Generates numerous low-level events – page faults, exceptions, etc. Generates high-level events – file, registry, network, process, etc. Emulated network access and services Real network access and services Hook-based event introspection KernelScout filter driver captures lowlevel events Add your own patterns Add your own patterns Supports EXEs and DLLs Wide range of file support Portable executable memory dumps Extend processing with plugins Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 4
  • 5. BEHAVIORAL DETECTION PATTERNS INTELLIVM PROFILES AND PLUGINS  Generic and malware campaign specific patterns • Trojan, spyware, worm, ransomware  Extensive pattern library • • • • Core patterns (incl. WebPulse info) Create your own patterns All matching patterns will trigger Global and user-specific patterns  Risk scoring • Set by highest matched pattern • Scores update with new patterns • Script notification triggers for further action Patterns can detect targeted and single-use malware, and do not rely on signature-based detection methodologies Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 5
  • 6. MALWARE APPLIANCE KEY FEATURES Malware Appliance Enterprise Scalability – Approximately 50,000 analysis tasks per day per appliance – Automated bulk sample processing and risk scoring – Parallel processing on up to 40 virtual machines per appliance Hybrid Analysis – Superior threat dual-detection methodology using SandBox and VM IntelliVMs – Replicate actual production environments including custom applications Plugins – Interact with malware, click through installers, extend custom processing Best-in-class full-featured Web-UI, Analysis Desktop, searching and data mining Open Patterns – Detection criteria is never hidden; Users can add custom patterns Powerful RESTful API – Full programmatic access for integration and automation Pub-Sub API – Secure notifications of analysis task status and task completion Remote management, security, and health status monitoring eases deployment Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 6
  • 7. BLOCKING, DETECTION & ANALYSIS ProxySG + CAS + Malware Analysis Appliance (Sandbox) Proxy SG Content Analysis System Malware Analysis System Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 7
  • 8. WWW.BLUECOAT.COM Blue Coat Confidential – Internal Use Only Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. 8