CryptoSpike Robert Graf CEO Mobil

Slides:



Advertisements
Similar presentations
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Advertisements

The Way to Success … Sta rt Sta rt Ak Technologies Mo | Visit.
User Guide. Service Benefits  Full on-line management of client accounts  Paperless direct debit – no signatures required  Standing orders fixed not.
Tele’Ware Software Application. Helping you manage your clients….
AVG Internet Security 7.5 Product presentation.
VYKON Tenant Billing Service
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
SE Document Document Control Software. SE Document SE Document is a Document Management Software System to help you meet all document control requirements.
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
NEW RMU PORTAL – RMU Panel.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Publish Calendars to the Web. CCUweb Presentation (10 Minutes) 1 Demonstration of published calendars (10 minutes) 2 Demonstration of importing calendar.
Courier Tracking System. Small Courier Operations Small courier services collect Letters and parcels from customers and issues its own POD number Then.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Company Confidential OVERVIEW. Application and activity control software for networked computer classrooms …. designed to be used by teachers in order.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
ClusterLion Robert Graf | CEO Mobile
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Administrative Billing Center FFSolutions Demo with Matt Lewis.
Data Hosting and Security Overview January, 2011.
Kaspersky Small Office Security INTRODUCING New for 2014!
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
Setting up Client Tunnel Endpoints Lucent Security Products Configuration Example Series.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
Client-Side Malware Protection for your site
About ProLion CEO, Robert Graf Headquarter in Austria
The Ultimate SharePoint Admin Tool
WEB TESTING
Robert Graf | CEO Mobil
Microsoft Imagine Academy
Advanced Endpoint Security Data Connectors-Charlotte January 2016
An introduction to JDM Pro Release 2.0
Robert Graf | CEO Mobile
The time to address enterprise mobility is now
Contoso Insurance Azure App Services Code Sample
Configuration and Monitoring
ReportWorX vs. ReportWorX Express
Amazon AWS Solution Architect Associate Exam Questions PDF associate.html AWS Solution Training Exam.
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Laplink PCmover.
Robert Graf | CEO Mobile
HR Portal Team Dr. Ashraf Armoush Supervisor Ala’eddeen Awwad
Cisco Exam Securing Cisco Networks with Sourcefire FireAMP Endpoints Version: Demo practice-questions.html.
Cisco Exam Securing Cisco Networks with Sourcefire FireAMP Endpoints Version: Demo practice-questions.html.
DEMO The Ultimate SharePoint Admin Tool.
Microsoft Imagine Academy
FedEx Billing Online (FBO) Non-Revenue Quick Guide
Using Your Assess System
Robert Graf | CEO Mobile
Utilize Group Policy Terminal Server Settings
April Webinar: Advanced Configuration of Order Forms in Workflow
Microsoft Services Provider License Agreement Program reference card
Robert Graf | CEO Mobile
CryptoSpike Robert Graf CEO Mobil
Automated Bulk Signing Solution
Robert Graf CEO Mobil
Hi and welcome to the Order Centre – Ordering training.
Robert Graf | CEO Mobile
About ProLion CEO, Robert Graf Headquarter in Austria
<offer name> with Microsoft 365 Business Secure Deployment
Getting Started With LastPass Enterprise
ClusterLion Automatic switchover for SAP HANA Robert Graf CEO
DataOptimizer Transparent File Tiering for NetApp Storage Robert Graf
CryptoSpike Ransomware Protection & File System Auditing Robert Graf
ClusterLion Automatic switchover for NetApp MetroCluster Robert Graf
Presentation transcript:

CryptoSpike Robert Graf CEO Mobil +43 664 131 44 03 Email: rg@prolion.at

About ProLion CEO, Robert Graf Headquarter in Austria ProLion invented ClusterLion (automatic switchover for MC) NetApp Alliance Partner Product distribution: ABO, Arrow, ALEF, ICOS, INGRAM, TIM We are focused on NetApp

Our Portfolio

Worst Ransomware Strains Source:

Every 40sec. a company gets infected! National Bank of Ukraine

Cybercrime 2016 One third (32%) of all surveyed institutions were affected by ransomware in the last 6 months. Only 18% of those affected have brought the incident to the criminal complaint. Ransomware (+94,4%) Cases of Some Links: Allianz für Cybersicherheit Europol Internet-organised-crime-threat-assessment-iocta-2016 Bundesamt für Sicherheit i.d. IT Empfehlungen Ransomware

Ransomware Damage

Who is behind Ransomware Source:

Motivation for ransomware attacks Source:

Detection time is important... …realtime detection and blocking, saves money!!! Source:

CryptoSpike CryptoSpike Concept CryptoSpike Manager Blacklist Collect Blacklist form different Websites Blacklist *.*locked *.*kraken *.*crypto *.*cry *.exx License Mgmt Add new Customers Blacklist Updates *.*locked *.*kraken *.*crypto *.*cry *.exx *.*locked *.*kraken *.*crypto *.*cry *.exx Customer Information (LicenseKey, Customer Name, Site Information, etc.) load CryptoSpike Blacklist manage Blacklist Pushed to CryptoSpike .pdf .xls .doc .jpg .giv Whitelist Pattern: SMB… CryptoSpike Portal Setup Wizard Blocked Users File History /Restore Config. / Management Pattern Learner Pattern: SMBxxx CryptoSpike Server Fpolicy Server

Live-Demo Live-Demo

NetApp Volumes Vol. 1 Vol. 4 Vol. 2 Vol. 5 Vol. 3 Vol. 6 Vol. 7

File System Operations 2.000 User Vol. 1 50 Mio. Files Vol. 1

Ransomware Attack 3 days data loss!!!! Only one option: 2.000 User Vol. 1 50 Mio. Files 10.000 Files manipulated Vol. 1 Only one option: Total volume restore to Tuesday SnapShot Ransomware Attack Ransomware Attack: File name and file type didn’t change! Last access date didn’t change! All files look the same! How can you separate good from bad content? Mo Tu We Th Fr SnapShots Data 3 days data loss!!!! good data

! ! ! ! ! ! ! CryptoSpike All other users continue without data loss! Vol. 1 50 Mio. Files 10.000 Files manipulated Vol. 1 ! ! ! ! ! Restore only affected content to Tuesday SnapShot ! single file restore Ransomware Attack Active blocking mechanism! Find affected files easily Transaction-Log of all files Detailed history per user Restore only content for affected user! ! Mo Tu We Th Fr SnapShots Data All other users continue without data loss! good data

Triple detection Blacklisted knowing ransomware Creating a whitelist on customers data Our algorithm learns data access patterns and can differentiate between User- and Ransomware access

Configure Policy Simple to manage Everything in one portal Fire-and-forget-mode or detailed manual configuration

Block Ransomware Blocking user access, as soon as Ransomware is detected Alarm via email and portal event Getting details and files who are infected, for the restore

One-Button-Restore Klick on files which need to be restored /RestoreFolder Klick on files which need to be restored Press „Restore“ button Select SnapShot version Specify Restore-Folder Klick on „Restore“ button Done!

Crypto Spike Benefits Easy to deploy (.OVA) Realtime detection of Ransomware <0,5ms Automatic user blocking within the same time Blacklist will be managed and updated automatically Whitelist of customer data increases security Self-learning engine generating white and black access pattern Comprehensive information for single file restore One-Button-Restore from NetApp SnapShot No additional NetApp licenses cost

Lukaskrankenhaus in Neuss

CryptoSpike and ClusterLion Thank you!