Client-Side Malware Protection for your site

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Software Security & Privacy Risks in Mobile E-Commerce Kartikeya Kakarala CSCI 5939-Independent Study Wireless Application Protocols.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Security Issues and Challenges in Cloud Computing
Server-Side vs. Client-Side Scripting Languages
Copyright © 2002 Pearson Education, Inc. Slide 4-1 Choosing the Hardware for an E-commerce Site  Hardware platform  Refers to all the underlying computing.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Authors: Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz (Indiana University at Bloomington) Presented By: Lakshmy Mohanan.
Norman SecureSurf Protect your users when surfing the Internet.
ELC 200 Day 9. Agenda Questions? Assignment 2 is Due Assignment 3 is posted  Due Feb. 25, 2014  assignment3.pdf assignment3.pdf Finish Building an E-commerce.
TalkTalk network security overview 14 th April 2011.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
CAIL Studio NonStop SOA Integration and Non- Intrusive Application Customization - Featuring - HTML access, Web Services, Screen Aggregation, and Automation.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Implementation - Part 2 CPS 181s March 18, Pieces of the Site-building Puzzle Page 180, figure 4.1.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
CLOUD BASED CRM APPLICATION CRM software solutions help you to manage your business customers and streamline all facets of customer interaction. Using.
A practical overview on how the bad guys adopt and circumvent security initiatives Commercial – in - Confidence Alex Shipp Imagineer.
Module 7: Advanced Application and Web Filtering.
UNDERSTANDING YOUR OPTIONS FOR CLIENT-SIDE DEVELOPMENT IN OFFICE 365 Mark Rackley
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Web Analytics Fundamentals Presented by Tejaswi, Chandrika, Sunil.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
mlm-software.html.
commerce-script.html.
Munix Overview Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, VIP recognition, Time Analysis, and much more …. Internet Gateway.
BUILD SECURE PRODUCTS AND SERVICES
ECompare Engine Affiliate eCom Comparison Engine Software by Mark Bishop IKKONIK Review ECompare Engine Affiliate eCom Comparison Engine Software by Mark.
Get Mobilized Today at 360Apps.me
CSCE 548 Student Presentation Ryan Labrador
Munix Overview Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, VIP recognition, Time Analysis, and much more …. Internet Gateway.
PIWIK JUNIOR TIDAL ASSOCIATE PROF., WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY.
Barracuda Web Filtering Service
World Wide Web policy.
Tech Genuine offers interactive and feature-rich ecommerce website solutions which enable clients to market their products and services online. We specialize.
Active Cyber Security, OnDemand
FMAnywhere: Getting Started.
Symantec Code Signing Certificate
Multi-Vendor Marketplace Script | Multi-Vendor Ecommerce solutions
F UTURELEARN S CRIPT,K HAN ACADEMY C LONE,K HAN ACADEMY S CRIPT script/
Track and measure Social Media and Darknet through
ADVANCED PERSISTENT THREATS (APTs) - Simulation
script/
Jon Peppler, Menlo Security Channels
clonescript.html Photobucket Clone | Photobucket script | Imageshack Clone | 500px Clone Script | 500px Clone.
Dormitory Search Script men hostel booking script hostel room finding script lodge-booking-script/
Database Driven Websites
Virus Attack Final Presentation
AMP.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Welcome and thank you for choosing SharkGate
Dynamic Web Pages Jin Wu INF 385E Information Architecture
(With Hybrid Network Support)
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Automate Your Online Clothing Store with Apparel Design Software.
STEALTHbits Technologies, Inc.
CryptoSpike Ransomware Protection & File System Auditing Robert Graf
3PL Logistic Software. What is a 3PL? You take the orders. Your third-party logistics provider (3PL) fulfils them. It’s that simple and if it’s seamless,
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Client-Side Malware Protection for your site

Overview Problem Statement Product Suite Demo Case Study Agenda 01 02 04 05 01 Overview Problem Statement Product Suite Demo Case Study 02 03

Overview Established in 2014 By a team of successful executives & researchers in cyber security Unmatched client side detection & protection technology De Facto Standard for affiliate search websites Technology targets an acute market pain of protecting website revenues & users’ experience Not addressed by current solutions Target verticals include publishers, ecommerce, search sites etc. All verticals are actively affected by malicious scripts

Problem Statement

Client-side computer code is being injected into your site, and it is affecting your brand and the experience of up to 30% of your customers! (Technewsworld.com)

Legitimate plugins and other software Malware & 3rd party scripts are affecting your bottom line every day Malware Display invasive ads Threaten your customer’s privacy Ruin your customer’s experience Cause redirection, high bounce rate & loss of sales Legitimate plugins and other software Slow down user’s interaction Hide important content Pages redirection Increase page latency & page “freeze”

Up to 30% of your users see something like this instead! Example 1: Adding & replacing ads Infected page view Up to 30% of your users see something like this instead! Normal page view

Example 2: Redirection Normal page view Infected page view Up to 30% of your users see something like this instead! Infected page view Up to 30% of your users see something like this instead! Normal page view

Up to 30% of your users see something like this instead! Example 3: Viewability & UX Infected page view Up to 30% of your users see something like this instead! Normal page view

Solution

Simple – just one line of Java Script PageSeal Solution Capture malicious & UX affecting scripts via logs from a large number of websites (e-commerce, publishers, banks etc.) Big Data Develop a good & bad learning set, that is being constantly improved. Supervised Learning Deduce numerous algorithms to determine behaviors designed by each script. Machine Learning Access enormous computing resources in the cloud to examine these scripts every hour and backwards over many months to pinpoint malicious & UX affecting scripts. Only Actionable Alerts Analytics is done over-time, rather than real-time Detection & alerts in real time – Customized dashboard Blocking malicious scripts in real time – Optional protection All with no software or hardware to deploy. Simple – just one line of Java Script Capture malicious & UX affecting scripts via logs from a large number of websites (e-commerce, publishers, banks etc.) Big Data Develop a good & bad learning set, that is being constantly improved. Supervised Learning Deduce numerous algorithms to determine behaviors designed by each script. Machine Learning Access enormous computing resources in the cloud to examine these scripts every hour and backwards over many months to pinpoint malicious & UX affecting scripts. Only Actionable Alerts All with no software or hardware to deploy. Simple – just one line of Java Script Deduce numerous algorithms to determine behaviors designed by each script. Machine Learning Analytics is done over-time, rather than real-time Capture malicious & UX affecting scripts via logs from a large number of websites (e-commerce, publishers, banks etc.) Big Data Detection & alerts in real time – Customized dashboard Access enormous computing resources in the cloud to examine these scripts every hour and backwards over many months to pinpoint malicious & UX affecting scripts. Only Actionable Alerts Develop a good & bad learning set, that is being constantly improved. Supervised Learning Blocking malicious scripts in real time – Optional protection Analytics is done over-time, rather than real-time Detection & alerts in real time – Customized dashboard Blocking malicious scripts in real time – Optional protection All with no software or hardware to deploy. Simple – just one line of Java Script

Cloud Based Learning Machine Accumulated Data Aggregated Context Supervised Tuning Results Sharing Hi-Fidelity Results Ecommerce sites Publisher sites Banking Sites

Building Blocks & Product Suite Big Data Analytics Machine Learning Behavioral Analysis Elastic Sandbox Crowd Source Professional Source Pure Elastic Cloud Detect & alert Protection Adblock detection Q2’17

Dashboard: Advanced features for more control Reporting & Сontrol In depth look at detected malware & harmful UX scripts View all actions taken Total number of threats for each day Total number of users vs. total number of infected users Geo locations of infected users

Summary

PageSeal gives control back to the website owner! Summary PageSeal gives control back to the website owner! PageSeal Learn Mode One line of JavaScript added to your site detects & alerts on any harmful & UX modifications to your page Super easy integration! PageSeal Protection Blocks harmful modification from loading Protects your customer’s privacy and experience Boosts your revenue

Demo time