©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
Travelers CyberRisk for Insurance Companies
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Norman Endpoint Protection Advanced security made easy.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
[Name / Title] [Date] Effective Threat Protection Strategies.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
2012 CWAG Annual Meeting State Agency Data Breaches Loss prevention, response and remediation strategies.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Security Vulnerabilities in A Virtual Environment
Sky Advanced Threat Prevention
Brandon Traffanstedt Systems Engineer - Southeast
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
How to Make Cyber Threat Intelligence Actionable
Why SIEM – Why Security Intelligence??
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Cyber Risk Management and Insurance
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Proactive Incident Response
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Today’s cyber security landscape
Healthcare Cybersecurity: State of Industry
Comprehensive Security and Compliance at an Affordable Price.
Juniper Software-Defined Secure Network
The next frontier in Endpoint security
Active Cyber Security, OnDemand
Sophos Intercept Next-Gen Endpoint Protection
Automate, or Die Building a Continuous Response Architecture
Outline Introduction Characteristics of intrusion detection systems
بهترین راهکار را انتخاب کنید...
Closing the Breach Detection Gap
How to build a defense-in-depth
Attacks on The Manufacturing Industry
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
National Cyber Security
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Maintaining order and safety in a city is no small task
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Information Protection
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin America The Endpoints are the Target: Arm your Endpoints

Session Objectives 1. What is the problem? 2. What are the challenges for organizations? 3. What is the solution? 4. Key takeaways? 5. How can we help? 6. Questions?

what is the problem?

the assumption of breach the inevitability of compromise

Endless Stream of News

Endless Stream of Data Breaches Source: Information is Beautiful, January 2015www.informationisbeautiful.net

Malware Problem By The Numbers 66% of malware took months or even years to discover (dwell time) 1 69% of intrusions are discovered by an external party Verizon Data Breach Investigations Report 2. McAfee Threats Report: First Quarter Ponemon Institute 2013 Cost of a Data Breach Study $5.4M The average total cost of a data breach 3 155k The number of new malware samples that are seen daily 2

Incident Response is Too Slow and Expensive Threat discovery must be faster Incident response must become more affordable THIS IS NOT SUSTAINABLE Compromise happens in seconds Exfiltration starts within minutes It continues undiscovered for months Remediation takes weeks With the average incident response costs at $737,473 NetDiligence 2013 Cyber Liability & Data Breach Insurance Claims 2014 Verizon Data Breach Investigations Report

what is the Target?

The Endpoint Is The Target July 2014 “Organizations continue to spend a lot of money on network security solutions, but it’s the endpoint that is the ultimate target of advanced threats and attacks.”

what are the Challenges?

Protecting Yourself in Today’s World: Five Requirements Know what’s happening on every endpoint and server right now Visibility See and record everything; detect threats in real time without signatures Detection Stop attacks with customizable, proactive, signature-less techniques Prevention Use a recorded history to see an attack’s full kill chain; contain and stop attacks Response 1 You’re blind on your endpoints and servers 2 You can’t know what’s “bad” ahead of time 4 Traditional endpoint security doesn’t stop advanced threats 3 Incident response is too slow and expensive 5 Your network security doesn’t integrate with your endpoint security Integrate network and endpoint security for real-time response and prevention Integration

what is the Solution?

Know Good - Find Evil

Bit9 + Carbon Black: Full Security Lifecycle Coverage Prevention Stop attacks with proactive, customizable techniques Response Use a recorded history to see an attack’s full kill chain Detection Visibility Know what’s happening on every computer right now Detect attacks in real time without signatures Fixed-Function DevicesServersRemote UsersDesktops You need this for every machine

Where about AV?

Why are you still paying for AV?

I don’t have enough Resources?

Working Smarter Saves Smart Dollars,,, Performing continuous monitoring and live response can save you up to 97% in real money 90% of all alerts are from the same root cause – solve that and you’ll have order of magnitude less alerts the next day

What can we Learn?

Trends and Take Aways Shift in Focus Towards a Positive Security Model: Know Good: Find Evil Focus on the Endpoint Shift in Budgets away from AV and Network Sec to the Endpoint Breaches are no longer being viewed as an act of god - Have a strategy for the endpoint; Working Smarter and More Efficiently saves both Time and Money

©2012 Bit9. All Rights Reserved Reflections from the Field and Questions