{"id":39445,"date":"2017-08-04T05:00:10","date_gmt":"2017-08-04T12:00:10","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=39445"},"modified":"2017-08-03T09:59:37","modified_gmt":"2017-08-03T16:59:37","slug":"sp-whodunit-know-your-network-attackers","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/08\/sp-whodunit-know-your-network-attackers\/","title":{"rendered":"Whodunit? Know Your Network Attackers"},"content":{"rendered":"<p>Mobile network operators \u2013 you need better visibility into current threats to your networks. You may know \u201cwhat,\u201d and you may even know \u201cwhen,\u201d but often you don\u2019t know \u201cwhere,\u201d \u201cwho\u201d or \u201cwhy.\u201d So how can you act with confidence using incomplete information?<\/p>\n<p>Here\u2019s a common scenario many MNOs face. You may have information about the malware involved, and you may even suspect it slipped past the internet firewall to infect some of your mobile subscribers. But if you don\u2019t have visibility into which devices, peering points or subscribers are involved, or the context of the attack, and you have few enforcement tools beyond the internet firewall policy, what can you do when your network is threatened?<\/p>\n<p>Mobile security needs are unique because mobile devices are \u2026 well \u2026 <em>mobile<\/em>. Unlike enterprise data centers or fixed-line service providers, mobile network operators cannot rely upon static IP addresses to identify devices or subscribers so they can quarantine or block. And security systems are quite separate from the systems that house subscriber and device identification, so that makes matching threat traffic session logs to devices or subscribers a manual, cumbersome and time-consuming task.<\/p>\n<p>When an attack is looming, mobile network operators need complete information, and they need it quickly.<\/p>\n<p>Palo Alto Networks Next-Generation Security Platform provides all the pieces to the security data puzzle, allowing MNOs to quickly pinpoint the attack source and understand the malware context so they can take appropriate action or prevent it altogether. Our technology provides full application-layer visibility to all mobile peering points, including RAN, roaming or Wi-Fi access \u2013 network areas that, in the past, may have needed little protection. Advanced GTP inspection functions provides IMSI\/IMEI identification correlated to specific malicious sessions, displayed on one management GUI, which eliminates the frantic rush to manually match logs to identify who is attacking your network.<\/p>\n<p>So, the next time malware like Mirai or ransomware like WannaCry is perusing your subscriber base looking for innocent victims, you\u2019ll be able to see it coming \u2013 no matter where it\u2019s coming from \u2013 and you\u2019ll have complete information and context to decide what the appropriate enforcement action should be.<\/p>\n<p>Now you can know what, when, where, why and \u2013 most importantly \u2013 who.<\/p>\n<p>For more information, watch our recent webinar with \u201cHeavy Reading\u201d analyst Jim Hodges, \u201c<a href=\"http:\/\/www.lightreading.com\/webinar.asp?webinar_id=907\" rel=\"nofollow,noopener\" >Open Innovation \u2013 the Key to Service Provider Network Security<\/a>.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile network operators \u2013 you need better visibility into current threats to your networks. You may know \u201cwhat,\u201d and you may even know \u201cwhen,\u201d but often you don\u2019t know \u201cwhere,\u201d \u201cwho\u201d or &hellip;<\/p>\n","protected":false},"author":336,"featured_media":28659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1097],"tags":[3486,414],"coauthors":[3480],"class_list":["post-39445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-providers","tag-mobile-network-operators","tag-mobile-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/05\/blog-service-providers-banner-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=39445"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39445\/revisions"}],"predecessor-version":[{"id":39451,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/39445\/revisions\/39451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/28659"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=39445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=39445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=39445"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=39445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}