Synchronized Security

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security for Today’s Threat Landscape Kat Pelak 1.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
IBM Security Network Protection (XGS)
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
Network security Product Group 2 McAfee Network Security Platform.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Synchronized Security Revolutionizing Advanced Threat Protection
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Blue Coat Cloud Continuum
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Next-Generation Endpoint Protection Enduser Protection
Understanding and breaking the cyber kill chain
Protect your Digital Enterprise
2017 Security Predictions from FortiGuard Labs
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Sophos Central for partners and customers: overview and new features
Your Partner for Superior Cybersecurity
Trend Micro Consumer 2010 Easy. Fast. Smart.
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Critical Security Controls
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Do you know who your employees are sharing their credentials with
“Introduction to Azure Security Center”
The next frontier in Endpoint security
Hybrid Management and Security
Journey to Microsoft Secure Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Active Cyber Security, OnDemand
Sophos Intercept Next-Gen Endpoint Protection
Jon Peppler, Menlo Security Channels
Matt G change over point ?
Exchange Online Advanced Threat Protection
Intercept X for Server Early Access Program Sophos Tester
Strong Security for Your Weak Link:
Intercept X Install alongside competitive AV
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
What’s new in the Fall Creators Update for Windows Defender ATP
Network hardening Chapter 14.
Introduction to Symantec Security Service
Per Söderqvist Per Söderqvist Sales Engineer
Comodo Dome Data Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Presentation transcript:

Synchronized Security Paul Zindell SE, Mountain Region “I didn’t understand it but the half hour wasn’t boring to a technologically impaired person. I actually listened to the whole thing.” – Fela, Paul’s Mom “Much of the high tech terminology was beyond my understanding, but your expertise and command in computer security is impressive.” – Larry, Paul’s Dad Andy Thomas – original member of N Sync I Can Feel Your Heartbeat Don’t Turn Me Red Keep ‘em Isolated 2015 – Launched Sync Sec 2016 – Partner Momentum (New Accounts, Cross-sell NW/End) 2017 – Customer Traction

Increasing attacks, increasing sophistication Attack surface exponentially larger Attacks are more sophisticated than defenses Threat landscape is constantly changing Average user had 3 devices and both user and device are mobile Everything will be Cloud Managed IoT Attackers coordinate and combine tecniques to improve thier strike rate. Resuable code, online tools, it’s easy Soccer/Football – Red Cards (7 player minimum) Laptops/Desktops Phones/Tablets Virtual servers/desktops Cloud servers/storage IoT Syndicated crime tools Zero day exploits Memory resident Polymorphic/metamorphic Multilevel botnets

Synchronized Security Admin | Manage All Sophos Products Self Service | User Customizable Alerts Partner | Management of Customer Installations Sophos Central In Cloud On Prem Next-Gen Firewall Next-Gen Endpoint Wireless Mobile Email Server Web Encryption How do we solve this issue? Our Vision/Strategy/Ref Architecture All products working together in a system (security services) Best of Breed vs. Integrated System – old thinking Heartbeat, Cloud Intelligence, Analytics – for Action, not Info Managed by Sophos Central (Easy, Scale, Service) Who is using it? POLL Cloud Intelligence Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions Sophos Labs | 24x7x365, multi-continent operation | Malware Identities | URL Database | Machine Learning | Threat Intelligence | Genotypes | Reputation | Behavioral Rules | APT Rules | App Identities | Anti-Spam | DLP | SophosID | Sandboxing | API Everywhere

Synchronized Security Best of breed security system that enables your defenses to be more coordinated than the attacks. Unparalleled Protection Automated Incident Response Real-time Insight and Control Breach Prevention Reduce Breach Impact Simplify IT Management Rest of presentation – IN ACTION Demos Customers How it’s being sold

Next-Gen Endpoint Protection Synchronized Security Device And App Control Reputation Security Signatures Genes Prevention Exploit Behavioral Detections Memory Scanning CryptoGuard Sophos Central Mgmt. pre- --> <-- post- Machine Learning Root Cause Analysis Malicious Traffic Detection .exe Malware Malicious URLs Non-.exe Malware Exploits Sync Security is broader than Heartbeat Technologies within the Endpoint work together One tech spots suspicious, can kick off another tech to scan Script-based Malware Removable Media Phishing Attacks Unauthorized Apps

Next-Gen Endpoint + Network Protection Web Protection Email Protection Sandboxing Application Protection User identity Encrypted Traffic Inspection Advanced Threat Protection IPS Synchronized Security Device And App Control Reputation Security Signatures Genes Prevention Exploit Behavioral Detections Memory Scanning CryptoGuard Sophos Central Mgmt. pre- --> <-- post- Machine Learning Root Cause Analysis Malicious Traffic Detection .exe Malware Malicious URLs Non-.exe Malware Exploits ATP finds bad URL, bad traffic, but unknown Asks endpoint for detail – run a scan, or give me the process info Script-based Malware Removable Media Phishing Attacks Unauthorized Apps

Security Heartbeat Available Now Admin | Manage All Sophos Products Self Service | User Customizable Alerts Partner | Management of Customer Installations Sophos Central In Cloud On Prem Security Heartbeat™ UTM/Next-Gen Firewall Next-Gen Endpoint Server Encryption Cloud Intelligence Analytics | Analyze data across all of Sophos’ products to create simple, actionable insights and automatic resolutions Sophos Labs | 24x7x365, multi-continent operation | URL Database | Malware Identities | File Look-up | Genotypes | Reputation | Behavioural Rules | APT Rules Apps | Anti-Spam | Data Control | SophosID | Patches | Vulnerabilities | Sandboxing | API Everywhere

Bad guy’s trilemma Leaves Sophos Security alone Disable Disable Heartbeat Sophos sees everything they do Intercept X blocks attack Red Health sent through HB FW Isolates Endpoint FW detects Missing Heartbeat FW Isolates Endpoint

Lateral Movement Detection and Prevention XG Firewall Endpoints Security Heartbeat™ Security Heartbeat™ Internet Servers Detection and Isolation

Lateral Movement Detection and Prevention XG Firewall Endpoints Security Heartbeat™ Security Heartbeat™ Internet Servers Detection and Isolation – Endpoint Stonewalling

Lateral Movement Detection and Prevention Security Heartbeat™ XG Firewall Endpoints Security Heartbeat™ Security Heartbeat™ Internet Servers Detection and Isolation – Wireless Heartbeat

Lateral Movement Detection and Prevention XG Firewall Endpoints Security Heartbeat™ Internet Servers Detection and Isolation – Destination Based Rules

Automated Incident Response Available Next Security Heartbeat Intercept X Server Heartbeat Synchronized Encryption Credential Theft Detection Synchronized Email Endpoint Stonewalling Synchronized Mobile Wireless Heartbeat Isolation Lateral Movement Detection and Prevention

Reporting and Analysis Infrastructure visibility Machine, Process, User Threat chain visibility Security Heartbeat Active Threat ID Root Cause Analysis

Dynamic Application Control – Coming Soon Automatically identifies unknown app traffic Better visibility than any other Firewall on the market Risk Reduction Morphing Apps attempting to avoid Firewalls/Sandboxing Suspicious Applications Performance improvement Bandwidth storms

Synchronized Security Security Heartbeat™ UTM/Next-Gen Firewall Next-Gen Endpoint Wireless Mobile Email Server Encryption Web “It only took 2 minutes to find out that everything was under control. Sophos XG Firewall detected the threat and Security Heartbeat allowed the infected host to be immediately identified, isolated and cleaned up. Instead of going into fire drill mode, we were able relax and finish our lunch.” DJ Anderson, CTO, IronCloud