{"id":15658,"date":"2019-06-26T12:00:03","date_gmt":"2019-06-26T20:00:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/06\/26\/news-9406\/"},"modified":"2019-06-26T12:00:03","modified_gmt":"2019-06-26T20:00:03","slug":"news-9406","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/26\/news-9406\/","title":{"rendered":"Three Network Security Questions with CEITEC\u2019s CIO"},"content":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Wed, 26 Jun 2019 18:16:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"223\" height=\"143\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/06\/logo_CEITEC-large.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" \/><\/p>\n<p>Ireneo Demanarig is the Chief Information Officer at CEITEC S.A. located in Porto Alegre, Rio Grande do Sul, Brazil. CEITEC is a microelectronics manufacturer that specializes in solutions such as automatic identification (RFID and smartcards), application-specific integrated circuits (ASICs) aimed at identifying animals, and much more.<\/p>\n<p>Recently, I jumped on the phone with Ireneo and asked him three questions about his deployment of Trend Micro Network Defense products. And here is what he had to say.<\/p>\n<p><strong>Can you briefly describe your network protection?<\/strong><\/p>\n<p>We are using a Palo Alto Networks Next Gen Firewall and an F5 DNS at the perimeter with a <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/intrusion-prevention.html\">TippingPoint IPS<\/a> sitting in-line behind both of them. Off our core switch we are running <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/inspector.html\">Deep Discovery Inspector<\/a> to protect us from advanced threats.\u00a0 Some people consider using a Next Gen Firewall along with an IPS is redundant but that is not the case. They both protect my network in different ways.\u00a0 The firewall protects my applications while my IPS helps keep the threats at bay.\u00a0 A great example was WannaCry.\u00a0 My next gen firewall missed it but my IPS was able to block every attempt.\u00a0 I also know that if threats get past both of them I can rely on Deep Discovery Inspector to detect the threat as it moves in, out or across my network.<\/p>\n<p><em>Toward the end of 2018 Trend Micro released <\/em><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/deep-discovery-threat-intelligence-network-analytics.html\"><em>Deep Discovery Network Analytics<\/em><\/a><em> add-on module, which will correlate Deep Discovery Inspector events and display the entire attack lifecycle graphically for quicker response to threats.\u00a0 CEITEC was one of the first customers to do a proof of concept on the new module<\/em>.\u00a0\u00a0<strong>\u00a0<\/strong><\/p>\n<p><strong>When you did the proof of concept with Deep Discovery Network Analytics what were you able to see?<\/strong><\/p>\n<p>The proof of concept was a real eye opener for us.\u00a0 Deep Discovery Inspector generates a lot of events and we have a limited staff.\u00a0 So we can only focus on the highest level detections.\u00a0 We don\u2019t have time to look at all events, much less try to connect the dots between multiple events.\u00a0 The Deep Discovery Network Analytics showed us a number of detected attacks that were buried in the events.\u00a0 Specifically it found a coin miner that had been hiding in our network.\u00a0 Network Analytics showed us all the users that were being used in this attack and where they were calling out to.\u00a0 Correlating all this info would have taken my team 3-4 months.<\/p>\n<p><strong>After purchasing Deep Discovery Network Analytics how long did it take to start seeing the value?<\/strong><\/p>\n<p>It was immediate.\u00a0 We looked at our correlated events in the management console and could see quickly that we had a major breach impacting a large number of our users and servers.\u00a0 Network Analytics showed us on a single chart where the breach started, how it spread, and all the users impacted.\u00a0 With one click of a mouse we were able to see hundreds of Deep Discovery Inspector events pulled into a single graph.\u00a0 This helped us understand not only the threat, but also how to respond appropriately to the attack.<\/p>\n<p>Find out why CEITEC relies on Trend Micro to not only protect his network but also provide visibility and automation.<\/p>\n<p>See the <a href=\"https:\/\/www.trendmicro.com\/en_us\/about\/customer-stories\/ceitec.html\">customer use case.<\/a><\/p>\n<p>For more information on Deep Discovery Network Analytics checkout the <a href=\"http:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/deep-discovery-threat-intelligence-network-analytics.html?modal=bd933b\">data sheet<\/a> or watch the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection\/deep-discovery-threat-intelligence-network-analytics.html\">video<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/ceitecs-cio\/\">Three Network Security Questions with CEITEC\u2019s CIO<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/ceitecs-cio\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: TJ Alldridge| Date: Wed, 26 Jun 2019 18:16:22 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"223\" height=\"143\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/06\/logo_CEITEC-large.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" \/><\/p>\n<p>Ireneo Demanarig is the Chief Information Officer at CEITEC S.A. located in Porto Alegre, Rio Grande do Sul, Brazil. CEITEC is a microelectronics manufacturer that specializes in solutions such as automatic identification (RFID and smartcards), application-specific integrated circuits (ASICs) aimed at identifying animals, and much more. Recently, I jumped on the phone with Ireneo and&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/ceitecs-cio\/\">Three Network Security Questions with CEITEC\u2019s CIO<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-15658","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15658"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15658\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15658"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}