What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Endpoint Protection Unrivaled Security
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
© 2014 Microsoft Corporation. All rights reserved.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
System Center 2012 Configuration Manager Concepts & Administration
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Backup Modernization with NetBackup Appliances
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
KASPERSKY SECURITY FOR STORAGE Product Launch Presentation Global B2B Product Marketing Teams.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Adversary Defense: Past, Present, Future Presenter’s Name Here Presenter’s Title Here.
Conditions and Terms of Use
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Network security Product Group 2 McAfee Network Security Platform.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Achieving success WITH
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department, University.
BUILD SECURE PRODUCTS AND SERVICES
Deployment Planning Services
“Introduction to Azure Security Center”
Hybrid Management and Security
Active Cyber Security, OnDemand
Threat Management Gateway
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Intercept X for Server Early Access Program Sophos Tester
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure once, run anywhere Simplify your security with Sophos
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
What’s new in the Fall Creators Update for Windows Defender ATP
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
Microsoft Data Insights Summit
Presentation transcript:

What’s new in SEP Presenter’s Name Here Presenter’s Title Here

Major Attacks in 2014… Dragonfly CryptoLocker Gameover ZeuS Retail data breach

Increase in Targeted Attacks Increase in targeted attack campaigns + 91 % ISTR 2014

Targeted Attack Campaigns per Campaign Recipient/Campaign Campaigns Duration of Campaign days 3 days8.3 days ISTR 2014

Zero-Day Vulnerabilities Zero-Day Vulnerabilities, Annual Total, Source: Symantec 23 zero-day vulnerabilities discovered in 2013 Increase from 14 in 2012 More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking More zero-days in 2013 than in past two years combined

Targeted Industries Public Administration (Gov.) Services – Professional Services – Non-Traditional Manufacturing Finance, Insurance & Real Estate Transportation, Gas, Communications, Electric Wholesale Retail Mining Construction 16% Top 10 Industries Targeted in Spear-Phishing Attacks, 2013 Source: Symantec ISTR 2014

Size of Targeted Organization Targeted attacks are moving downstream

Move beyond Antivirus with Intelligent Security

Symantec IS Security Intelligence Monitors Threats in 157+ countries 550 Threat Researchers 14 Data Centers World Wide 7 Billion 1 Billion+ 2.5 Trillion File, URL & IP Classifications Devices Protected Rows of Security Telemetry Capturing previously unseen threats and attack methods Putting “big data” analytics to work for every end user More visibility across devices creates better context and deeper insight 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions

Intelligent Endpoint Protection Layered protection to stop mass, targeted and advanced threats Network Threat Protection Blocks malware before it spreads to your machine and controls traffic Advanced Scanning Blocks suspicious files – even those with no fingerprint – before they can run and steal your data Insight Reputation Safety ratings for every single software file on the planet, and uses this to block targeted attacks SONAR Behavior Blocking Blocks software with suspicious behaviors to stop advanced threats Symantec Power Eraser Aggressive SMR technology roots out entrenched infections and kills them in seconds Intelligent security technologies

Big Data Analytics Analytics Warehouse Analysts Attack Quarantine System Endpoints Gateways 3 rd Party Affiliates Global Sensor Network Global Intelligence Network Global Data Collection Honeypots INSIGHT: Reputation Monitoring for SEP Contextual intelligence for dynamic analysis Bad Safety Rating File is blocked Bad Safety Rating File is blocked Good Safety Rating File is whitelisted Good Safety Rating File is whitelisted No Safety Rating Yet Can be blocked No Safety Rating Yet Can be blocked

Monitors 1390 file behaviors to answer: SONAR: Behavior Monitoring in SEP Human-authored Behavioral Signatures Artificial Intelligence Based Classification Engine Behavioral Policy Lockdown Who is it related to? What did it contain? Where did it come from? What has it done? Provides Zero-Day Protection Against Unknown Threats

So… what’s new?

What’s New in Performance EnhancementsManagement Enhancements Better client performance Reduced network load with bandwidth throttling Reduced network storage space Integrated repair tool for better control Linux client management support Integrated Host Integrity tool Remote MAC deployment Enhanced competitive uninstaller

Performance Enhancements

Client performance Improve boot time by more than 10%

Bandwidth throttling Better control of bandwidth to SEPM Can control connections based on: – File location – Bandwidth – Subnet – File size – File type

Content deltas Reduces disk space on SEPM by 85-95% Store older content revisions as delta files Allows customers to cache more revisions – Reduces the # of full definitions delivered over the network

Management Enhancements

Power Eraser Integration New option to run Power Eraser command from SEPM Reduce time to clean infected systems Mitigate False Positives Power eraser Repair

Linux client management Fully managed by SEPM Antivirus policy management Reporting, monitoring and logging Single client package

Host Integrity checking and policy enforcement Previously SNAC-only features now added to SEP – Host Integrity policies: pre-built and custom – Peer-to-Peer enforcement – Quarantine location

Remote deployment for Mac Remotely install Mac clients from the Symantec Endpoint Protection Manager (SEPM)

Updated competitive uninstaller Removes over 300 products from more than 60 vendors, including: – McAfee – Trend Micro – Kaspersky – Microsoft – Sophos – AVG – AhnLab – Avast – Bitdefender – CA – Eset – Malwarebytes

70 % Less scan overhead Smarter updates Optimized for higher VM densities Intelligent Security Insight & SONAR Advanced extended protection Scalable, flexible control Remote management Granular policies and reporting Unrivaled Security Smarter Management Blazing Performance Compared to traditional scanning methods. Symantec Endpoint Protection

3 rd Party tests confirm Unrivaled Security & Blazing Performance Dennis Technology Labs (2014) The only product to receive AAA ratings for protection for the past FIVE quarters PASSMARK Report (2014) Received the highest overall score and dominated other products in terms of product performance AV-Test Org (2013) Detects and removes more threats than any other solution in its class

More Information… What’s New at the Endpoint? – Move beyond AV Customer Webcast on Oct. 28 Mini Video Partner Webcast Blog

Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presenter’s Name Presenter’s Presenter’s phone