OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Which server is right for you? Get in Contact with us
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Module 5: Configuring Access for Remote Clients and Networks.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Information Security in Real Business
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
SaaS, PaaS & TaaS By: Raza Usmani
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
eScan Total Security Suite with Cloud Security
OPSWAT Presentation for XXX
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Tim Vander Kooi Systems
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
ArcGIS Server for Administrators
Microsoft Management Seminar Series SMS 2003 Change Management.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
In an increasingly competitive industry is certified by a recognized provider as Microsoft exam will dramatically improve your chances busy. Microsoft.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Web Programming Language
Chapter 6: Securing the Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Grades4sure PDF Dumps CompTIA Security + Certification Exam
Amazon Storage- S3 and Glacier
ClamXav Antivirus Scanner: A Free Tool for Your Mac OS X
Welcome To : Group 1 VC Presentation
Call AVG Antivirus Support | Fix Your PC
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Cloud Security for Endpoints
Getting Started.
Getting Started.
Increase and Improve your PC management with Windows Intune
Microsoft Virtual Academy
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Comodo Dome Data Protection
IT Management, Simplified
Presentation transcript:

OPSWAT Presentation for XXX Month Date, Year

OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow with Metadefender  Questions

OPSWAT at a Glance Company  Established 2002  Private, profitable and growing  Head office in San Francisco, California Products  Multi-scanning – Metascan ® and Metadefender ®  Security Application Manageability – OESIS ® & AppRemover  Secure Virtual Desktop Isolation Technology  GEARS – Network Manageability Customers  Governments, CERTs, Finance, Utilities, [esp. Nuclear], Military  OEM s – SSL VPN, NAC Management services, Support Tools

SSL VPN and NAC Customer Verticals Network Compliance and Vulnerability Assessment Support Tools Government Higher Ed and Corporations Managed Services

Metascan Scan Files with Multiple Antivirus Engines

Why Multi-scanning? Too much malware, insufficient detection

Over 220,000 new malware variants appear every day test.org/en/statistics/malware/ “Cyber attacks on America’s critical infrastructure increased 17-fold between 2009 and 2011.” on/2012/0808/Help-wanted-Geek-squads-for- US-cybersecurity The rapid growth in the amount of malware continues to accelerate No AV vendor can keep up with the number of new malware variants The Reality Metascan Multiple engine malware scanning technology Insufficient detection by any one AV product

Measuring Antivirus Capabilities Much variation between different anti-malware engines Detection Rate vs. False Positives for 19 Engines Source: AV Comparatives September 2012

This graph shows the time between malware outbreak and AV detection by six AV engines for 75 outbreaks. No Vendor detects every outbreak. Only by combining six engines in a multiscanning solution are outbreaks detected quickly. By adding additional engines, zero hour detection rates increase further. Zero hour detection 5 min to 5 days No detection at 5 days Illustrating The Decreased Outbreak Detection Time

Geographic Distribution of Antivirus Engines

Performance by the numbers The scan time is much shorter than the sum of the individual scans 1 engine 3 engines 8 engines PDF EXEJPG OTHER Presumed Scan Time

What is Metascan? Multi-scanning engine A server application with a local and network programming interface that allows customers to incorporate multiple anti- malware engine scanning technologies into their security architecture  Supports 0 to 30 anti-malware engines [and growing!]  Simultaneously scans files with all engines  Scan directories, files, archives, buffers, and boot sector  Automatic online definition updates or manual offline updates  ICAP functionality

Metascan vs Traditional Antivirus Engines  Metascan integrates multiple engines that are optimized to work together on the same system  Metascan does not provide Real Time Protection (RTP) like many traditional antivirus engines, all scanning is done on demand

What is Metascan? Multi-scanning engine  Flexible and scalable API driven solution  Many programming Interfaces – C++ Java PHP C#/ASP.NET RESTful (Web API)/HTTP CLI[command line interface] ICAP  Analyzes files locally on a single server or remotely from Windows or Linux systems

Metascan Who uses Metascan?  Analysts who research threats in binaries  CERTs (Computer Emergency Response/Readiness Teams)  Government agencies  Federal and State Law enforcement agencies  Computer forensic analysts  IT security managers who seek to control data flow  Files from public facing sharing/upload sites  Data moving across internal security domains  Detect infected attachments  Independent software vendors seeking to identify threats in their binaries  False positives  Accidental infections

Metascan Features  Manual (Offline) Updates – ZIP file  Download the package (.zip) from an Internet connected system  Transfer the file to a system in the offline network and use the Metascan Management Console or the Metascan Management Station to “push” to multiple servers Engine Definition updates

Metascan Standard packages In addition to our standard offerings, the engines listed below may be added to create custom packages

Metascan ICAP Server How does it work?  Proxy traffic sent to ICAP server  Scans all HTTP traffic over the network  Scans incoming and/or outgoing traffic  Incoming traffic for file and web content downloads  Outgoing traffic for file uploads  Blocks contents containing threats  Configurable through the Metascan Management Console

Metascan ICAP Server Deployment All endpoints within an organization are connected to the Internet through a proxy server All traffic going through the proxy can be scanned by Metascan

Metascan Client Easy endpoint scanning with multiple engines

What is Metascan Client? Endpoint scanning A simple executable for scanning Windows or Linux systems  Nothing is installed on the endpoint  Can be run from a USB, CD or DVD or local hard drive  No coding required  Scan files, folders, drives, and active processes in memory and files associated with active processes  Requires a Metascan server

Metascan Client Features – Technical details File processing sequence:

Metascan Client Features Online Deployment Multiple Metascan Clients connected to a single Metascan server The client is run from a USB, CD or DVD, or local drive. It connects to the Metascan server and scans the contents of the endpoint Updates are automatically downloaded from the internet

Metascan Client Features Offline Deployment Multiple Metascan Clients connected to a single Metascan server. The client is run on the endpoints. It connects to the Metascan server and scans the contents of the endpoint. The Metascan server is offline [not connected to the internet] and updated manually

Metascan Client Features Bootable USB Solution for scanning laptops that are brought into a facility. System boots into OS on Metascan Client USB. Allows entire system to be scanned (including boot sector) without booting into system OS Windows and Linux versions available

How should you use Metascan Client?  IT Administrators managing endpoints in their network  VPN Authentication Process  Schedule Scans  IT Troubleshooting  Independent software vendors seeking to proactively address issues with new binaries  False positives  Accidental infections from open source or third party libraries  Bootable USB to scan systems (e.g. laptops) before they are brought into secure facilities

Metascan Client Packages  Metascan Client USB  Windows or Linux  Metascan Client  Windows or Linux  Standalone Executable  File or Process Scanning  GUI (Windows Only) or CLI (Windows and Linux)  Metascan Client Connector  Windows or Linux  File Scanning Functionality  API and CLI  Metascan Client SDK  Windows Only  Process Scanning Functionality

Support  OPSWAT provides three levels of support  Basic Support - Free  Premium Support – 18% of license cost  Platinum Support – 25% of license cost

Support Premium Support  What is covered by Premium support?  Phone support, 9 am to 6 pm PST Monday – Friday  Support Account Manager  Quarterly Conference call reviews  For details of what is covered by each level of support see the Support page on the OPSWAT website

Support Platinum Support  What is covered by Platinum support?  (Everything in Premium support)  24/7 Phone support  Quarterly Meetings with Engineering and Product Management  Prioritized enhancement requests  For details of what is covered by each level of support see the Support page on the OPSWAT website

Questions?