Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Security for Today’s Threat Landscape Kat Pelak 1.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Information Security in Real Business
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Avira AntiVir Premium Kaiyu Wang. About the Avira AntiVir Premium The Avira AntVir from German. It just has 30MB, but it can kill 1,600,000 virus Fust.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
[Name / Title] [Date] Effective Threat Protection Strategies.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Winning with Check point
Synchronized Security Revolutionizing Advanced Threat Protection
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Sophos Central for partners and customers: overview and new features
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Barracuda Web Filtering Service
Customized Solutions to your needs
Contact Norton Antivirus | Norton Antivirus Support UK
Intercept X for Server Early Access Program Sophos Tester
Software-Defined Secure Networks in Action
Home Internet Vulnerabilities
Check Point Connectra NGX R60
Cloud Security for Endpoints
Secure once, run anywhere Simplify your security with Sophos
Healthcare Cloud Security Stack for Microsoft Azure
(With Hybrid Network Support)
Are your users fed up with your Anti-malware protection software?
<offer name> with Microsoft 365 Business Secure Deployment
SBS 2008 – One year on David Overton
Plan and design the solution
Presentation transcript:

Sophos Live Protection

Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better

Prevent malware infection Before: Still getting infected After/Positive Outcome: Productivity/efficiency gains Current AV solution either doesn’t provide effective proactive protection of new and unknown malware threats or is slow to update protection Not cleaning up malware incidents so IT delivers strategic projects on time and on budge and maximize return on existing and future IT investments Infection occurs when mobile or remote users visit websites that have been compromised (not protected by gateway protection) End-users have the tools they need to be productive without compromising security Improved IT productivity – focus on value-added business initiatives Multiple vendors/components required to provide a comprehensive solution Greater system performance and uptime and better employee productivity Security vendor acts as a partner – solving issues and applying best practices

Minimum Required Capabilities 4 Metrics % of new threats stopped without requiring update # of URLs scanned by vendor Time taken to install/manage Cost of licensing/deploying protection AV Scanning Intrusion Prevention Real-time Protection

Sophos Threat Protection Intelligent protection that detects and stops zero-day threats Anti-Virus Scanning Anti-Virus Identities (IDE) Behavioral Genotype Protection Intrusion Prevention Runtime Behavior Detection Sophos Client Firewall Live Protection Live Anti-Virus Live URL Filtering

Prevent malware infection: How we do it In-the-cloud protection against the latest threats Web protection for fixed and mobile endpoints Single vendor, console and integrated agent Sophos ESDP Before: Still getting infected Current AV solution either doesn’t provide effective proactive protection of new and unknown malware threats or is slow to update protection Infection occurs when mobile or remote users visit websites that have been compromised (not protected by gateway protection) Multiple vendors/components required to provide a comprehensive solution

Sophos Live Anti-virus New – In-the-cloud protection against the latest threats Checks suspicious files with SophosLabs Reputation database of good and bad data Reduces reliance on updating Live in-the-cloud lookups Live in-the-cloud lookups

10 Sophos Live URL Filtering New – Web protection for fixed and mobile endpoints Live in-the-cloud lookups Live in-the-cloud lookups Built into the endpoint agent Preventing access to malicious URLs Protects users in the office, at home or on public WiFi

How we do it better – competitive comparison SophosSymantecMcAfeeTrendKaspersky Live Anti-Virus half Live URL Filtering HIPS half Clear advantages: SophosLabs expertise does the heavy lifting and delivers pre-packaged intelligence (Eliminates complex configuration) Comprehensive combination of threat protection technologies Threat protection agent also delivers prevention technologies and DLP Single vendor, console and integrated agent

Summary Sophos Live Protection’s in-the-cloud technology delivers fast, effective detection of zero-day and web based threats without the need for an update Live Anti-VirusLive URL Filtering

Appendix

In-the-cloud... What is this cloud? Put simply, the cloud is the internet Vendors provide software and services via the internet What is Sophos doing? Providing direct connections to the constantly updated reputation databases in SophosLabs How do customers benefit? Protected against the very latest threats Make the most of the expertise in SophosLabs

Sophos Live Protection in-the-cloud technology delivering fast, effective detection of zero-day and web based threats without the need for an update