V v AGARI SINET 16 INNOVATOR Thursday, December 5 th, 2013 PATRICK PETERSON FOUNDER & CEO, AGARI

Slides:



Advertisements
Similar presentations
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Advertisements

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Who Is Attacking You? Distinguishing Motivation to Prioritize Threats John Hultquist Senior Manager, Cyber Espionage Threat Intelligence iSIGHT Partners.
Internet as a Military-Free Zone: The Kaspersky Vision Eugene Kaspersky Chairman & CEO, Kaspersky Lab.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
PROGRAMMATIC : SILVER BULLET OR NOISE?. Copyright ©2014 The Nielsen Company. Confidential and proprietary. 2 Jessica Hogue SVP, Client Service Nielsen.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
© 2009 VMware Inc. All rights reserved Confidential VMware: An Overview Pat Gelsinger, CEO.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Smart Utility Operations Breaking down the barriers in your organization Mike Ballard.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center.
Ali Alhamdan, PhD National Information Center Ministry of Interior
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director.
Customer Communication and Engagement—Building Your Presence Moderator: Don Rescigno Panelists: Phillip Cantilo, Paul Kuhne.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
© Copyright 2015 EMC Corporation. All rights reserved. 1 RSA FRAUDACTION DANIEL COHEN * FRAUDACTION ANTI-FRAUD SERVICES.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
Cybersecurity is our shared responsibility valpo.edu/it Facebook.com/ITatValpo Join the #CyberAware conversation:
Proprietary & Confidential 1 Paul Falor, VP of IT, North Highland Friday, May 20th Cyber Security PayCLT.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
What is ? Launched in 1999 Born in Napa Valley 100% Web-based Customer & order centric All channels, Single database Accessible.
Six Steps to Secure Access for Privileged Insiders and Vendors
Phishing Don’t take the bait! Dave Beauvais Andrew Sloan
CYBER SECURITY PANDEMIC
2016 Data Breach Investigations Report
Bank ReBIT - Operational Excellence Webinar Series (DMARC)
Journey to Microsoft Secure Cloud
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
What Is DMARC Brian Reid Microsoft Office Servers and Services MVP
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Microsoft Ignite /20/2018 8:09 AM BRK3023
Six Steps to Secure Access for Privileged Insiders and Vendors
How to Protect Yourself from ID Theft and Social Engineering
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
بهترین راهکار را انتخاب کنید...
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
Strong Security for Your Weak Link:
1/16/2019 4:44 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Microsoft Data Insights Summit
How We Fight Against Scam
Introduction to Symantec Security Service
Cybersecurity Simplified: Phishing
Presentation transcript:

v v AGARI SINET 16 INNOVATOR Thursday, December 5 th, 2013 PATRICK PETERSON FOUNDER & CEO, AGARI

2 PHISHING PLAGUE CONTINUES Copyright 2013 Agari. All rights reserved. Confidential and Proprietary.

Over 95% attacks tied to state-affiliated espionage employed phishing as a means of establishing a foothold in their intended victims’ systems. 3 “ ” Source: Verizon 2013 Data Breach Investigations Report 95% OF ESPIONAGE STARTS WITH PHISHING

4 SECURING THE ENDPOINT IS IMPERFECT Copyright 2013 Agari. All rights reserved. Confidential and Proprietary.

5 AGARI BUILT A BETTER, DATA-DRIVEN WAY Copyright 2013 Agari. All rights reserved. Confidential and Proprietary Massive threat dataset > 1T s Reject spoofed s at the receiver Authenticate legitimate s at the sender Data Policy

6 100M TWITTER PHISHING S / DAY ELIMINATED Copyright 2013 Agari. All rights reserved. Confidential and Proprietary. Twitter redeployed 60 resources after Agari

7 AGARI PROTECTS 80% OF US CONSUMERS Copyright 2013 Agari. All rights reserved. Confidential and Proprietary. AGARI RECEIVERS AGARI SENDERS ● Leverages “DMARC” Open Standard ● Adopted by FS-ISAC (Financial Services – Information Sharing & Analysis Center) ● Intelligence leveraged by FS-ISAC, FBI and Microsoft for Citadel botnet takedown AGARI RECEIVERS

Until the DMARC standard came out, there wasn’’t a way to stop this. Turning on DMARC is like turning on the lights in a dark room. DMARC gives us a way to reduce our operating costs, give a better customer experience and protect our brand. KEITH BURMASTER Senior Director, Systems Technology NACHA MIKE ADKINS Messaging Engineer FACEBOOK JIM ROUTH Former Global Head of Application & Mobile Security JP MORGAN CHASE “ ” “ ” “ ” 8 agari.com/video/why-choose-agari/

Copyright 2013 Agari. All rights reserved. Confidential and Proprietary. 9 Thank You!