OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
Which server is right for you? Get in Contact with us
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Unified Logs and Reporting for Hybrid Centralized Management
Information Security in Real Business
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Security Guidelines and Management
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
OPSWAT Presentation for XXX
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
About Us Inception in 2001, Bitdefender has continued to raise the bar to set new standards in proactive threat prevention and virus removal. Offices.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: November 2011.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CSI Software Offers Fully Integrated, Single-Source Enterprise Software for Membership-Based Facilities COMPANY PROFILE: CSI SOFTWARE CSI Software was.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
WHAT OUR CUSTOMERS ARE SAYING “After thorough market research and a review process, Qorus Breeze Proposals stood out from the competitors because of its.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Combining Cloud Power with Mobile Technology, Fielding Systems Is Delivering the Digital Oilfield to Modern Oil and Gas Production Companies COMPANY PROFILE:
MLevel Is the Fully Microsoft Azure-Based, Industry-Leading Casual Learning Platform Used by Enterprises Worldwide to Make Learning Fun MICROSOFT AZURE.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Microsoft Azure Powers Optimized Features of ESET File Security and Its Superior Protection, High Detection Speed, and Smooth Operation MICROSOFT AZURE.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Unit 3 Virtualization.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Chapter 5 Electronic Commerce | Security Threats - Solution
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cloud-First, Modern Windows Management and Security
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
MCSA VCE
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Which is right for your business, Office 365 or Microsoft 365?
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Which is right for your business, Office 365 or Microsoft 365?
Cloud Security for Endpoints
Microsoft Virtual Academy
Presentation transcript:

OPSWAT Presentation for XXX Month Date, Year

OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow with Metadefender  Questions

OPSWAT at a Glance Company  Established 2002  Private, profitable and growing  Head office in San Francisco, California Products  Multi-scanning – Metascan ® and Metadefender ®  Security Application Manageability – OESIS ® & AppRemover  Secure Virtual Desktop Isolation Technology  GEARS – Network Manageability Customers  Governments, CERTs, Finance, Utilities, [esp. Nuclear], Military  OEM s – SSL VPN, NAC Management services, Support Tools

SSL VPN and NAC Customer Verticals Network Compliance and Vulnerability Assessment Support Tools Government Higher Ed and Corporations Managed Services

Metascan Scan Files with Multiple Antivirus Engines

Why Multi-scanning? Too much malware, insufficient detection

Over 220,000 new malware variants appear every day test.org/en/statistics/malware/ “Cyber attacks on America’s critical infrastructure increased 17-fold between 2009 and 2011.” on/2012/0808/Help-wanted-Geek-squads-for- US-cybersecurity The rapid growth in the amount of malware continues to accelerate No AV vendor can keep up with the number of new malware variants The Reality Metascan Multiple engine malware scanning technology Insufficient detection by any one AV product

Measuring Antivirus Capabilities Much variation between different anti-malware engines Detection Rate vs. False Positives for 19 Engines Source: AV Comparatives September 2012

This graph shows the time between malware outbreak and AV detection by six AV engines for 75 outbreaks. No Vendor detects every outbreak. Only by combining six engines in a multiscanning solution are outbreaks detected quickly. By adding additional engines, zero hour detection rates increase further. Zero hour detection 5 min to 5 days No detection at 5 days Illustrating The Decreased Outbreak Detection Time

Geographic Distribution of Antivirus Engines

Performance by the numbers The scan time is much shorter than the sum of the individual scans 1 engine 3 engines 8 engines PDF EXEJPG OTHER Presumed Scan Time

What is Metascan? Multi-scanning engine A server application with a local and network programming interface that allows customers to incorporate multiple anti- malware engine scanning technologies into their security architecture  Supports 0 to 30 anti-malware engines [and growing!]  Simultaneously scans files with all engines  Scan directories, files, archives, buffers, and boot sector  Automatic online definition updates or manual offline updates  ICAP functionality

Metascan vs Traditional Antivirus Engines  Metascan integrates multiple engines that are optimized to work together on the same system  Metascan does not provide Real Time Protection (RTP) like many traditional antivirus engines, all scanning is done on demand

What is Metascan? Multi-scanning engine  Flexible and scalable API driven solution  Many programming Interfaces – C++ Java PHP C#/ASP.NET RESTful (Web API)/HTTP CLI[command line interface] ICAP  Analyzes files locally on a single server or remotely from Windows or Linux systems

Metascan Who uses Metascan?  Analysts who research threats in binaries  CERTs (Computer Emergency Response/Readiness Teams)  Government agencies  Federal and State Law enforcement agencies  Computer forensic analysts  IT security managers who seek to control data flow  Files from public facing sharing/upload sites  Data moving across internal security domains  Detect infected attachments  Independent software vendors seeking to identify threats in their binaries  False positives  Accidental infections

Metascan Features  Manual (Offline) Updates – ZIP file  Download the package (.zip) from an Internet connected system  Transfer the file to a system in the offline network and use the Metascan Management Console or the Metascan Management Station to “push” to multiple servers Engine Definition updates

Metascan Standard packages In addition to our standard offerings, the engines listed below may be added to create custom packages

Metadefender Securing Data Flows into/out of Organizations

Why Metadefender? Peripheral media cannot be trusted

Why Metadefender? Peripheral media is an easy attack vector  Surveys show that 10% to 25% of malware is spread via USB (Sources: ESET & Panda)  Autorun viruses are easy to create  Instructions to create a virus are easily found online  The US Department of Defense banned peripherals entirely in 2008 after an outbreak of the SillyFDC worm which was spread by removable media

Why Metadefender? Metadefender use cases  USBs are the most effective way to deliver malware into a company  USBs bypass network security and deliver malware directly to the endpoint  Contractors and visiting vendors accidentally bring in malware on USB  Software updates and upgrades brought into secure networks on DVDs have contained malware  Banks and other financial institutions are attacked with USBs dropped in parking lots that employees pick up and insert in their work computers. (human curiosity?)  Advanced attacks mail infected USBs to employees as gifts

What is Metadefender? Metadefender allows customers to define data security policies for their users to prevent the introduction of malware to a corporate network through portable media  Define multiple policies for different users or groups of users  Process files to determine if they are a threat  Take the appropriate actions on both allowed and blocked files  Optionally include Multi-scanning by Metascan

Metadefender Features  Multi-Step Process to Secure Network  User Authentication  File Type Filtering  Scanning with Metascan  Scan look up by SHA256 hash value  File Type Conversions  Including embedded object removal  Enhanced Post-Processing  Metadefender System Restore after each session to ensure system integrity

Metadefender and Metascan The Metascan multi-scanning server can be integrated as part of the Metadefender security workflow  Metascan can be installed on the same system as Metadefender or can be on its own dedicated system  Multiple Metadefender systems can use a single Metascan for multi-scanning

Metadefender Who uses Metadefender?  Highly Secure facilities that host outside visitors/contractors  Government Agencies  Power Plants / Nuclear Facilities  IT security managers who seek to control physical media  Banks  Investment companies  Any company concerned about physical media-based malware infections

How Metadefender is commonly used Data workflow controls  Create a process ( workflow ) to control data coming into and out of your organization.  Example:  Scan the contents of peripherals using multiple AV engines  Require visitors to put all content onto a provided USB – then scan the content for malware with multiple AV engines  Convert selected data types  Convert files to jpeg or png to eliminate threats in original file  Block selected file types  Block all executables and other commonly infected files [e.g., PDF]

Metadefender Metadefender is delivered in two formats:  Software to deploy on any system that meets Metadefender’s requirements  Kiosk with Metadefender pre-installed and configured Delivery

Metadefender Deployment Options Choosing the best for your security needs

Product Deployment Options Standalone Systems with no Network connectivity In this deployment option, Metadefender kiosks have both the Metascan server and the Metadefender client installed and have no network connection. Virus definition updates are downloaded from a system connected to the Internet and copied to physical media to be transferred to each Metadefender kiosk. Pros No network connection required Cons Updating virus definitions requires physically bringing media (USB drive/DVD/CD) to each kiosk and applying the update on each one

Product Deployment Options Standalone Systems with Metascan Management Station In this deployment option, a Metascan Management Station is installed on a dedicated system that has network connection to each Metadefender kiosk. The Metadefender kiosks have both the Metascan server and the Metadefender client installed and have network connection to Metascan Management Station only. Virus definition updates are downloaded on the system with the Metascan Management Station installed, and updates are applied to the Metadefender kiosks via the Metascan Management Station. Pros Easier to deploy than standalone systems with no network connectivity Cons Requires network connectivity between each kiosk and the Metascan Management Station Definition updates need to be transferred over the network Requires an additional system for the Metascan Management Station

Product Deployment Options Distributed Systems (Metascan Server Offline) In a distributed system, Metadefender kiosks have only the Metadefender client installed. The Metascan server is installed on a dedicated system. In this deployment option, the Metascan server does not have access to the Internet, and Metadefender kiosks have network connection to the Metascan server only. Virus definition updates are downloaded on a system with connection to the Internet and manually transferred and applied to the Metascan server. Pros Only requires deploying virus definition updates to a single Metascan server The Metascan server can be higher powered to allow for higher scan throughput Cons Requires network connectivity between each kiosk and the Metascan server All files being scanned will be transferred over the network

Product Deployment Options Distributed Systems (Metascan Server Online) In a distributed system, Metadefender kiosks have only the Metadefender client installed. The Metascan server is installed on a dedicated system. In this deployment option, the Metascan server has access to the Internet, and Metadefender kiosks have network connection to the Metascan server only. Because of Internet connectivity, virus definitions automatically update on the Metascan server. Pros Virus definition updates are applied automatically to the Metascan server The Metascan server can be higher powered to allow for higher scan throughput Cons Requires network connectivity between each kiosk and the Metascan server All files being scanned will be transferred over the network Requires Internet connection for the Metascan server

Support  OPSWAT provides three levels of support  Basic Support - Free  Premium Support – 18% of license cost  Platinum Support – 25% of license cost

Support Premium Support  What is covered by Premium support?  Phone support, 9 am to 6 pm PST Monday – Friday  Support Account Manager  Quarterly Conference call reviews  For details of what is covered by each level of support see the Support page on the OPSWAT website

Support Platinum Support  What is covered by Platinum support?  (Everything in Premium support)  24/7 Phone support  Quarterly Meetings with Engineering and Product Management  Prioritized enhancement requests  For details of what is covered by each level of support see the Support page on the OPSWAT website

Questions?