SLRexample English V1.1
SLRexample English V1.1
NEC
21 October 2015
Report Period: 7 Days
Start: Tue, Oct 13, 2015
End: Tue, Oct 20, 2015
PREPARED BY:
Calix
Palo Alto Networks
www.paloaltonetworks.com
SECURITY LIFECYCLE REVIEW
EXECUTIVE SUMMARY
FOR NEC
The Security Lifecycle Review summarizes the business and
2,582,996
security risks facing NEC. The data used for this analysis was
VULNERABILITY
gathered by Palo Alto Networks during the report time period. The
EXPLOITS
report provides actionable intelligence around the applications,
URL traffic, types of content, and threats traversing the network,
including recommendations that can be employed to reduce the 58,809
organization’s overall risk exposure.
KNOWN THREATS
11,907
UNKNOWN THREATS
Report Period: 7 Days
Start: Tue, Oct 13, 2015
End: Tue, Oct 20, 2015
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 2
Applications at a Glance
Applications can introduce risk, such as delivering threats, potentially allowing data to leave the network,
enabling unauthorized access, lowering productivity, or consuming corporate bandwidth. This section will
provide visibility into the applications in use, allowing you to make an informed decision on potential risk
versus business benefit.
Key Findings:
High-risk applications such as social-networking, file-sharing and email were observed on the
network, which should be investigated due to their potential for abuse.
320 total applications were seen on the network across 26 sub-categories, as opposed to an industry
average of 226 total applications seen in other High Technology organizations.
5.49TB was used by all applications, including general-internet with 2.8TB, compared to an industry
average of 4.36TB in similar organizations.
Categories with the Most Applications Categories Consuming the Most Bandwidth
The following categories have the most Bandwidth consumed by application category
applications variants, and should be reviewed for shows where application usage is heaviest, and
business relevance. where you could reduce operational resources.
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 3
Applications that Introduce Risk
The top applications (sorted by bandwidth consumed) for application subcategories RISK LEVEL
that introduce risk are displayed below, including industry benchmarks on the 5
4
number of variants across other High Technology organizations. This data can be 3
used to more effectively prioritize your application enablement efforts. 2
1
Key Findings:
A total of 320 applications were seen in your organization, compared to an
industry average of 226 in other High Technology organizations.
The most common types of application subcategories are photo-video, internet-
utility and social-networking.
The application subcategories consuming the most bandwidth are internet-
utility, file-sharing and audio-streaming.
TOP EMAIL APPS TOP REMOTE-ACCESS APPS
comcast-webmail 1.85 GB
TOP FILE-SHARING APPS TOP ENCRYPTED-TUNNEL APPS
google-drive-web 508.93 MB
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 4
Applications that Introduce Risk (Continued)
TOP INSTANT-MESSAGING APPS TOP SOCIAL-NETWORKING APPS
TOP PHOTO-VIDEO APPS TOP PROXY APPS
sling 75.28 GB
ppstream 51.13 GB
rtmp 46.47 GB
rtp-base 42.35 GB
netflix-streaming 30.86 GB
rtmpe 21.83 GB
dailymotion 19.40 GB
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 5
Applications that Introduce Risk — Detail
Notes:
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 6
Risk Application Category Sub Category Technology Bytes Sessions
3 myspace-im collaboration instant-messaging client-server 2.44GB 47734
Notes:
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 7
Risk Application Category Sub Category Technology Bytes Sessions
3 renren-base collaboration social-networking browser-based 4.6GB 171428
Notes:
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 8
SaaS Applications
SaaS–based application services continue to redefine the network perimeter. Often labeled “shadow IT,”
most of these services are adopted directly by individual users, business teams, or even entire
departments. In order to minimize data security risks you need control over SaaS applications used your
network .
NUMBER OF SAAS APPLICATIONS
NEC 40
INDUSTRY AVERAGE 43
320 ALL ORGANIZATIONS 24
total apps
40
SaaS apps PERCENTAGE OF ALL APPLICATIONS
NEC 12.5%
INDUSTRY AVERAGE 19.03%
ALL ORGANIZATIONS 16.67%
SAAS APPLICATION BANDWIDTH
NEC 599.97 GB
INDUSTRY AVERAGE 142.25 GB
5.49TB ALL ORGANIZATIONS 109.49 GB
total data flow
599.97GB
for SaaS apps PERCENTAGE OF ALL BANDWIDTH
NEC 10.67%
INDUSTRY AVERAGE 3.18%
ALL ORGANIZATIONS 2.51%
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 9
TOP SAAS APPLICATION SUBCATEGORIES
The following displays the number of applications in each application subcategory. This allows you to
assess the most used applications organization.
The following shows the top used applications by data movement within the subcategories identified
above.
TOP EMAIL APPS TOP FILE-SHARING APPS
TOP OFFICE-PROGRAMS APPS TOP INTERNET-UTILITY APPS
evernote-base 39.00 MB
google-calendar-enterprise 21.20 MB
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 10
TOP SAAS APPLICATIONS
The following displays the top 10 SaaS applications used in your organization and the application usage
comparison against your industry peers and all other Palo Alto Networks customers.
Blackboard 102.15 GB
INDUSTRY AVERAGE 2.19 GB
369.67 GB
Gmail-Base 84.15 GB
INDUSTRY AVERAGE 4.83 GB
369.67 GB
Yahoo-Mail 17.88 GB
INDUSTRY AVERAGE 1.14 GB
369.67 GB
Gmail-Enterprise 8.55 GB
INDUSTRY AVERAGE 393.48 MB
369.67 GB
Google-Analytics 4.31 GB
INDUSTRY AVERAGE 867.77 MB
369.67 GB
Google-Docs-Base 3.65 GB
INDUSTRY AVERAGE 3.68 GB
369.67 GB
Icloud-Base 2.39 GB
INDUSTRY AVERAGE 1.86 GB
369.67 GB
Comcast-Webmail 1.85 GB
INDUSTRY AVERAGE 1021.47 MB
369.67 GB
Aim-Mail 1.55 GB
INDUSTRY AVERAGE 244.66 MB
369.67 GB
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 11
URL Activity
Uncontrolled Web surfing exposes organizations to security and business risks, including exposure to
potential threat propagation, data loss, or compliance violations. The most common URL categories
visited by users on the network are shown below.
Key Findings:
High-risk URL categories were observed on the network, including educational-institutions,
computer-and-internet-info and web-advertisements.
Users visited a total of 28,594,018 URLs during the report time period across 58 categories.
There was a variety of personal and work-related Web activity present, including visits to potentially
risky websites.
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 12
File Transfer Analysis
Applications that can transfer files serve an important business function, but they also potentially allow
for sensitive data to leave the network or cyber threats to be delivered. Within your organization, 241
unique file types were observed, across 44 different file types, delivered via a total of 66 total
applications. The image below correlates the applications most commonly used to transfer files, along
with the most prevalent file and content types observed.
Applications File Types
FLASH 1,049,515 SHOCKWAVE 1,068,437
YOUTUBE-BASE 48,291 MP3 387
CONFIDENTIAL 146
FLV 28,326
MP4 510
GOOGLE-EARTH 23,625 ZIP 23,625
SMTP 133,597 EMAIL LINK 133,084
LNK 146
WORD 52
HTA (HTML APPLICATION) 315
TORRENT 292
WEB-BROWSING 730 HTML APPLICATION 146
SSN 146
JAVA CLASS 146
66 44
transferred
Applications File Types
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 13
Threats at a Glance
Understanding your risk exposure, and how to adjust your security posture to prevent attacks, requires
intelligence on the type and volume of threats used against your organization. This section details the
application vulnerabilities, known and unknown malware, and command and control activity observed on
your network.
Key Findings:
2,582,996 total vulnerability exploits were observed in your organization, including brute-force, code-
execution and Other.
70,716 malware events were observed, versus an industry average of 446,557 across your peer group.
104,796 total command and control requests were identified, indicating attempts by malware to
communicate with attackers to download additional malware, receive instructions, or exfiltrate data.
16% 5% 12%
84% 95% 88%
70,716 11,907: Unknown Malware
Malware 58,809: Known Malware
Detections
NEC INDUSTRY ALL
AVERAGE ORGANIZATIONS
104,796
Command and 104,796: Known Connections
Control Detections
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 14
High-Risk and Malicious File Type Analysis
Today’s cyber attackers use a variety of file types to deliver malware and exploits, often focusing on
content from common business applications present in most enterprise networks. The majority of
commodity threats are delivered via executable files, with more targeted and advanced attacks often
using other content to compromise networks.
Key Findings:
A variety of file-types were used to deliver threats, and prevention strategies should cover all major
content types.
You can reduce your attack surface by proactively blocking high-risk file-types, such as blocking
executable files downloaded from the Internet, or disallowing RTF files or LNK files, which are not
needed in daily business.
Email Link 8.43%
INDUSTRY AVERAGE 16.85%
ZIP 5.14%
INDUSTRY AVERAGE 32.81%
74.08%
MSOFFICE 4.92%
of all files INDUSTRY AVERAGE 1.79%
PE 3.75%
are Shockwave INDUSTRY AVERAGE 3.12%
Confidential 3.7%
INDUSTRY AVERAGE 0%
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 15
Application Vulnerabilities
Application vulnerabilities allow attackers to exploit vulnerable, often unpatched, applications to infect
systems, which often represent one of the first steps in a breach. This page details the top five
application vulnerabilities attackers attempted to exploit within your organization, allowing you to
determine which applications represent the largest attack surface.
Key Findings:
71 total applications were observed delivering exploits to your environment.
2,582,996 total vulnerability exploits were observed across the following top three applications: web-
browsing, ftp and smtp.
897 unique vulnerability exploits were found, meaning attackers continued to attempt to exploit the
same vulnerability multiple times.
68,597 ftp
429 Internet Explorer DirectAnimationPath Control KeyFrame Method Critical code-execution CVE-2006-4777;CVE-
Vulnerability 2006-4446
225 Microsoft Internet Explorer Source Name Buffer Overflow Critical code-execution CVE-2008-4261
Vulnerability
204 Microsoft Visual Studio MSHFLXGD.OCX ActiveX Control Code Critical code-execution CVE-2008-4254
Execution Vulnerability
204 Microsoft Internet Explorer CSS Strings Parsing Memory Corruption Critical code-execution CVE-2007-0943
Vulnerability
204 Internet Explorer DHTML Engine Race Condition Vulnerability Critical code-execution CVE-2005-0553
204 Microsoft Visual Studio MSCHRT20.OCX ActiveX Control Code Critical code-execution CVE-2008-4256
Execution Vulnerability
225 Microsoft IE COM Object Instantiation Memory Corruption Critical overflow CVE-2005-2087
204 Ipswitch WS_FTP Server FTP Command Buffer Overrun Critical overflow CVE-2003-0772
Vulnerabilities
204 Microsoft Internet Explorer Print Preview Cross Zone Script Injection Critical code-execution CVE-2008-2259
Vulnerability
212 Microsoft Internet Explorer Vector Markup Language VGX.DLL Critical code-execution CVE-2007-1749
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 16
Remote Buffer Overflow Vulnerability
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 17
DETECTIONS APPLICATION & VULNERABILITY EXPLOITS SEVERITY THREAT TYPE CVE ID
44,947 smtp
1,131 Microsoft Office PowerPoint Legacy File Format Vulnerability Critical code-execution CVE-2009-0227
1,224 Windows Media Header Parsing Invalid Free Remote Code Critical code-execution CVE-2009-2498
Execution Vulnerability
816 Microsoft Word RTF Object Parsing Vulnerability Critical code-execution CVE-2008-4031
816 Microsoft Wordpad and Office Text Converters OLE Data Remote Critical code-execution CVE-2009-0087
Code Execution Vulnerability
816 Microsoft Windows GDI Remote Integer Overflow Vulnerability Critical overflow CVE-2008-2249
408 Microsoft File Converter Buffer Overflow Vulnerability Critical code-execution CVE-2009-1533
408 Microsoft DirectShow Remote Code Execution Vulnerability Critical overflow CVE-2010-0480
405 Microsoft Windows GDI+ PNG Remote Code Execution Vulnerability Critical code-execution CVE-2009-3126
408 Microsoft Word RTF Object Parsing Vulnerability Critical code-execution CVE-2008-4030
407 Microsoft Word Memory Corruption Vulnerability Critical code-execution CVE-2008-4024
37,963 pop3
1,223 Windows Media Header Parsing Invalid Free Remote Code Critical code-execution CVE-2009-2498
Execution Vulnerability
1,224 Microsoft Office PowerPoint Legacy File Format Vulnerability Critical code-execution CVE-2009-0227
816 Microsoft Word RTF Object Parsing Vulnerability Critical code-execution CVE-2008-4031
816 Microsoft Windows GDI Remote Integer Overflow Vulnerability Critical overflow CVE-2008-2249
816 Microsoft Wordpad and Office Text Converters OLE Data Remote Critical code-execution CVE-2009-0087
Code Execution Vulnerability
393 Microsoft Office PowerPoint TextHeaderAtom/OutlineTextRefAtom Critical code-execution CVE-2009-0556
Remote Code Execution Vulnerability
408 Microsoft DirectShow Invalid Quicktime File Record Remote Code Critical code-execution CVE-2009-1537
Execution Vulnerability
408 Microsoft Works File Converter Field Length Remote Code Critical overflow CVE-2008-0108
Execution Vulnerability
408 Microsoft File Converter Buffer Overflow Vulnerability Critical code-execution CVE-2009-1533
408 Microsoft Windows Paint JPEG Integer Overflow Vulnerability Critical overflow CVE-2010-0028
37,096 webdav
204 Apache APR_PSPrintf Memory Corruption Vulnerability High code-execution CVE-2003-0245
204 Microsoft Internet Information Services Could Allow Elevation of High code-execution CVE-2009-1535
Privilege Vulnerability
204 Sun Java System Web Server 7.0u7 WEBDAV Format String High overflow CVE-2010-0388
36,484 HTTP OPTIONS Method Info info-leak
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 18
Known and Unknown Malware
Applications are the primary vectors used to deliver malware and infect organizations, communicate
outbound, or exfiltrate data. Adversaries’ tactics have evolved to use the applications commonly found on
the network into which traditional security solutions have little or no visibility.
Key Findings:
4 total applications were observed delivering malware to your organization, out of 320 total applications
on the network.
Many applications delivering malware are required to run your business, which means you need a
solution that can prevent threats, while still enabling the applications.
While most malware is delivered over HTTP or SMTP, advanced attacks will often use other
applications, including those on non-standard ports or employing other evasive behavior.
4
applications found
delivering malware
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 19
Command and Control Analysis
Command-and-control (CnC) activity could indicates a host in the network has been infected by malware,
and may be attempting to connect outside of the network to malicious actors, reconnaissance attempts
from outside, or other command-and-control traffic. Understanding and preventing this activity is critical,
as attackers use CnC to deliver additional malware, provide instruction, or exfiltrate data.
Key Findings:
4 total applications were used for command-and-control communication.
104,796 total command-and-control requests were seen on your network.
0 total suspicious DNS queries were observed.
UNKNOWN-UDP - 38,629
SIP - 18,939
BITTORRENT - 488
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 20
Summary: NEC
The analysis determined that a wide range of applications and cyber
320
attacks were present on the network. This activity represents potential
APPLICATIONS
business and security risks to NEC, but also an ideal opportunity to
IN USE
implement safe application enablement policies that, not only allow
business to continue growing, but reduce the overall risk exposure of the
organization. 104
HIGH RISK
Highlights Include: APPLICATIONS
High-risk applications such as social-networking, file-sharing and
email were observed on the network, which should be investigated due
2,653,712
to their potential for abuse.
320 total applications were seen on the network across 26 sub- TOTAL THREATS
categories, as opposed to an industry average of 226 total applications
seen in other High Technology organizations. 2,582,996
2,582,996 total vulnerability exploits were observed across the following
VULNERABILITY
top three applications: web-browsing, ftp and smtp.
EXPLOITS
70,716 malware events were observed, versus an industry average of
446,557 across your peer group.
4 total applications were used for command and control communication. 58,809
KNOWN THREATS
11,907
UNKNOWN THREATS
Recommendations:
Implement safe application enablement polices, by only allowing the applications needed for business,
and applying granular control to all others.
Address high-risk applications with the potential for abuse, such as remote access, file sharing, or
encrypted tunnels.
Deploy a security solution that can detect and prevent threats, both known and unknown, to mitigate
risk from attackers.
Use a solution that can automatically re-program itself, creating new protections for emerging threats,
sourced from a global community of other enterprise users.
SECURITY LIFECYCLE REVIEW | PALO ALTO NETWORKS 21