Panda Cloud Antivirus Pedro Bustamante

Slides:



Advertisements
Similar presentations
Faronics Anti-Virus.
Advertisements

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Client-Server collaborative scanning Dumitru Codreanu R&D, BitDefender.
CAS: A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY From: First IEEE International Conference on Communications in China:
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Cloud-based Antivirus Project Proposal By Yuli Deng, Guofu Xiong.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Sky Advanced Threat Prevention
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Artificial Intelligence. Real Threat Prevention.
AVG Customer Support Dial Toll Free:- +1(800) Avg.antivirussupportphonenumber.com Login:-
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Latest Issues Related To The AVG Antivirus 2017
How to install Webroot Secureanywhere on Mac. Webroot Antivirus Support Australia.
Barracuda NG Firewall ™
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Three steps to prevent Malware infection
Chapter 6: Securing the Cloud
Exchange Online Advanced Threat Protection
Understanding the New PTC System Monitor (PSM/Dynatrace) Application’s Capabilities and Advanced Usage Stephen Vaillancourt PTC Technical Support –Technical.
HOW TO UPDATE GUARDIAN ANTIVIRUS.  Guardian antivirus protects your pc from malware and provide protection against threads with multiple layers of security.
GlobalTech Squad Toll Free : AVG Antivirus Support
Protection Against Rootkits “Defense In Depth”
V. A. Memos and K. E. Psannis*
The Impact of Cloud Technology on Multi-Unit Operators
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Customized Solutions to your needs
Active Cyber Security, OnDemand
Computer Virus and Antivirus
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
How to fix malwarebytes installation & scaning issues
Malware, Anti-malware & Rats
Technical Guidelines to Turn off Norton 360 Auto Update.
Panda is the mostly used Anti-virus Panda is the top antivirus to protect your computer from injurious viruses. Panda Antivirus is the best antivirus.
Steps to Troubleshoot Norton 360 Error Norton 360 security software is all in one solution that combined online protection and performance tuning.
How to Install and Use Malwarebytes Antivirus How to Install and Use Malwarebytes Antivirus Designed to supplement your antivirus software, Malwarebytes.
McAfee Support Number is Now Open to all, Make a Call Today!
Call AVG Antivirus Support | Fix Your PC
AVG Customer Support Number
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
McAfee Support UK Tel McAfee Support is one of our principal technical assistance facilities to the users of McAfee—a part of the gargantuan.
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Chap 10 Malicious Software.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Viruses and Virus Protection
NORTON.COM/SETUP – NORTON SECURITY INSTALLATION
King Saud University- College OF Applied Studies
Watchdog Anti malware is reliable application and a multi engine scanner, which can detect various malicious files, worms, malware and other online threats.
Chap 10 Malicious Software.
King Saud University- College OF Applied Studies
Cyber security and Computer Misuse
 Webroot is a leading brand when it comes to internet and cybersecurity. The antivirus programs of Webroot are made to offer multi-layer malware and.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Cybersecurity Simplified: Phishing
Presentation transcript:

Panda Cloud Antivirus www.cloudantivirus.com Pedro Bustamante Senior Research Advisor http://research.pandasecurity.com

Collective Intelligence Panda’s History of Innovation 1998 First daily signature updates 2004 First runtime behavioral analysis TruPrevent 2007 First scanning from the cloud technology Collective Intelligence 2009 First cloud-based antivirus thin-client Panda Cloud Antivirus

Panda Cloud Antivirus is the first cloud-based antivirus thin-client New Security Paradigm Real-time scanning from-the cloud Ultra-lightweight thin-client antivirus Panda Cloud Antivirus is the first cloud-based antivirus thin-client Product bandwidth = initial download + updates + CI + upgrades Calculations based on 1.5 visits per week and 4 pageviews per visit. 3

Panda Cloud Antivirus is the first cloud-based antivirus thin-client On Wednesday, April 29th, Panda is releasing Panda Cloud Antivirus, available for free at www.cloudantivirus.com. Fastest protection against new malware Protection when you need it Incredibly lightweight Community is the Lab FREE Panda Cloud Antivirus is the first cloud-based antivirus thin-client Product bandwidth = initial download + updates + CI + upgrades Calculations based on 1.5 visits per week and 4 pageviews per visit. 4

Heuristics Correlation Over 50.000 new files are imported every day into PandaLabs. These come from customers, competitors, honeypots, CERTs, malicious URLs, online scanners such as VirusTotal, Jotti, etc. Emulation Clustered Grouping New viruses and malware are detected and blocked remotely and automatically almost in real-time without having to send the file to the lab for manual analysis and wait for an answer. The result is that customers are protected against new malware much faster than using traditional signature update approaches. Behavioral Clustered Grafos When a PC protected by Panda encounters a new file which is not detected by local signatures, heuristics or behavioral analysis, its “behavioral traits” are extracted and analyzed remotely by the PandaLabs Collective Intelligence cloud to determine if the new file is malicious or harmless. Sandboxing File Infector Installers Runtime Packers Multi-scanner …I ‘ve represented here the distributed systems of our users, which interact with your infrastructure, managed by PandaLabs, so that (click forward), if a new executable appears, it will provide some basic data (click forward) , such as behavioral traces, date and time of first appearance, and so on. This information alone may not be sufficient to reach a determination, but if we see the same program (click forward) appearing in a different corner of the world, showing a different behavior, we can then correlate those two behaviors and have sufficient evidence…that the program was in fact malware (click forward), and we can instruct the agents (click forward) to block or eliminate the malicious code. Malware does not manifest its behavior all the time, so this approach allows us to become smarter and to detect malware much earlier. This is just an example of the benefits of using this approach. It is important to note that we do not collect personal information, and that based on the specific data we receive, we cannot trace users, you would always need an ISP to be able to do that… In essence, we get global visibility about the activities of malware, and by connecting sensors to our infrastructure we can continuously correlate the different pieces of data, which results in automatic classification of files in a totally transparent fashion. We believe that, most of the times, users cannot take informed decisions when security products ask them what do they want to do with a program. That is why we believe that security should become as a transparent, but always present, component in their computing experience. TRANSITION TO NEXT SLIDE: overcoming the limitations of the predominant model today, the “local” approach, is what we are doing…

Traditional Antivirus Cloud Antivirus Heavy resource consumption Ultra-lightweight cloud agent Detection limited by signature size and RAM Unlimited capabilities hosted in the cloud Multiple layer scanning (transport, storage, execution) Only execution is important. Rest is not dangerous and less priority Signature updates becoming “huge” & easy to bypass Fastest response to newest malware. No visibility for hackers to “test AV” PC isolated from other protected PCs and AV Lab The community is the lab. Each PC = part of client-server community.

Cloud Antivirus – New Protection Model Protection When You Need It Traditional On-Access OnAccess Cloud AV On-Access OnPrefetch OnBackground Entry Vector File System Memory Without Performance Impact Protection When You Need It

Performance Metrics - Internal Beta Industry Avg Cloud AV Memory (WS) 52 MB 17 MB Committed bytes 100 MB 68 MB First boot 60 sec 50 sec Next boots 15 sec 10 sec Performance impact 9% 5% * Performance data based on internal tests 8

Panda Cloud Antivirus www.cloudantivirus.com Pedro Bustamante Senior Research Advisor http://research.pandasecurity.com