Sophos Intercept Next-Gen Endpoint Protection

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Advertisements

Security Life Cycle for Advanced Threats
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Synchronized Security Revolutionizing Advanced Threat Protection
Sky Advanced Threat Prevention
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Next-Generation Endpoint Protection Enduser Protection
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Proactive Incident Response
Intercept X Early Access Program Sophos Tester
Security Issues in Information Technology
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Sophos Central for partners and customers: overview and new features
BUILD SECURE PRODUCTS AND SERVICES
WannaCry/WannaCrypt Ransomware
Follow-up issues from the presentation on Anti-virus / Security software TD & SD have encountered problems with AVG, which also is not rated highly in.
Managing Windows Security
Tom Hartig Check Point Software Technologies August 13th, 2015
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Anti Virus System i-Specific Anti-Virus Product
TMG Client Protection 6NPS – Session 7.
Synchronized Security
Intercept X Early Access Program Root Cause Analysis
Ransomware today: How to protect against Locky and friends
Techniques, Tools, and Research Issues
Vikas Uberoy -Channel Director ANZ
Active Cyber Security, OnDemand
Trends in Ransomware Distribution
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
4 ways to stay safe online 1. Avoid viruses and phishing scams
Intercept X for Server Early Access Program Sophos Tester
Intercept X Install alongside competitive AV
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chap 10 Malicious Software.
Intercept X Early Access Program Root Cause Analysis
Stopping Live Threats Ken Swain SE TN, GA, AL, MS Jan
Secure once, run anywhere Simplify your security with Sophos
Chap 10 Malicious Software.
WJEC GCSE Computer Science
Introduction to Symantec Security Service
Per Söderqvist Per Söderqvist Sales Engineer
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Comodo Dome Data Protection
Cybersecurity Simplified: Ransomware
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Sophos Intercept Next-Gen Endpoint Protection Larry Herzog Jr., CISSP Channel Sales Engineer July 2017

HD Phishing Data stolen from breach being used in phishing campaign.

Locally targeted

Malvertising threat chain RTB Ad network Third party

No site is immune

Exploits as a Service Gateway Servers Exploit Kit Customers Victims Initial Request Exploit Kit Customers Redirection Get Current Domain Tor Exploit Kit Admin Malicious Payloads Landing Page Exploits Stats Management Panel Malware Distribution Servers Payloads Get Stats Update payloads

EK prominence

Document malware

Remote access trojans Data stealing malware

Data stealing malware How it works

Why does ransomware work? Complex threat chain Social Engineering No need for persistence Uses existing tools Geographically targeted, locally customized It’s your data

Locky

Cryptowall https://www.cryptowalltracker.org/cryptowall-4.html#targetfileextensions

Zcrypt True virus, no need to send multiple copies https://nakedsecurity.sophos.com/2016/06/01/zcrypt-the-ransomware-thats-also-a-computer-virus/

The Evolution of Endpoint Threats From Malware to Exploits Melissa Virus 1999 $1.2B Love Letter Worm $15B 1998 FinFischer Spyware 2003 $780M Zeus Trojan $2.3B 2007 JSocket RATs $800M 2014 Exploit as a Service $500M 2015 Locky Ransomware $1.1B 2016 Traditional Malware Advanced Threats

Technique Identification The Evolution of Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Prevention URL Blocking Web Scripts Download Rep Pre-Exec Analytics Generic Matching Heuristics Core Rules File Scanning Known Malware Malware Bits Trojan Spyware Virus Worm Run-Time Signatureless Behavior Analytics Runtime Behavior Exploit Detection Technique Identification RATs Ransomware Exploit Kits Traditional Malware Advanced Threats

INTERCEPT

Intercept Anti-Ransomware. Anti-Exploit. Root-Cause Analysis Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies Source of Attack Anti-Exploit Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Low Footprint & False Positives Root-Cause Analysis IT Friendly Incident Response Process Threat Chain Visualization At Risk Asset Identification Prescriptive Remediation Guidance Purpose built to compliment and enhance anti-malware solutions Security focused on exploit techniques, not merely the tools used Designed for the IT Generalist. Powerful enough for the Info-Sec Professional

Anti-Ransomware

Anatomy of a Ransomware Attack CryptoGuard Simple and Comprehensive Universally prevents spontaneous encryption of data Notifies end user on rapid encryption events Rollback to pre-encrypted state CRYPTOGUARD Exploit Kit or Spam with Infection Command & Control Established Local Files are Encrypted Ransomware deleted, Ransom Instructions delivered

Behind the scenes with CryptoGuard – How does it work? Monitor file access If suspicious file changes are detected, file copies are created Attack detected Malicious process is stopped and we investigate the process history Rollback process initiated Original file copies restored Malicious files removed Added to know ransomware definitions Forensic visibility User message on desktop Admin alert in Sophos Central Root cause analysis details available

Anti-Exploit

Signature-less Exploit Prevention

Root Cause Analysis

Root-Cause Analysis Understanding the Who, What, When, Where, Why and How What Happened? Root Cause Analysis Automatic report @ the process / threat / registry level 30 Days of historical reporting Detailed Visual representation of what other assets have been touched What is at Risk? Compromised Assets Comprehensive list of business documents, executables, libraries and files Any adjacent device (i.e., mobile) or network resources which may be at risk Future Prevention Security Posture Recommendations based on historical security risks Provides steps to prevent future attacks Rich reporting of Compliance status

Our Incident Response engine automatically capture core data on an incident. Showing crisp summary data and details a human can understand. PLUS IT people can add comments and actions to each incident as its investigated. We AUTOMATICALLY add a priority depending on our analysis of the root cause and the chain itself. Obviously someone can add to this, for example here is an Exfiltrator that got caught as it attempted to reach out to a C2.   …and I see that the IT guy recommended we also look at Synchronized Encryption (Show artifacts) Sophos confidential

Digging deeper we see that there are some business files involved in the attempted exfiltration….  (Show RCA)

Our Incident Response engine automatically capture core data on an incident. Showing crisp summary data and details a human can understand. PLUS IT people can add comments and actions to each incident as its investigated. We AUTOMATICALLY add a priority depending on our analysis of the root cause and the chain itself. Obviously someone can add to this, for example here is an Exfiltrator that got caught as it attempted to reach out to a C2.   …and I see that the IT guy recommended we also look at Synchronized Encryption (Show artifacts)

Advanced System Clean

Advanced System Clean Malware Activity Removal Removes Threats Deep System Inspection Removes Malware Remnants Full Quarantine / Removal Effective Breach Remediation On-Demand Assessment Identifies Risky Files / Processes Constantly Refreshed Database Provides Additional Confidence Command-Line Capable

Intercept Benefits Performance Prevent unknown zero-day threats No user impact, no file scanning, no signatures Prevent unknown zero-day threats Intercepting techniques doesn’t require knowledge of known threats Prevent every ransomware attack Faster incident response Root-cause visibility into threats Visualization of full attack chain Deep system cleanup Clean up the malware activity, not just the malware 31