{"id":73859,"date":"2018-04-27T05:00:19","date_gmt":"2018-04-27T12:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=73859"},"modified":"2019-01-29T13:17:03","modified_gmt":"2019-01-29T21:17:03","slug":"10-things-test-future-ngfw-prevent-successful-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/04\/10-things-test-future-ngfw-prevent-successful-ransomware-attacks\/","title":{"rendered":"10 Things To Test In Your Future NGFW: Prevent Successful Ransomware Attacks"},"content":{"rendered":"<p><em>This post is part of a blog series <\/em><em>where we dissect the ten things to test in your future next-generation firewall. These ten points will help ensure your next firewall matches the needs of your organization in its current and future states. <\/em><\/p>\n<p>A successful ransomware attack not only forces organizations to pay to regain access to the encrypted data but also incurs costs from lost opportunities or customers, equipment replacement, new security technologies, damaged reputations, and so on. To address the ransomware problem, most security vendors have updated their security architecture by tacking on ransomware prevention features to existing products.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Why Should You Advocate and Test This Capability?<\/span><\/p>\n<p>No single security product can successfully prevent ransomware on its own. As there are multiple stages in the attack lifecycle, there should be multiple layers of defense to prevent ransomware attacks. Your organization\u2019s ability to effectively protect against ransomware is reliant on the natively engineered automation and integration of your security products to proactively detect and prevent ransomware. A multilayered defense is the most effective way to disrupt possible ransomware attacks, and new additions to the security architecture should complement protections throughout the network.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Move Beyond the Status Quo<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>There Is No Silver Bullet<\/strong><\/p>\n<p>Protecting against ransomware requires visibility into network traffic and enforcement of applications, as well as user- and content-based policies. It also requires security products to protect against known and unknown exploits, malware, and command-and-control traffic, as well as prevent access to known malicious and phishing URLs.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Ransomware Is Time-Sensitive<\/strong><\/p>\n<p>Automation is the only way for prevention capabilities to move more quickly than a ransomware attack can transition through its full attack lifecycle within your organization. To identify and block unknown threats, malicious files and URLs must be detonated, analyzed and observed for malicious activity. Once a file or URL is identified as malicious, protections must be created and automatically distributed throughout the security infrastructure \u2013 across the network, cloud and endpoint. This ensures all points of entry are informed and capable of protecting against the latest version of the ransomware.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Combine Preventive Efforts<\/strong><\/p>\n<p>For effective prevention, you must employ automation and share information among various security tools that work together to identify known and unknown malware and exploits in your environment, and subsequently identify and quarantine any infected host, preventing the attack from spreading.<\/p>\n<p>Threat intelligence should always be a component of your organization\u2019s threat prevention efforts, and your firewall should be capable of dynamically updating preventions against malicious IPs, domains and URLs based on information gathered threat intelligence and IoCs.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Recommended RFP Questions<\/span><\/p>\n<hr \/>\n<ul>\n<li><span style=\"font-size: 14pt;\">Can your NGFW block executables and other risky file types from unknown applications and URLs to prevent ransomware attacks?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Can your NGFW automatically and dynamically import all known IoCs (i.e., IPs, domains and URLs) into the blacklist to be proactive against all known ransomware families?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Does the threat intelligence integration with the NGFW support dynamic updates for malicious URLs related to ransomware in the malware category of the URL filtering database?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Does the threat intelligence cloud integration with the NGFW support dynamic updates for malicious domains related to ransomware as DNS signatures to be automatically blacklisted or sinkholed?<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Can your NGFW learn about threats or ransomware behavior from your endpoint protection software and vice versa?<\/span><\/li>\n<\/ul>\n<hr \/>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\/test-your-firewall-overview.html\">Learn more about the 10 things\u00a0to test for in your future NGFW.<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Does your new firewall prevent successful ransomware attacks? Here's why you should advocate for and test this capability before purchasing a new NGFW.<\/p>\n","protected":false},"author":226,"featured_media":56373,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,6717],"tags":[5548,145,111,221],"coauthors":[2416],"class_list":["post-73859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewall","category-products-and-services","tag-10-things-to-test","tag-next-generation-firewall","tag-ngfw","tag-ransomware"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/01\/shark-520x320_LinkedIn.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/73859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=73859"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/73859\/revisions"}],"predecessor-version":[{"id":73883,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/73859\/revisions\/73883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/56373"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=73859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=73859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=73859"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=73859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}