BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential
Breaches increased 48% in 2014 (PWC) Threats are more sophisticated Most start at the endpoint The biggest attack surface And the hardest to control Users take risks Browsing the web, opening attachments, connecting to public WiFi And they just want to work – security is not their top concern Users Endpoints Are the Biggest Attack Surface
We need to protect users from advanced threats And $1 of prevention is worth $1,000,000 of detection But security should not lower productivity Restrict employee access to information Get in their way with alarms and blocks Weigh IT down with investigation and reimaging More Protection with Higher Productivity Gartner: Prevention is more cost-effective than detection But how do we make it work?
Most companies have only AV and other signature based protection Application Control/Whitelisting Detection based protection- Behavior based Policy – no access to external storage, no internet browsing Today’s endpoint protection
Threats are constantly changing IT is overwhelmed by non-stop alarms, investigation and remediation User productivity is constantly interrupted Detection Is Never 100% Accurate Gartner: Prevention is more cost-effective than detection But how do we make it work?
Isolates browsers, , removable media, Skype and more Increases user productivity with unrestricted internet access Protects against drive-bys, zero-days, advanced malware…w/o updates Reduces alarms, enables users to work while IT investigates Provides valuable data for incident investigation and forensics You can’t detect all threats. But you can contain them with BUFFERZONE. BUFFERZONE Advanced Endpoint Security
BUFFERZONE enables employees to browse the net safely When the user browses to an untrusted location, the browser opens in the container (red) Anything that is downloaded (intentionally or not) is stuck inside the container IT can define trusted sites – e.g. SharePoint They are automatically opened in a different window, outside the container Safe Browsing
Open any external media safely inside a container USB memory, mobile phones, cameras… Any file is opened inside a container Users can view, edit and even save files back to the removable media without risk Blocks auto-runs Safe Removable Media
Attachments are opened in a dedicated container separate from one used for web browsing Provides protection from all types of malware, including phishing attempts and targeted attacks It is “locked-down” to prevent any exfiltration of data Employees can securely open attachments that contain personally identifiable information (PII) or other sensitive data, without risk of data leakage Safe Attachments
How it Works
Dimensions of Isolation
How it works animation How it works animation User experience demo User experience demo LANDESK management demo LANDESK management demo Demo
BUFFERZONE in the Enterprise
Users should view and save most files in the container Optimal from the security perspective If the user accidentally downloads malware it will be trapped inside the container and cannot infect the rest of the organization The BUFFERZONE Bridge is used to: Extract files from the container – e.g., to share them with another person or upload to an application Move files between the internet and containers Using the Bridge to Extract Files
Basic bridge Extracts files from the container Part of the standard product Secure Bridge Extracts files and then processes them to disarm and disable potentially malicious content Optional addition Compliant Bridge Extracts files and scans them with up to 3 antivirus engines to provide compliance with regulatory standards Optional addition Three Bridge Options
Downloaded files are automatically sent to the bridge server Disarms malicious content in seconds Makes invisible microchanges to file structure and metadata that destroy exploits Extracts text, formatting and safe components Supports Microsoft ® Office, RTF, PDF, images, archives Optional – multiple AV scanners Secure Bridge – How it Works
Organizations need better endpoint data to: Determine if an alarm indicates a real breach Identify attacks that have spread across the organization BUFFERZONE collects over 40 types of events: Registry alterations, file system activity, network activity and more Shares directly with SIEM and other analytics platforms Endpoint Intelligence
Certified integration with LANDESK and McAfee Install, update, manage policy and more Can also be managed through Microsoft GPO On-premise BUFFERZONE management server for smaller installations Setup wizard for small installations Easy to manage for thousands of endpoints Management Click a logo for more info
Protection from advanced threats Isolates all types of threats Configurable bridge Valuable intelligence Protects off-network devices Lower Total Cost of Ownership (TCO) Easy to manage, no updates required Reduces false positives Complements existing security products Transparent User Experience Unrestricted access to the internet Access to removable media Continue working while alerts are verified The BUFFERZONE Advantage
Thank You