A Virtual Tour of SophosLabs Building next-generation protection

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Copyright 2012 Trend Micro Inc. Raimund Genes, CTO Innovation In Cloud Security.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Mario Vuksan CEO PROPRIETARY INFORMATION THREAT ANALYSIS LABS HAVE NEVER BEEN WORKING HARDER #SINET Connection.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Synchronized Security Revolutionizing Advanced Threat Protection
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Firewall The Next-Generation Firewall for Everyone
Exchange Online Advanced Threat Protection
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
TMG Client Protection 6NPS – Session 7.
Barracuda Web Security Flex
Accelerate GDPR compliance with Microsoft 365
Real-time protection for web sites and web apps against ATTACKS
Active Cyber Security, OnDemand
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Sophos Intercept Next-Gen Endpoint Protection
in All Office 365 Apps for Enterprise Companies
Trends in Ransomware Distribution
Threat Management Gateway
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
بهترین راهکار را انتخاب کنید...
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Software-Defined Secure Networks in Action
Home Internet Vulnerabilities
Real World Advanced Threat Protection
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Secure once, run anywhere Simplify your security with Sophos
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Healthcare Cloud Security Stack for Microsoft Azure
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
Introduction to Symantec Security Service
Per Söderqvist Per Söderqvist Sales Engineer
Information Protection
Cybersecurity Simplified: Phishing
Presentation transcript:

A Virtual Tour of SophosLabs Building next-generation protection Fraser Howard Principal Researcher September 2016

Current Threat landscape SophosLabs Systems Layered Protection Demo Agenda Current Threat landscape SophosLabs Systems Layered Protection Demo

Current Threat Landscape

Snapshot of 2016 Threat Landscape 150,000 Suspicious URLs seen & analysed daily 30,000 Malicious URLs daily, over 80% of which are from legitimate web sites 5 million Spam messages daily across 20 countries Malware samples added to Live Protection cloud daily 400,000 Previously unseen files received daily 2,000 Previously unseen Android apps daily 600 million Live Protection lookup events added to Hadoop cluster 50% Of detections based on small number of samples

Impact on security Automation Visibility Layered protection Automated dynamic analysis Cloud response Visibility Track active campaigns Monitor protection levels Layered protection Protection technologies Application control

Roles & Responsibilities SophosLabs Roles & Responsibilities Global Team Real-time response to incidents 24/7/365 operation Threat Response Deep expertise into threats & attacks Create powerful protection solutions Threat Research Build bespoke systems to automate threat analysis & response Enable SophosLabs to scale Automation development Ensure effectiveness & quality of releases Own risk management Quality Assurance Abingdon Vancouver Budapest Ahmedabad Sydney

SophosLabs Team Structure Heuristic rules Advanced detection Customer escalations Anti-spam Android OSX Unix/Linux Android, Linux & Mac Files, URLs, IPs, certs Whitelisting Classifiers Automation Reputation Services Windows malware, PUAs, AppC TFT Unpacking Frameworks Generic Detection Runtime detections (CX, HIPs, mem) Web (CXweb) Email (CXmail) Dynamic Detection APTs Exploits New, niche threats Knowledge gain Emerging Threats Snort IPS data IPS automation C2 signatures Network Security

SophosLabs Systems (live!)

Web distributed threats Visibility Email campaigns Web distributed threats Global spam traps Real-time picture of spam Phish Scams Meds Malware distribution Social engineering Education? The Web – all about content delivery, good or evil. Millions of pages scanned each day Telemetry provides visibility into malicious activity Track attacks Monitor Exploit Kits

Attack Demo: Spam campaign delivering Locky ransomware