Download presentation
Presentation is loading. Please wait.
Published byCaren Golden Modified over 9 years ago
1
What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here
2
Major Attacks in 2014… Dragonfly CryptoLocker Gameover ZeuS Retail data breach
3
Increase in Targeted Attacks Increase in targeted attack campaigns + 91 % 2012 2013 ISTR 2014
4
Targeted Attack Campaigns 201120122013 Email per Campaign Recipient/Campaign 78 122 29 61 111 23 Campaigns Duration of Campaign 165 408 779 4 days 3 days8.3 days ISTR 2014
5
Zero-Day Vulnerabilities Zero-Day Vulnerabilities, Annual Total, 2006 - 2013 Source: Symantec 23 zero-day vulnerabilities discovered in 2013 Increase from 14 in 2012 More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking More zero-days in 2013 than in past two years combined
6
Targeted Industries Public Administration (Gov.) Services – Professional Services – Non-Traditional Manufacturing Finance, Insurance & Real Estate Transportation, Gas, Communications, Electric Wholesale Retail Mining Construction 16% 15 14 13 6 5 2 1 1 Top 10 Industries Targeted in Spear-Phishing Attacks, 2013 Source: Symantec ISTR 2014
7
Size of Targeted Organization Targeted attacks are moving downstream
8
Move beyond Antivirus with Intelligent Security
9
Symantec IS Security Intelligence Monitors Threats in 157+ countries 550 Threat Researchers 14 Data Centers World Wide 7 Billion 1 Billion+ 2.5 Trillion File, URL & IP Classifications Devices Protected Rows of Security Telemetry Capturing previously unseen threats and attack methods Putting “big data” analytics to work for every end user More visibility across devices creates better context and deeper insight 2B+ events logged daily Over 100,000 security alerts generated annually 200,000 daily code submissions
10
Intelligent Endpoint Protection Layered protection to stop mass, targeted and advanced threats Network Threat Protection Blocks malware before it spreads to your machine and controls traffic Advanced Scanning Blocks suspicious files – even those with no fingerprint – before they can run and steal your data Insight Reputation Safety ratings for every single software file on the planet, and uses this to block targeted attacks SONAR Behavior Blocking Blocks software with suspicious behaviors to stop advanced threats Symantec Power Eraser Aggressive SMR technology roots out entrenched infections and kills them in seconds Intelligent security technologies
11
Big Data Analytics Analytics Warehouse Analysts Attack Quarantine System Endpoints Gateways 3 rd Party Affiliates Global Sensor Network Global Intelligence Network Global Data Collection Honeypots INSIGHT: Reputation Monitoring for SEP Contextual intelligence for dynamic analysis Bad Safety Rating File is blocked Bad Safety Rating File is blocked Good Safety Rating File is whitelisted Good Safety Rating File is whitelisted No Safety Rating Yet Can be blocked No Safety Rating Yet Can be blocked
12
Monitors 1390 file behaviors to answer: SONAR: Behavior Monitoring in SEP Human-authored Behavioral Signatures Artificial Intelligence Based Classification Engine Behavioral Policy Lockdown Who is it related to? What did it contain? Where did it come from? What has it done? Provides Zero-Day Protection Against Unknown Threats
13
So… what’s new?
14
What’s New in 12.1. 5 Performance EnhancementsManagement Enhancements Better client performance Reduced network load with bandwidth throttling Reduced network storage space Integrated repair tool for better control Linux client management support Integrated Host Integrity tool Remote MAC deployment Enhanced competitive uninstaller
15
Performance Enhancements
16
Client performance Improve boot time by more than 10%
17
Bandwidth throttling Better control of bandwidth to SEPM Can control connections based on: – File location – Bandwidth – Subnet – File size – File type
18
Content deltas Reduces disk space on SEPM by 85-95% Store older content revisions as delta files Allows customers to cache more revisions – Reduces the # of full definitions delivered over the network
19
Management Enhancements
20
Power Eraser Integration New option to run Power Eraser command from SEPM Reduce time to clean infected systems Mitigate False Positives Power eraser Repair
21
Linux client management Fully managed by SEPM Antivirus policy management Reporting, monitoring and logging Single client package
22
Host Integrity checking and policy enforcement Previously SNAC-only features now added to SEP – Host Integrity policies: pre-built and custom – Peer-to-Peer enforcement – Quarantine location
23
Remote deployment for Mac Remotely install Mac clients from the Symantec Endpoint Protection Manager (SEPM)
24
Updated competitive uninstaller Removes over 300 products from more than 60 vendors, including: – McAfee – Trend Micro – Kaspersky – Microsoft – Sophos – AVG – AhnLab – Avast – Bitdefender – CA – Eset – Malwarebytes
25
70 % Less scan overhead Smarter updates Optimized for higher VM densities Intelligent Security Insight & SONAR Advanced extended protection Scalable, flexible control Remote management Granular policies and reporting Unrivaled Security Smarter Management Blazing Performance Compared to traditional scanning methods. Symantec Endpoint Protection 12.1. 5
26
3 rd Party tests confirm Unrivaled Security & Blazing Performance Dennis Technology Labs (2014) The only product to receive AAA ratings for protection for the past FIVE quarters PASSMARK Report (2014) Received the highest overall score and dominated other products in terms of product performance AV-Test Org (2013) Detects and removes more threats than any other solution in its class
27
More Information… What’s New at the Endpoint? – Move beyond AV Customer Webcast on Oct. 28 Mini Video Partner Webcast Blog
28
Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Presenter’s Name Presenter’s email Presenter’s phone
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.