Your Enterprise is Only as Secure as Your Macs

Similar documents
Protecting Your Digital World

Symantec Client Security. Integrated protection for network and remote clients.

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

SOLUTION MANAGEMENT GROUP

ANATOMY OF AN ATTACK!

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Symantec Endpoint Protection

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

FIREWALL BEST PRACTICES TO BLOCK

Kaspersky Open Space Security

Securing Today s Mobile Workforce

Total Threat Protection. Whitepaper

IT & DATA SECURITY BREACH PREVENTION

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Mobile County Public School System Builds a More Secure Future with AMP for Endpoints

Network Security Protection Alternatives for the Cloud

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

NetDefend Firewall UTM Services

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

CA Host-Based Intrusion Prevention System r8

Security Gap Analysis: Aggregrated Results

Symantec Endpoint Protection 11.0

Proactive Protection Against New and Emerging Threats. Solution Brief

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

A Guide to Closing All Potential VDI Security Gaps

SIEM: Five Requirements that Solve the Bigger Business Issues

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

SentinelOne Technical Brief

Symantec Endpoint Protection

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Symantec Protection Suite Add-On for Hosted Security

How to Test Outbreak Commander

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Evolution of Spear Phishing. White Paper

A Ready Business rises above infrastructure limitations. Vodacom Power to you

T E C H N I C A L S A L E S S E R V I C E S

CA Security Management

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

How To Remove Personal Antivirus Security Pro Virus

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

3.5 SECURITY. How can you reduce the risk of getting a virus?

F-Secure Mobile Security

Symantec Network Access Control Starter Edition

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Symantec Security Monitoring Services

Building Resilience in a Digital Enterprise

Symantec Network Access Control Starter Edition

A Review Paper on Network Security Attacks and Defences

Securing the SMB Cloud Generation

F-Secure Mobile Security

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

2018 Mobile Security Report

Symantec Multi-tier Protection

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Benefits. Centrally managed protection of corporate networks

The security challenge in a mobile world

Protecting Your Cloud

Securing Industrial Control Systems

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

BUFFERZONE Advanced Endpoint Security

Comprehensive Networking Buyer s Guide

Free antivirus software download

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Securing Your Most Sensitive Data

SUMMARIES OF INTERACTIVE MULTIMEDIA

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess

Automating the Top 20 CIS Critical Security Controls

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

Building a Threat Intelligence Program

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Network Access Control Starter Edition

Transforming Security from Defense in Depth to Comprehensive Security Assurance

ForeScout ControlFabric TM Architecture

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Small Business Is Big Business in Cybercrime A TrendLabs Primer

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Securing Your Microsoft Azure Virtual Networks

TREND MICRO SMART PROTECTION SUITES

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Best Practices in Securing a Multicloud World

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

THE ACCENTURE CYBER DEFENSE SOLUTION

Transcription:

Your Enterprise is Only as Secure as Your Macs Trend Micro, Incorporated Trend Micro/Intego Alliance Paves the Way to Whole- Network Protection A Trend Micro White Paper I November 2007

TABLE OF CONTENTS THE CLIMATE: HIGHER STAKES FOR BETTER HACKERS...3 THE MAC: HISTORIC IMMUNITY, NEW VULNERABILITY...3 SECURING THE MAC, SECURING THE NETWORK...4 Intego VirusBarrier X4........................................................................... 4 how the product works: fast and easy...4 Virus Scanning.................................................................................. 4 Automatic or Manual............................................................................. 4 Alerts............................................................................................ 5 Turbo Mode...................................................................................... 5 Secure and Insecure Zones.................................................................... 5 Scheduling....................................................................................... 5 how the product looks: virus protection with a mac-like face...6 Remote management: securing macs on the go...7 the trend micro/intego alliance...7 2 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS

THE CLIMATE: HIGHER STAKES FOR BETTER HACKERS Today s Internet is a land of opportunity, zoned for commerce and open to all comers, shoppers and criminals alike 1.The perpetrators are not yesterday s hackers, wreaking havoc purely for mischief. Today, the enterprise is under attack by the enterprising. Financial institutions are, of course, a prime criminal target, but everyone who downloads a video, buys shoes online or responds to an email from a co-worker is vulnerable, even if they re using a Macintosh TM. > Read a whitepaper about Web 2.0 security threats. THE MAC: HISTORIC IMMUNITY, NEW VULNERABILITY Search Apple.com for known viruses, and the gist of the few responses that come up is that Macs don t have viruses, PCs do. This belief is well enough grounded in truth that it s lulled Mac TM users into a state of false security. Apple s Unix-based operating system, with such features as a built-in firewall and secure keychain, protect a Mac from marauders out of the box, but most Mac users don t even turn the firewall on. Mac s traditionally smaller market share used to make it a less attractive target for hackers than the Windowsbased enterprise. But Apple s market share has grown over 8% in the most recent quarter 2. Apple has more than 17% of the laptop market 3. A Bigger, Better Target For Apple, the price of success is increased exposure. Today, Mac users are CEOs as well as students and artists, an economically significant target. The Mac laptop s ease of use, and the richness of the applications it runs, have expanded the customer base and changed the customer profile. Mac s media-forward users are constantly online, uploading, downloading, transacting and interacting across the whole spectrum of social and commercial applications. In short, they frequent all the places where malware lies in wait. Known By Your Enemies It is a measure of the Mac s growing popularity that it now has a mature camp of enemies, from the AS.MW2004.Trojan 4, a ruthless file deleter, to a full complement of macro viruses that infect and propagate through Microsoft TM Office Word and Excel TM applications. The Safari Web browser, Apple s QuickTime TM media software, and its Bluetooth TM framework have all been recently been targeted by exploits, with impacts that range from file damage to a takeover of infected machines. Even a well-protected machine can harbor destructive malware inside the firewall. A macro that doesn t harm Microsoft Office for Macintosh can hide in a seemingly innocent Word document until it finds a Windows TM host and begins causing damage to Windows files. Given the rate at which co-workers trade files, through email, shared drives, or removable media, it doesn t take long to infect the enterprise. A healthy business can be crippled by a virulent malware assault at any time. The reward to the assailant is potentially huge. That makes the network-trusted mobile Mac a worthy target for the best cyber-criminal minds. 1 Hacker Economics, CIO magazine online, September to November 2007 2 Gartner Group, October 2007 3 NPD, June 2007 4 Intego Security Alert - http://www.intego.com/news/pr42.asp 3 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS

SECURING THE MAC, SECURING THE NETWORK Even if an enterprise has strong anti-virus protection installed on its file servers and email servers, even if it has an impenetrable firewall, it can still be brought low by an employee who comes to work with an infected machine, or a partner who accesses the network from one. That s why it s important to protect the individual Mac as well as the corporate infrastructure. There are two equally good reasons to choose a virus protection product that s as elegantly simple as a Mac. The first is that Mac users expect an intuitive, non-intrusive interface that does the job without a lot of steps or a lot of fanfare. The second reason is that enterprise network administrators are often new to the Mac. Anything that makes it easier for them to do the right thing is the right thing. Intego VirusBarrier TM X4 Intego VirusBarrier X4, cited on apple.com as the acclaimed anti-virus program for the Mac, is a powerful security solution designed for use with OS X. While its under-the-hood sophistication equals that of popular Windows security products, the Intego VirusBarrier X4 interface is easy to use. Three Apple-friendly keywords governed its design: simple, fast, and non-intrusive. According to reviews in the Macintosh press, it succeeds in being all three 5. Installation requires only a few clicks and a reboot. Once Intego VirusBarrier X4 is installed and run for the first time, it becomes virtually invisible to the user until it has something urgent to report. Macworld product reviewer Rob Griffiths wrote, In my testing, this background monitoring had no noticeable impact on my daily use of a PowerBook G4...It is also the fastest scanner I tested by far. 6 HOW THE PRODUCT WORKS: FAST AND EASY Virus Scanning Intego VirusBarrier X4 was designed for the Mac, by an engineering team that has focused on the Mac for as long as Intego has been in business. It monitors all user activity, constantly scanning for all known Macintosh viruses, Word and Excel macros, and viruses that target the Windows operating system. Automatic or Manual In automatic mode, VirusBarrier X4 runs as a background application. If it finds infected files, it notifies the user and repairs the files quickly and quietly, eliminating the virus that did the damage. If it can t repair the files, the application alerts the user of the file damage. Manual mode enables users to initiate scanning when they want to be sure a disk, a volume, or a particular file is safe. Manual scan can be initiated through the application, when it s running, or by dragging and dropping the target to be scanned over the program s Dock icon. Intego recommends a manual scan when the program is first installed, and each time virus definitions are updated. 5 Intego VirusBarrier X4: It s fast, thorough, and easy to use, Rob Griffiths, Macworld, May 2006 6 Ibid 4 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS

Alerts VirusBarrier X4 lets users choose one of three ways to be alerted if it detects viruses during its background scanning. The program can display an alert screen. It can play an alert sound. Finally, and especially useful when computers are connected to a network, VirusBarrier X4 can send an email alert to a specified email address to warn a network administrator about the presence of a virus. Turbo Mode The first time VirusBarrier X4 scans a computer, it scans and logs every file. Subsequently, it scans only those files that have been updated since the last scan. This enables VirusBarrier X4 to complete its work 5 to 40 times more quickly, making it the fastest product available for the Macintosh. 7 Secured and Unsecure Zones VirusBarrier X4 gives users the option of specifying Secure Zones, whose content will be automatically checked for viruses every time a change occurs. The zone can be as large as a volume or as small as a folder. Designating Secure Zones is a good way to protect shared folders, download folders, or drop boxes. A user can also specify an Unsecured Zone, one that will not be automatically scanned by VirusBarrier X4. This option should be used on files that have already been scanned and found to be safe, and are not shared. Users of video content who don t want to slow down the editing process can put their files in the Unsecured Zone. Scheduling VirusBarrier X4 lets users automatically check for program updates and new virus definitions with Intego s NetUpdate X4. Using a simple interface, the user can schedule updates as frequently as desired, and choose to have them appear in his or her ical. By user preference, Net Update X4 can also run in the background. For more about VirusBarrier X4 features, click here. 7 Ibid 5 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS

HOW THE PRODUCT LOOKS: VIRUS PROTECTION WITH A MAC-LIKE FACE Intego VirusBarrier X4 was created for the OS X operating system, and supports Macs with either PowerPC or Intel processors. Equally important, the application supports the Mac mind, offering users the simple, intuitive interface that makes them Mac users in the first place. The easier a solution is, the more likely it is to be used. The VirusBarrier X4 icon appears in the Dock; the user can simply drag and drop a file over the icon to initiate scanning. VirusBarrier X4 features a simple interface, giving the user easy access to all the features of the application. A Dashboard widget displays scheduled VirusBarrier X4 scans. NetUpdate TM X4 s simple interface lets users schedule updates from Intego s website. A Dashboard widget alerts users when updates become available. When a virus is detected, VirusBarrier X4 displays a visual alert. The log provides data about every scan performed, every virus found, and every action taken. 6 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS

REMOTE MANAGEMENT: SECURING MACS ON THE GO As Mac OS X takes its place in the enterprise, the enterprise needs a scalable way to shake hands with Macs. Intego Remote Management Console is a software administration tool for multiple Macintosh computers, scalable enough to manage security policy for an ever-expanding number of clients, yet simple enough for one administrator to do the work. With Remote Management Console, that work includes installing, configuring, and managing Intego security software on multiple user machines over a Local Area Network (LAN), a Virtual Private Network (VPN), or the Internet. Like the Intego security software it manages, Intego Remote Management Console relies on a simple, intuitive interface, making it easy for just one person to master, deploy, and use. It consists of two programs, one for clients and one for administrative use. The Remote Management program cannot access a client machine unless the client first authorizes remote management. THE TREND MICRO/ INTEGO ALLIANCE: PROTECTING THE ENTERPRISE AGAINST ALL COMERS Because Trend Micro knows that Macs are everywhere, popular enough to be an integral part of many major companies IT footprint and mobile enough to threaten their security, it now partners with Intego to offer its customers one source for whole-network protection. A pioneer in secure content and threat management, Trend Micro provides companies of all sizes with security software, hardware, and services. Running and managing Trend Micro and Intego security software side by side lets companies close a back door that s stood open too long, giving the malicious and the greedy access to the assets of the enterprise. To learn more about the Intego solutions offered by Trend Micro, click here. TREND MICRO Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, wisit our Web site at www.trendmicro.com. 7 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 US toll free: 1 +800.228.5651 phone: 1 +408.257.1500 fax: 1 +408.257.2003 www.trendmicro.com 2007 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [WP01_Intego_071128US]