KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Similar documents
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

RANSOMWARE. All Locked Up and No Place to Go. Mark

DOCUMENT* PRESENTED BY

Getting over Ransomware - Plan your Strategy for more Advanced Threats

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

ONLINE BANKING: PROTECTION NEEDED INTRODUCING KASPERSKY FRAUD PREVENTION PLATFORM

Securing the SMB Cloud Generation

Massive Attack WannaCry Update and Prevention. Eric Kwok KL.CSE

Changing face of endpoint security

for businesses with more than 25 seats

ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Enterprise Solution Product Guide

Symantec Ransomware Protection

for businesses with more than 25 seats

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

ConnectWise Automate. What is ConnectWise Automate?

Kaspersky Security for Virtualization Frequently Asked Questions

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

KASPERSKY FOR BUSINESS PRODUCTS AND SERVICES

KASPERSKY FOR ENTERPRISE

Mobile Security using IBM Endpoint Manager Mobile Device Management

How To Remove Personal Antivirus Security Pro Virus Windows 8

Symantec Endpoint Protection 12

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

How To Remove Personal Antivirus Security Pro Virus

LIGHT AGENT OR AGENTLESS

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Copyright 2011 Trend Micro Inc.

SentinelOne Technical Brief

A Guide to Closing All Potential VDI Security Gaps

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Kaspersky Small Office Security 5. Product presentation

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Kaspersky Managed Service Providers Program

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Securing the Modern Data Center with Trend Micro Deep Security

Symantec Endpoint Protection Family Feature Comparison

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Datacenter Security: Protection Beyond OS LifeCycle

EM L01 Introduction to Mobile

Intrusion Prevention Signature Failures Symantec Endpoint Protection

Symantec Multi-tier Protection

FILELESSMALW ARE PROTECTION TEST OCTOBER2017

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

SentinelOne Technical Brief

Free antivirus software download

TREND MICRO SMART PROTECTION SUITES

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Accessing your Check Point VPN

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

Seqrite Endpoint Security

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Reviewer s guide. PureMessage for Windows/Exchange Product tour

MRG Effitas 360 Degree Assessment & Certification Q1 2018

Symantec Endpoint Protection

protectiontestagainst ransomwarethreats

Symantec Endpoint Protection

Stopping Advanced Persistent Threats In Cloud and DataCenters

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

MRG Effitas Real Time Protection Test Project, First Quarter Q MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)

Free antivirus software download windows 10

MRG Effitas 360 Assessment & Certification Programme Q4 2015

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

PROTECTION SERVICE FOR BUSINESS. Datasheet

Measuring cloud-based anti-malware protection for Office 365 user accounts

TREND MICRO SMART PROTECTION SUITES

Microsoft Forefront Security For Sharepoint User Guide

Securing Today s Mobile Workforce

Next Generation Endpoint Security Confused?

No Stone. and Servers Alike.

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

MRG Effitas 360 Degree Assessment & Certification Q4 2017

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Maximum Security with Minimum Impact : Going Beyond Next Gen

Cyber Essentials Questionnaire Guidance

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

AT&T Endpoint Security

For Businesses with more than 25 seats.

RETHINKING SECURITY. Fighting Known, Unknown and Advanced Threats. kaspersky.com/business

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Endpoint Protection : Last line of defense?

Dynamic Datacenter Security Solidex, November 2009

ESAP Release Notes

Built without compromise for users who want it all

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Transcription:

KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1

WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd party software Cyber Incidents Investigatio n Exponential growth of mobile malware Increased Threats to Mac machines 2

WHAT IS NEEDED TO SECURE YOUR BUSINESS? A comprehensive security platform that leverages all three Multi-layered protection against know, unknown and advanced threats Security Intelligence Innovative Technology 3

MULTI-LAYERED PROTECTION The best security foundation possible Kaspersky Lab s industry-leading protection against known, unknown and advanced threats KNOWN Powerful multi-layered protection from all forms of cyber-threat HIPS and Personal Firewall UNKNOWN System watcher Automatic Exploit Prevention Cloud-based protection ADVANCED Heuristic scanning Signature-based protection 4

Known Threats HIPS & Firewall (network traffic) URL Filtering (web traffic) Anti-Spam (email traffic) Anti-Phishing (email traffic) Blacklisting Unknown Threats Heuristics Whitelisting App Control Advanced Threats BSS AEP Systems Watcher KASPERSKY LAB MULTI-LAYERED SECURITY Kaspersky Security Network 70% 29% 1% 6

POWERED BY GLOBAL INTELLIGENCE NETWORK KASPERSKY SECURITY NETWORK Global cloud network - threat related information from 60 million+ users KASPERSKY SECURITYNETWORK Global security intelligence Continuously feeds new data to protection components KASPERSKY GLOBAL USERS 56

MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* 100% 80% 60% Score of TOP 3 places In 2015 Kaspersky Lab products participated in 94 independent tests and reviews. Our products were awarded 60 firsts and achieved 77 top-three finishes. Avira ESET Bitdefender Kaspersky Lab 1st places 60 Participation in 94 tests/reviews TOP 3 = 82% 40% Sophos Symantec Quick Heal Avast BullGuard 20% AVG Trend Micro Panda Security G DATA F-Secure Intel Security (McAfee) Microsoft N of independent tests/reviews 0% 20 40 60 80 100 * Notes: According to summary results of independent tests in 2015 for corporate, consumer and mobile products. Summary includes independent tests conducted by : AV-Comparatives, AV- Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin. Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. The size of the bubble reflects the number of 1st places achieved. 8

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

IN DETAIL TOTAL Collaboration Mail Internet Gateway ADVANCED Vulnerability Assessment & Patch Management Inventories & License Control Software Distribution OS deployment SIEM integration Data Encryption SELECT Mobile Security Mobile Device Management File Server Security Mobile Application Management Kaspersky Security Center Application Control Device Control Web Control CORE Anti-Malware + Firewall Cloud-enabled via the Kaspersky Security Network (KSN) Endpoint Management Infrastructure 10

KASPERSKY ENDPOINT SECURITY FOR BUSINESS Endpoint security technologies built into this single platform include: All managed through a single management console: Kaspersky Security Center SYSTEMS MANAGEMENT Vulnerability detection & patch management plus extended client management capabilities Including SIEM support ANTI-MALWARE protection against known, unknown and advanced threats DATA ENCRYPTION fully integrated data protection Including 2-stage authentification KASPERSKY SECURITY CENTER Including RBAC ENDPOINT CONTROL TOOLS application, device And web controls Including Default Deny test environment 11 MOBILE SECURITY smartphone and tablet security and management Including self-service portal and web console

KASPERSKY SECURITY CENTER ENTERPRISE MODE Optional Role-Based Access Control (RBAC) for larger IT Departments with distributed management responsibilities Kaspersky Security Centre Kaspersky Endpoint Security for Business. All tiers Single IT Administrator Kaspersky Endpoint Security for Business. Advanced tier Kaspersky Endpoint Security for Business. Advanced Business tier Data Protection Management Patch Management Mobile Endpoint Management Workstation Security and Control 12

KASPERSKY ENDPOINT SECURITY FOR BUSINESS - SELECT Also includes: Application, Web and Device controls Kaspersky security for mobile

ENDPOINT CONTROL DEVICE CONTROL WEB CONTROL APPLICATION CONTROL WITH DYNAMIC WHITELISTING 14

KASPERSKY SECURITY FOR MOBILE Proactive security, management and control for mobile endpoints Mobile Security Multilayered anti-malware Web Protection Rooting/Jailbreak detection Mobile Device Management Exchange ActiveSync ios MDM Samsung KNOX Mobile Application Management App Wrapping App Control Selective Wipe Anti-Theft Lock/Wipe Locate/Alarm/ Mugshot SIM Watch Self-Service Portal BYOD enablement Certificate delivery Anti-Theft Centralized Management All major mobile platforms Other IT security areas Web Console 15

Self-Service Portal A FULLY INTEGRATED MOBILITY SOLUTION Security for Mobile, Desktop and Virtual Endpoints are managed together through a single console 16

KASPERSKY ENDPOINT SECURITY FOR BUSINESS - ADVANCED Also includes: Data encryption Kaspersky systems management

DATA ENCRYPTION Simple Administration Complex Capabilities POWERFUL DATA ENCRYPTION File/folder (FLE) Full disk (FDE) RICH UNPARALLELED INTEGRATION WITH CONTROL TOOLS Application controls Device controls OPTIMIZED FOR MINIMAL END-USER IMPACT Transparent/single sign-on Minimized footprint FLEXIBLE AUTHENTICATION Pre-boot authentication Non-qwerty keyboards 2-factor authentication via tokens or smart cards STREAMLINED ADMINISTRATION Easy password recovery Remote management 18

KASPERSKY SYSTEMS MANAGEMENT Enhance security and manage complexity VULNERABILITY ASSESSMENT AND PATCH MANAGEMENT Vulnerability detection & prioritization Distribution of patches & updates Patch delivery status reports INVENTORIES LICENSE & Hardware CONTROL & software inventories License management & compliance Guest device policies SOFTWARE DISTRIBUTION Multicast technology supported Policies for automatic distribution Optional after-hours deployment OPERATING SYSTEMS DEPLOYMENT Easy image creation & deployment Wake-on-LAN support Post-installation editing support SIEM INTEGRATION HP ArcSight & IBM QRadar Enterprise-level reporting Improved IT security CENTRALIZED MANAGEMENT Remote troubleshooting Role-Based Access Control Control of all IT security areas across the corporate network 19

ENDPOINT SOFTWARE LIFECYCLE MANAGEMENT GOLDEN IMAGES REPORTING INVENTORIES PATCH/UPDATE INSTALLATION OS DEPLOYMENT PATCH/UPDATE DISTRIBUTION APPLICATION VULNERABILITY DETECTION 20 VULNERABILITY PRIORITIZATION

KASPERSKY TOTAL SECURITY FOR BUSINESS Also includes: Security for mail servers Security for web gateways Security for collaboration servers

KASPERSKY TOTAL SECURITY FOR BUSINESS Comprehensive infrastructure protection beyond the endpoint Security for Mail Server Kaspersky Security for Linux Mail Server Kaspersky Security for Microsoft Exchange Servers Kaspersky Anti-Virus for Lotus Notes/Domino Security for Internet Gateway Kaspersky Anti-Virus for Proxy Server Kaspersky Anti-Virus for Microsoft ISA Server and Forefront TMG Security for Collaboration Kaspersky Security for Microsoft SharePoint Server 22

KASPERSKY ENDPOINT SECURITY FOR BUSINESS Progressive, feature-rich tiers ANTI-MALWARE APP, DEVICE, WEB CONTROL MOBILE SECURITY DATA ENCRYPTION SYSTEMS MANAGEMENT MAIL, WEB AND COLLABORATION Kaspersky Endpoint Security For Business. TOTAL Kaspersky Endpoint Security For Business. ADVANCED Kaspersky Endpoint Security For Business. SELECT Kaspersky Endpoint Security For Business. CORE 23

TARGETED SOLUTIONS File Servers Systems Management Mobile Mail Servers Virtualization Collaboration Storage Internet Gateways KASPERSKY Security FOR VIRTUALIZATION 24

SECURITY IN VIRTUAL ENVIRONMENTS: TRUE OR FALSE?? FALSE VIRTUAL ENVIRONMENTS ARE MORE SECURE THAN PHYSICAL ENVIRONMENTS A MALWARE ATTACK DOESN T DISTINGUISH BETWEEN PHYSICAL AND VIRTUAL PC S.? FALSE CYBERCRIMINALS DON T SPECIFICALLY TARGET VIRTUAL MACHINES MORCUT (AKA CRISIS), THE FIRST TROJAN SPECIFICALLY TARGETING AND MOUNTING ITSELF TO VIRTUAL MACHINES,WAS IDENTIFIED IN 2012 25? FALSE MALWARE CAN T SURVIVE THE DECOMMISSIONING OF NON-PERSISTENT VIRTUAL MACHINES RESIDENT MALWARE CAN. SOME MALWARE (KIDO, CONFICKER) CAN JUMP FROM VM TO VM, AND FROM HOST TO HOST.

VIRTUAL SECURITY UNDERSTANDING THE OPTIONS NO SECURITY NOT AN OPTION! TRADITIONAL (Agent-Based) GREAT PROTECTION /INEFFICIENT IMPLEMENTATION AGENTLESS EASY TO DEPLOY/MANAG E FOR VMWARE LIGHT AGENT FEATURE-RICH SECURITY 26

TRADITIONAL, AGENT-BASED SECURITY A full version of security software is loaded on each virtual machine Inefficient Resource Use: Redundant full agents Redundant Signature Databases Results in: Excessive resource consumption Update storms Instant-on gaps Lower VM densities Denotes an instance of security software 27

28 AGENTLESS SECURITY One Security Virtual Appliance per host performs malware scanning Efficient: Installed and operational in under an hour No re-boot or maintenance mode required Eliminates: Excessive resource consumption Update and scan storms Instant-on gaps Results in: Higher VM Densities

29 LIGHT AGENT SECURITY A Security Virtual Appliance plus a lightweight security agent on each VM Includes advanced security features: Vulnerability monitoring Application control Web control Device control Advanced heuristics Protection for IM, mail and web traffic Eliminates: Excessive resource consumption Update and scan storms Instant-on gaps

Ransomwares

31

32 VIRUS WORM TROJAN

33 TROJAN

Misleading Applications Rogue/Fake Antivirus Locker Ransomware Crypto Ransomware 2008-2014 2010-2014 2013-34

Crypto-Ransomware (Targets) OS Disk Local Disk(s) Connected Device(s) (USB) (e.g. Backup Disk) Mapped Network Drive(s) (e.g. NAS / File Servers) Other Accessible Folders / Shared Local Network (e.g. NAS / File Servers) Dropbox OneDrive 35