111 State of Hawaii Symantec Protection Suite Briefing Bill Musson, CISSP Senior Systems Engineer.

Slides:



Advertisements
Similar presentations
Symantec Endpoint Protection Unrivaled Security
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Security in Real Business
LittleOrange Internet Security an Endpoint Security Appliance.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
EDUCAUSE Security 2006 Internet John Brown University.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
eScan Total Security Suite with Cloud Security
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Highlights: Protection Performance New features Agenda.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Network security Product Group 2 McAfee Network Security Platform.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Implementing Microsoft Exchange Online with Microsoft Office 365
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Conference Call: Access Code: Endpoint-Level Security at your Library or Nonprofit Introducing Symantec Endpoint Protection 12.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
Virtual IT Partner TOOLS. 2 Toolset Overview Provides a unified approach to the most common and needed management tools needed in IT Saves money by consolidating.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Central for partners and customers: overview and new features
Hybrid Management and Security
Cloud App Security vs. O365 Advanced Security Management
Hybrid Management and Security
Microsoft SharePoint Server 2016
McAfee Security Connected – Next Generation Security
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Information Security Session October 24, 2005
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
Secure once, run anywhere Simplify your security with Sophos
Microsoft Data Insights Summit
Per Söderqvist Per Söderqvist Sales Engineer
IT Management, Simplified
Presentation transcript:

111 State of Hawaii Symantec Protection Suite Briefing Bill Musson, CISSP Senior Systems Engineer

2 Agenda Symantec Endpoint Protection SEP11 Overview Symantec Endpoint Protection SEP12 Overview – Symantec Insight – Symantec Online Network for Advanced Response (SONAR) Centralized Security Management – Symantec Management Platform – IT Analytics for SEP – Workflow – SPC v1 – SPC v2

33 Symantec Endpoint Protection 11

4 Results: Reduced Cost, Complexity & Risk Exposure Increased Protection, Control & Manageability Antivirus Antispyware Firewall Intrusion Prevention Device and Application Control Network Access Control Single Agent, Single Console Managed by Symantec Endpoint Protection Manager NAC 11 SEP 11

5 Gartner Magic Quadrant for EPP

66 Symantec Endpoint Protection 12 Symantec Insight Symantec Online Network for Advanced Response (SONAR)

7 Unfortunately neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Unfortunately neither technique works well for the tens of millions of files with low prevalence. (But this is precisely where the majority of today’s malware falls) Today, both good and bad software obey a long-tail distribution. Bad Files Good Files Prevalence Whitelisting works well here. For this long tail a new technique is needed. Blacklisting works well here. The Problem No Existing Protection Addresses the “Long Tail”

8 The Inspiration Only malware mutates So... if an executable is unique, it’s suspicious... but how to know if a file is unique?

9 How often has this file been downloaded? Where is it from? Have other users reported infections? Is the source associated with infections? How will this file behave if executed? How old is the file? How many people are using it? Is the source associated with SPAM? Is the source associated with many new files? Does the file look similar to malware? Is the file associated with files that are linked to infections? Who created it? Does it have a security rating? Is it signed? What rights are required? Who owns it? What does it do? How new is this program? How many copies of this file exist? Have other users reported infections?

10 Achilles Heel of Mutated Threats Hackers mutate threats to evade fingerprints Mutated threats stick out like a sore thumb Virus Writer’s Catch-22 – Mutate too much = Insight finds it – Mutate too little = Easy to discover & fingerprint Unrivaled Security

11 Symantec Insight The context of a file is as telling as its content How will this file behave if executed? How old is the file? Is the source associated with SPAM? Does the file look similar to malware? Is the file associated with files that are linked to infections? Who created it? What rights are required? Have other users reported infections? BAD GOOD LOW HI OR NEW OLD OR Reputation Prevalence Age The context you need

122 Prevalence Age Source Behavior 3 4 Look for associations Check the DB during scans Rate nearly every file on the internet5 Provide actionable data1 Build a collection network Associations How it works Is it new? Bad reputation?

13 Real World Test 13 % of samples % False Positives

14 Remediation Test 14 Remediation Score (higher is better) Number of False Positives (lower is better)

15 First Insight is used for manual scans of endpoints. What are other ways that Symantec leverages Insight in Symantec Endpoint Protection 12?

16 Download Insight Download Insight is a technology that checks the reputation of binaries being downloaded and blocks them if they are “Bad”. Download Insight scans files when they are downloaded using what we term a portal application (IE. Firefox, IE)

17 Faster Scans 17 Insight - Optimized Scanning Skips any file we are sure is good, leading to much faster scan times Traditional Scanning Has to scan every file On a typical system, 70% of active applications can be skipped!

18 Scan Speed 18 Symantec Endpoint Protection Scans: 3.5X faster than McAfee 2X faster than Microsoft Ranked 1 st in overall Performance! PassMark™ Software, Feb.,

19 Create Policies based on Risk Tolerance Only software with at least 10,000 users over 2 months old. Finance Dept Can install medium-reputation software with at least 100 other users. Help Desk No restrictions but machines must comply with access control policies. Developers

20 Symantec Online Network for Advanced Response (SONAR) This information enables three new features

21 What do the hackers think about SONAR ? , 03:03 PM (This post was last modified: :03 PM by M0D3RN H4X3R 2.) Posts: 3592 Joined: Nov 2009 Reputation: 255 Doesn't matter, Your Crypted Viruses, Keyloggers, RATS etc never made it past Norton SONAR 2 anyways =/ (This is in Norton IS and AV 2010, Norton 360 V4) And it detects all hooks and the other method I can't remember to record keylogs. RATS and BOTS will be detected by SONAR 2 as always. Crypted or non-crypted. Even Runtime Crypted (Norton deletes EVERY runtime crypted file after its ran) and it never even gets time to execute. I honestly cant get past it, and no one here has. Norton has really killed our 100% FUD Viruses with SONAR 2 and Insight. Plus, it submits all your files SONAR 2 and insight picks up. “I honestly can’t get past it, and no one here has. Norton has really killed our 100% FUD Viruses with SONAR 2”

Now, lets review how Symantec Insight and SONAR are utilized to strengthen and augment security in SEP 11 as well as reduce false positives.

23 The Security Stack – for 32 & 64 bit systems 23 Network IPS & Browser Protect & FW Insight Lookup Heuristics & Signature Scan Real time behavioral SONAR IPS & Browser Protection Firewall Network & Host IPS Monitors vulnerabilities Monitors traffic Looks for system changes Stops stealth installs and drive by downloads Focuses on the vulnerabilities, not the exploit Improved firewall supports IPv6, enforces policies

24 Insight – Provides Context 24 Network IPS & Browser Protect Insight Heuristics & Signature Scan Real time behavioral SONAR Insight Reputation on 2.5 Billion files Adding 31 million per week Identifies new and mutating files Feeds reputation to our other security engines Only system of its kind

25 File Scanning 25 Network IPS & Browser Protect Insight Real time behavioral SONAR File Scanning Cloud and Local Signatures New, Improved update mechanism Most accurate heuristics on the planet. Uses Insight to prevent false positives Heuristics & Signature Scan

26 SONAR – Completes the Protection Stack 26 Network IPS & Browser Protect Insight Lookup File Based Protection – Sigs/Heuristics Real time behavioral SONAR Monitors processes and threads as they execute Rates behaviors Feeds Insight Only hybrid behavioral- reputation engine on the planet Monitors 400 different application behaviors Selective sandbox (ex Adobe)

What about the actual performance impact on the client with SEP 12.

28 SEP Client Impact on Memory Use 28 Symantec Endpoint Protection uses: 66% less memory than McAfee 76% less memory than Microsoft Memory Usage PassMark™ Software, Feb.,

Will SEP 12 do anything to continue improving performance for guests in virtual environments.

30 SEP 12 Built for Virtual Environments 30 Virtual Client Tagging Virtual Image Exception Shared Insight Cache Resource Leveling Together – up to 90% reduction in disk IO

31 Centralized Security Management Plus Convergence and Integration with Operational Tools Symantec Management Platform IT Analytics for SEP Workflow SPC v1 SPC v2

32 Altiris Client Management Suite Policy-based software delivery Application Management Software Virtualization Patch Management Backup and Recovery Application Usage Remote Control Altiris Software Delivery Suite Apply Patches Ensure software is installed and stays installed Report machines not connecting Identify missing hard-drives Symantec Management Platform Path to Full PC Lifecycle Management Symantec Endpoint Protection Integrated Component Streamline migrations Initiate scans or agent health tasks Dashboards integrate security and operational information

33 Enhanced Reporting - IT Analytics for SEP Ad-hoc Data Mining – Pivot Tables – Data from multiple Symantec Endpoint Protection Servers – Break down by virus occurrences, computer details, history of virus definition distribution... Charts, Reports and Trend Analysis – Alert & risk categorization trends over time – Monitor trends of threats & infections detected by scans Dashboards – Overview of clients by version – Summary of threat categorization and action taken for a period of time – Summary of Virus and IPS signature distribution 33

34 Workflow Integrate IT Tools to Match Business Processes 34 Graphical tool Integration across products 3 rd party integration Process control Timeouts Escalations Delegation Auditing

35 Symantec Protection Center v1 Centralized Security Console Features – Single Sign-On – Central Access to Products Reports and Dashboards – Basic Gin Feeds Product Coverage – Symantec Endpoint Protection – Symantec Network Access Control – Symantec Data Loss Prevention – Symantec Critical Systems Protection – IT Analytics – Symantec Brightmail Gateway

36 Symantec Protection Center v2 36 Symantec Protection Center Symantec EP and NAC Data Loss Prevention Control Compliance Suite Endpoint Management Cross Product Reports & Dashboards Cross Product Automation Single Sign On and Console Access Data Feeds Protection Center Appliance GIN Feeds Native Management for select products 3 rd Party / Cloud Based Products Symantec Protection Suites Encryption

37 Bill Musson Thank You!