Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vikas Uberoy -Channel Director ANZ

Similar presentations


Presentation on theme: "Vikas Uberoy -Channel Director ANZ"— Presentation transcript:

1 Vikas Uberoy -Channel Director ANZ

2 Agenda Soft Solutions and Malwarebytes Teams Why Malwarebytes?
Malwarebytes Portfolio Go-to-market for the region New Partner Program

3 Malwarebytes & Soft Solutions teams
Jim Cook Regional Director ANZ Vikas Uberoy Channel Director ANZ Brett Callaughan Sr. Sales Engineer Andrew Probert Sr. Sales Engineer Paul Leslie BDM/Central & Southern Channel Manager DJ Lamba Northern Channel Manager Aaron Bhashkar Enterprise Channel Manager Arsh Singh Technical Support Engineer

4 Soft Solutions is Malwarebytes’ only distributor in New Zealand
Go-To Market Soft Solutions is Malwarebytes’ only distributor in New Zealand Two-Tier Channel sales model Two pre-sales engineers to support partners & customers

5 Why Malwarebytes ?

6 “We believe that everyone has a fundamental right to a malware-free existence”
– Our Vision

7 Threats blocked every hour
Trusted by Millions 15,000+ Businesses protected 750,000,000 IT hours saved 605,000 Threats blocked every hour 28,000,000+ Endpoints protected Malwarebytes builds enterprise solutions that are trusted by millions. We currently protect more than 10,000 businesses, from large enterprises to small offices and every size in between. Attackers don’t discriminate, and neither does our protection. Estimates determine we’ve saved 750 Million hours for IT departments around the globe. Our telemetry from 2015 shows that we detected and blocked 5.3 billion threats – that’s an average of 605,000 threats every hour! And we’re protecting more than 28 Million endpoints worldwide

8 The Malwarebytes Difference
Proactive and Generic Exploit Mitigation Technology Sophisticated Linking Engine Aggressive Detection Techniques Focus on Zero-Day Threats 80% of all malware is delivered via exploit kits. 100% focused on dealing with zero-day malware and exploits. Thoroughly remediates payload and all threat artifacts. We don’t just remove threats- we prevent them.

9 Two ways to secure your endpoints
Remediation Prevention

10 Anti-Ransomware Forensic client Mac client MBAM Remediation Tool
Current Products Forensic client Mac client MBAM Remediation Tool TechBench Anti-Ransomware Company Confidential – For Internal Use Only

11 Breach Remediation (MBBR)

12 Traditional Remediation
Advanced threat slips past network and endpoint defenses Malware infects endpoint, hidden by thousands of alerts each day 200 days for incident response team to detect breach 4-8 hours to remediate malware or reimage compromised endpoint When it comes to detecting and responding to a breach, it traditionally follows this pattern: Usually an advanced threat or attack slips past existing network and endpoint defenses. Malware infects the endpoint. This activity is often hidden by the thousands of other alerts the security team receives each day. IR teams detect the breach, and according to Gartner that could be an average of 205 days after the initial attack, or 256 days according to Ponemon Institute. And once the IR team completed their forensics of the attack, it takes IT staff an average of 6 hours to remediate the malware and/or re-image the compromised endpoint. And this process gets repeated dozens, hundreds, or thousands of times a day depending on the size of the business. Responding to advanced threats and cyber attacks with traditional security is like using a fire extinguisher – running from cyber fire, or machine to machine, trying to mitigate the effects of an attack or breach, and piece together the forensics of what happened. And how many times a day does this happen to you? How much does it cost for staff to fix? What was your employee working on when this happened? What about lost productivity? What was the purpose of the attack? What did the attacker get? Repeat…

13 Advanced Threat Removal
Automated endpoint detection and remediation solution Desktops + Laptops Data Centers + Cloud Servers Security & Management Tools Reduces incident response time- preventing breaches Thoroughly remediates advanced threats and artifacts Hunt for malware with custom IOCs Proactive; reducing downtime drastically Automated to save man hours Integrates with existing IT investments But there’s a better way… As I mentioned, today I’m giving you a quick deep dive on Malwarebytes Breach Remediation, our endpoint detection and remediation (EDR) cybersecurity platform. It radically accelerates your ability to remove advanced threats from your endpoints. Breach Remediation is easily deployed onto enterprise desktops and laptops as well as Windows Servers running in data centers and clouds. - Not only will it find advanced threats on these endpoints, it thoroughly remediates the payload and all associated threat artifacts. - This comprehensive approach to breach remediation helps eliminate the possibility of new cyber attacks or lateral movements that capitalize on leftover malware traces. - This is a key differentiator for Malwarebytes and the reason so many businesses and people (like you) trust us. It integrates with your existing security and management tools – creating new opportunities for enterprise-wide advanced threat detection and remediation. It’s like having an automated sprinkler system that enables the whole enterprise to put out cyber fires as they appear across thousands of endpoints. With Breach Remediation’s flexible scripting capabilities, we are able to tightly integrate with diverse environments that include their SIEMs and endpoint management tools.

14 Better Together

15 Malwarebytes Endpoint Security
Pre-execution Post-execution Profiling Delivery Exploitation Payload Execution Malicious Behavior Malwarebytes Endpoint Security Malwarebytes Endpoint Security brings all of our industry-leading protection and remediation technologies into one powerful solution. This multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection in a single platform. Delivering multi-stage attack protection provides companies of all sizes, across all industries, around the globe the ability to stop an attacker at every step. …And all of these different layers of technologies that provide protection across each of the 5 stages of the attack chain are included in our Endpoint Security product.

16 Breaking the Attack Chain
Pre-execution Post-execution Profiling Delivery Exploitation Payload Execution Malicious Behavior Every modern threat attack requires an attacker to proceed using several stages, commonly referred to as the attack chain. Lockheed Martin even coined the phrase “Cyber Kill Chain” to explain 1. Profiling 2. Delivery 3. Exploitation 4. Payload execution These first 4 stages are all pre-execution, with the last stage of the attack being post-execution of the attack payload. 5. Malicious behavior – any/all actions the attacker is taking on the endpoint, whether it’s stealing data, propagating the attack wider across more of the networked endpoints, or encrypting files in the case of ransomware.

17 Partner Program ANZ

18

19 Partnerbytes – Partner Portal

20 Many Thanks Questions?


Download ppt "Vikas Uberoy -Channel Director ANZ"

Similar presentations


Ads by Google