ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Similar documents
Symantec Ransomware Protection

Maximum Security with Minimum Impact : Going Beyond Next Gen

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Improved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Next Generation Enduser Protection

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

exam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT

CloudSOC and Security.cloud for Microsoft Office 365

INTRODUCING SOPHOS INTERCEPT X

Endpoint Protection : Last line of defense?

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Security & Phishing

Real-time, Unified Endpoint Protection

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Managed Endpoint Defense

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

CHECK POINT CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS

Cyber Security. Our part of the journey

Synchronized Security

Automated Threat Management - in Real Time. Vectra Networks

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Technical Brochure F-SECURE THREAT SHIELD

Gladiator Incident Alert

INFINIT Y TOTAL PROTECTION

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

IBM Security Network Protection Solutions

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

MODERN DESKTOP SECURITY

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

with Advanced Protection

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Service Provider View of Cyber Security. July 2017

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco Ransomware Defense The Ransomware Threat Is Real

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Protection FAQs

June 2 nd, 2016 Security Awareness

Office 365 Integration Guide Software Version 6.7

Seqrite Endpoint Security

Next Generation Endpoint Security Confused?

ANATOMY OF AN ATTACK!

WINNERS AND LOSERS OF THE 2018 CYBERTHREAT ROLLERCOASTER. Claudio Tosi, Sales Engineer, Malwarebytes

AT&T Endpoint Security

SentinelOne Technical Brief

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Cisco Firepower NGFW. Anticipate, block, and respond to threats

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Checklist for Evaluating Deception Platforms

Trend Micro Deep Discovery and Custom Defence

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Advanced Threat Control

RSA Security Analytics

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Why Are We Still Being Breached?

Office 365 Buyers Guide: Best Practices for Securing Office 365

Building Resilience in a Digital Enterprise

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Juniper Sky Advanced Threat Prevention

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Copyright 2011 Trend Micro Inc.

JUNIPER SKY ADVANCED THREAT PREVENTION

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

BOLSTERING DETECTION ABILITIES KENT KNUDSEN JUNE 23, 2016

Security Made Simple by Sophos

Symantec Endpoint Protection 14

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

CounterACT Check Point Threat Prevention Module

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Network Security. Multi-Layer Approach to Security. Protection, Detection, and Remediation. Clay Ostlund Business Development Manager

Kaspersky Security Network

How to build a multi-layer Security Architecture to detect and remediate threats in real time

Measuring cloud-based anti-malware protection for Office 365 user accounts

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Proteggere Office365 e Cloud file sharing in meno di un minuto Tiberio Molino Sr.Sales Engineer Trend Micro

Securing the Modern Data Center with Trend Micro Deep Security

Securing the SMB Cloud Generation

From Managed Security Services to the next evolution of CyberSoc Services

INFINITY: THE CYBERSECURITY ARCHITECTURE OF THE FUTURE - IN A DIGITAL WORLD

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

2017 Annual Meeting of Members and Board of Directors Meeting

SentinelOne Technical Brief

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Cisco Advanced Malware Protection (AMP) for Endpoints

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Transcription:

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them Social engineering Malware attacks Check Point SandBlast Agent Competitive Comparison 2018 Check Point Software Technologies Ltd. 2

WE ARE AT AN INFLECTION POINT! Gen V THREATS Gen IV Gen I Gen II Gen III Payload Mega Applications Virus Networks 1990 2000 2010 2017

2018 GEN V OF ATTACKS 1 2 3 4 Large scale (across country and industry) State-sponsored technologies Devastating damages MULTI-SURFACE Network Cloud Mobile Endpoint

Why is endpoint protection essential? Remote Connection Employees that connect from remote sites to corporate assets are more vulnerable as they lack the perimeter security Lateral Movement Malware spread from one endpoint to the other evading network controls Last Line Defense Sophisticated malware can be detected only during runtime on the endpoint device Forensics Enables recording of all endpoint traffic and actions to create detailed forensics 2018 Check Point Software Technologies Ltd. 5

TYPES OF ATTACKS : Account take over Credential Theft Phishing Malicious files File-less attacks Most endpoint solutions focus on malware based attacks Source: thesslstore.com, HelpnetSecurity.com

SOCIAL ENGINEERING CAN BE PREVENTED 2018 Check Point Software Technologies Ltd. 7

SOCIAL ENGINEERING BASED ATTACKS Phishing Attacks Spear Phishing Whaling Attacks Credential theft Sensitive Information theft Account Takeover Targeted to specific employees Harder to Detect Targeting C-Level Highly Sophisticated 2018 Check Point Software Technologies Ltd. 8

Why traditional methods aren t enough? ZERO DAY SOCIAL ENGINEERING Anti Spam is not enough Malicious URL directing to Phishing sites can also get through : Social media channels Instant messaging Personal emails URL filtering is not enough Outdated quickly Phishing campaigns are quick& dirty Needs constant updating

PROTECTS USERS FROM PHISHING SITES Even those never seen before Zero Phishing Demo IP Reputation URL Similarity Title Similarity Visual Similarity Text Similarity Domain Reputation Lookalike Characters Image Only Site Multiple Top-Level Domain Lookalike Favicon User access to new site triggers review Evaluation based on reputation and advanced heuristics Verdict issued in seconds

Zero Phishing Demo PREVENTING REUSE OF CORPORATE CREDENTIALS Corporate Credentials Keeps business credentials safe by preventing usage of corporate passwords on external sites

THE ONLY SOLUTION THAT PROVIDES PROTECTION AGAINST SOCIAL ENGINEERING THREATS Endpoint Device Threats Other 15% Malware 35 % Social engineering 50% Social Engineering Malware Others 2018 Check Point Software Technologies Ltd. 12

Zero-Day Malware

HOW MALWARE IS SPREAD SURFACE VECTOR Endpoint Type Email Web File Sharing Phishing Man in the Middle Malicious Networks Data breach Bot infections Encryption of data Ransomware Wiper Crypto mining Trojans Bankers

APPROACHES OF DEFENSE FOR ENDPOINT PROTECTION STRATEGY SIGNATURES BASED DETECTION Quick detection Detects known Malware Dependent on frequent updates ON-DEVICE INSPECTION (STATIC/BEHAVIORAL) Quick decisive decision Works offline Susceptible to False positives SANDBOX Zero day detection Low false positives Not real time No Zero Day Solution EP Resource intensive Connectivity based

Highest scores in 1 st ever Breach Prevention System test Lowest TCO Single consolidated gateway, running at 10Gbps 100% Breach Prevention System Combined Score 100% Block rate 99.2% Evasion score 0.0% False Positives 2018 Check Point Software Technologies Ltd. *Against drive-by exploits, social exploits, HTTP malware, email malware and off-line infections 16

SANDBOX offers superior detection! But, How to get highest level of security in real time and in offline mode and with no delays? 2018 Check Point Software Technologies Ltd. 17

INTRODUCING 500,000,000+ Malicious file hashes and sites 3,000,000 + ZERO DAY SIGNATURES Malware detection daily 250,000,000 C & C addresses 17,000,000 Cyber attacks detected weekly 11,000,000 Malware behavioral signatures LEVERAGING THE POWER OF THE LARGEST CYBER SECURITY COMMUNITY 2018 Check Point Software Technologies Ltd. 18

ZERO DAY SIGNATURES REAL TIME SECURITY UPDATES Daily inputs from network traffic across 150K security gateways world wide Extensive geographical spread enabling regional based detections Immediate daily base translation of threat intelligence data into distributed signatures Based on feeds from the most accurate Sandbox in the industry ONE OF THE LARGEST GLOBAL CYBER SECURITY COMMUNITY 2018 Check Point Software Technologies Ltd. 19

The evolution of the endpoint market Players in the Endpoint security Market EDR 2018 Check Point Software Technologies Ltd. 20

THE ONLY ENDPOINT SOLUTION THAT CONSOLIDATES ALL TECHNOLOGIES AND LEVERAGES 2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 21

Augmentation is better than replacement DATA PROTECTION ACCESS PROTECTION ZERO DAY SIGNATURES BEHAVIORAL SANDBOX ZERO PHISHING EDR Endpoint Complete + Full Disk Encryption, Anti Ransomware, Media Protection, Compliance, Application Control, FW and VPN Signatures 2018 Check Point Software Technologies Ltd. 22

CHECK POINT S ENDPOINT SECURITY SUITE SANDBLAST EDR VISIBILITY & RESPONSE FORENSICS AUTOMATED INCIDENT ANALYSIS REPORTS FULL ATTACK CHAIN REMEDIATION AUTOMATED MACHINE QUARANTINE ADVANCED PREVENTION OFFLINE PROTECTIONS ANTI-RANSOMWARE ZERO-PHISHING ANTI-EXPLOIT CADET (AI BASED) ADVANCED PREVENTION ONLINE PROTECTIONS THREAT EMULATION THREAT EXTRACTION ANTI-BOT URL FILTERING TRADITIONAL PREVENTION ANTI-MALWARE ACCESS CONTROL & SECURE COMMS ENDPOINT FIREWALL APPLICATION CONTROL ENDPOINT COMPLAINCE ENDPOINT IPSEC VPN SSL VPN DATA PROTECTION FULL DISK ENCRYPTION EXTERNAL MEDIA ENCRYPTION DOCUMENT ENCRYPTION DOCUMENT ACCESS CONTROL PORT PROTECTION

Summary & key takeaways Social engineering becomes a growing concern Niche solutions can t prevent social engineering based attacks (50%) Malware spread require an holistic solution SandBlast agent provides a complete solution by augmenting technologies Zero phishing Social engineering PREVENTION Zero Day Signatures- leveraging the unique power of a global cyber community Immediate Signatures creation & distribution based on global traffic Wide global coverage Wide geographical spread (localization& regional issues) Real time updates Highest level of security, Unique community leveraging

CYBER CRIME CAN BE PREVENTED