Put an end to cyberthreats

Similar documents
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Transforming Security from Defense in Depth to Comprehensive Security Assurance

RSA NetWitness Suite Respond in Minutes, Not Months

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

McAfee Endpoint Threat Defense and Response Family

RSA INCIDENT RESPONSE SERVICES

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

with Advanced Protection

Managed Endpoint Defense

REINVENTING CYBERSECURITY.

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

From Managed Security Services to the next evolution of CyberSoc Services

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Real-time, Unified Endpoint Protection

RSA INCIDENT RESPONSE SERVICES

THE EVOLUTION OF SIEM

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Building Resilience in a Digital Enterprise

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Reducing the Cost of Incident Response

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

THE ACCENTURE CYBER DEFENSE SOLUTION

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Security. Made Smarter.

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

A Risk Management Platform

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

FOR FINANCIAL SERVICES ORGANIZATIONS

Seceon s Open Threat Management software

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

SIEM Solutions from McAfee

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

The European Company that protects the world

Gladiator Incident Alert

Security Made Simple by Sophos

CyberArk Privileged Threat Analytics

ForeScout Extended Module for Splunk

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

CA Security Management

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

BUILDING AND MAINTAINING SOC

Adaptive Defense 2.4: What s New?

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Simplify, Streamline and Empower Security with ISecOps

8 Must Have. Features for Risk-Based Vulnerability Management and More

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

Checklist for Evaluating Deception Platforms

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Cisco Advanced Malware Protection for Endpoints

deep (i) the most advanced solution for managed security services

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Cisco Advanced Malware Protection. May 2016

locuz.com SOC Services

Agile Security Solutions

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

A Simple Guide to Understanding EDR

Machine Learning and Advanced Analytics to Address Today s Security Challenges

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

HOSTED SECURITY SERVICES

MANAGED DETECTION AND RESPONSE

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

ADVANCED THREAT HUNTING

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Defend Against the Unknown

SIEM: Five Requirements that Solve the Bigger Business Issues

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Power of the Threat Detection Trinity

A Practical Guide to Efficient Security Response

BUFFERZONE Advanced Endpoint Security

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Transcription:

Put an end to cyberthreats Automated and centralized Advanced Security

CORPORATE CYBERSECURITY Who is behind cyberthreats?1 73% 28% 12% 50% What is the cost to companies? Global cost: $600,000 M3 Cost of a Data Breach: $3.86 M4 Companies and perception of high risk⁴. External attackers Insiders National Actors (Cyberwar) Organized criminal gangs 22% 43% Who are the victims? What are the motives?1 51% 71% 58% 76% 13% Small and Medium-sized Enterprises Financial Endpoints are the new perimeter Cyberespionage Mobility, processing and cloud storage have revolutionized corporate environments. Endpoints are the new perimeter. Security solutions on endpoints must be advanced, adaptive and automatic, with the highest levels of prevention and detection of attackers, who will sooner or later manage to evade preventive measures. Such solutions must also offer agile tools to respond quickly, minimizing damage and reducing the attack surface. Professionalization of hackers Enemies are increasingly sophisticated and growing in number, the result of their professionalization, the democratization of technologies and the continuous leaks of cyberintelligence. Exfiltration of sensitive data 2018 2021 Cyberwar 2018 2021 In 60% of cases, national attacks lead to cyberwar. Next-generation cyberthreats are designed to slip past traditional solutions completely undetected. Cyberdefense in organizations Hackers are targeting computers and servers, where the most valuable assets of organizations reside, and security teams have great difficulties in defending them. EDR (Endpoint Detection and Response) applications, far from being the solution, increase workloads, as there is no automation of threat prevention, detection, containment and response. Improving the security posture of your company, without increasing operating costs inevitably means automating the prevention, detection and response capabilities in endpoints. ENDPOINT DETECTION AND RESPONSE SOLUTIONS (EDR) EDR solutions monitor, log and store the details of endpoint activity, such as user events, processes, changes to the registry, memory and network usage. This visibility uncovers threats that would otherwise go unnoticed. What are the hidden problems with EDR solutions? Multiple techniques and tools are used to search for security anomalies in events and confirm or reject alerts. All of this requires human intervention. EDR solutions require 24/7 supervision, and rapid response from highly qualified personnel. However, such resources are expensive and hard to find. Short-staffed organizations with low budgets are unprepared to take advantage of the benefits of EDR solutions on their own. Personnel find themselves with greater workloads deriving from the implementation and operation of these solutions, instead of supporting them in what matters: improving the security posture of their organizations. 1 2018 Data Breach Investigation report. Verizon 2 2018 Economic Impact of Cybercrime No Slowing Down. CSIC/McAfee 3 2018 Cost of Data Breach Study: Global Overview. Ponemon Institute/IBM Security 4 2018 study on global megatrends in cybersecurity. Ponemon Institute

is an innovative cybersecurity solution for desktops, laptops and servers, delivered from the cloud. It automates the prevention, detection, containment and response against any present or future advanced attacks, zero-day malware, ransomware, phishing, memory exploits and malwareless attacks, inside and outside the corporate network. It differs from other solutions in that it combines the widest range of protection technologies (EPP) with automated EDR capabilities, thanks to two services managed by Panda Security experts, and delivered as features of the solution: 100% attestation Service. Threat Hunting and Investigation Service (THIS). Thanks to its cloud architecture, the agent is light and does not impact the performance of endpoints, which are managed through a single cloud console, even when not connected to the Internet. integrates Cloud Protection and Management Platforms (Aether), which maximize prevention, detection and automated response, minimizing the effort required. Figure 1: A single dashboard provides a global vision and consolidated management prioritizing detected threats BENEFITS Simplifies and minimizes the cost of advanced and adaptive security Its managed services reduce the cost of expert personnel. There are no false alarms, no responsibility is delegated. The managed services learn automatically from the threats. No time is wasted with manual settings. Maximum prevention on endpoints. Operating costs are reduced practically to zero. There is no management infrastructure to install, configure or maintain. Endpoint performance is not impacted as it is based on a lightweight agent and cloud architecture. Automates and reduces detection and exposure time (Dwell Time) Prevents the running of threats, zero-day malware, ransomware and phishing. Detects and blocks malicious activity in memory (exploits), before it can cause damage. Detects malicious processes that slip past preventive measures. Detects and blocks hacking techniques and procedures. Automates and reduces response and investigation time Automatic and transparent remediation. Recovery of endpoint activity immediate recovery of normal activity. Actionable insights into attackers and their activity, speeding up forensic investigation. Helps reduce the attack surface. Supports improvement to security posture and maturity.

CLOUD ADAPTIVE PROTECTION PLATFORM Humans and Machines Leading Advanced and Adaptive Security. 100% ATTESTATION SERVICE The 100% Attestation Service monitors and prevents the execution of malicious applications and processes on endpoints. For each execution, it issues a real-time classification, malicious or legitimate, with no uncertainty, and without delegating to the client. All this is possible thanks to the speed, capacity, flexibility and scalability of AI and cloud processing. The service combines Big Data and multi-level Machine Learning, including Deep Learning, the result of the continuous supervision and automation of the experience, intelligence and accumulated knowledge of experts in security and threats at Panda Security s Intelligence center. The 100% Attestation Service is able, like no other solution on the market, to free companies from the risk of running malware on endpoints inside and outside the corporate network. THREAT HUNTING & INVESTIGATION MANAGED SERVICE There will be always threats that bypass the deployed security controls Threat Hunting is the process to discover new, advanced threats and their TTPs*, beyond what the current Threat Detection systems can do before they cause serious damage to the organization. Threat hunters operate on the premise that organizations are in a continuous state of compromise. Among others, its benefits are: Create new Threat Detections. Improve the Incident Response. Reduce the Attack surface. Panda Security Threat Hunting and Investigation managed service is operated by highly skilled cyber-security experts, armed with profiling, analysis and events correlation in real-time and retrospectively tools, discover new hacking and evasion techniques. Figure 2: Workflow of the managed cloud classification service Figure 3: The console incident timeline enables forensic investigation: the date it was first seen on the network, names and number of endpoints affected, settings changes and with whom it has communicated. * TTPs: Tactics, techniques and procedures used by hackers

CLOUD MANAGEMENT PLATFORM: AETHER Next-generation security, visibility and control. Comprehensive and scalable from the cloud, to deliver value immediately The Aether platform and its cloud console, common to all Panda Security endpoint solutions, optimize the management of advanced and adaptive security inside and outside the network. Designed so that security teams focus solely on managing the cybersecurity posture of the organization, it minimizes complexity and maximizes flexibility, granularity and scalability. Figure 3: Unified cloud management platform: Aether P A N D A P A N D A E N D P O A D A P T I L E I B F L E X V E D E D E T A F E I L E D G R A N U L A R N S I N T P R O T E C T I O N E & A P I Aether Management Platform M U P A L T C U S T O M I N D A E R & P A N D A A D A P R E A L T I M E C R O S S P L A T T I V E F O R M P R O D U C T D E F E N S E 3 6 0 P L U S E N D P O I N T P R O Y E C T I O N BENEFITS OF AETHER IN Generates greater value in less time. Simple to implement immediate visibility Deployment, installation and configuration in minutes. See the value from day one. Lightweight multi-product and multi-module Panda agent. Cross-platform (Windows, Mac, Linux, Android). Automatic discovery of unprotected endpoints. Remote installation. Proprietary proxy technology, even on computers with no Web connection. Traffic optimization, with proprietary repository/ cache technology. Easy to use, adapting to your organization Intuitive Web console. Flexible and modular management. Predefined and custom roles. Detailed audit of actions in the console. Users with total or restricted permissions and visibility. Security policies for groups and endpoints. Hardware and software inventories and change log. Facilitates monitoring. Accelerates response Prioritized key indicators and dashboards. Prioritized and confirmed alerts in your workflow. Complete and actionable history of incidents: processes involved, source, dwell time, prevalence, etc. Act on endpoints with a single click: restart, isolate, patch and scan, accelerating the response. ADVANCED AUTOMATED SECURITY ON ENDPOINTS integrates, in a single solution, traditional preventive technologies with innovative technologies for prevention, detection and automated response against advanced cyberthreats. Traditional preventive technologies Personal or managed firewall. IDS. Device control. multivector permanent antimalware and on-demand scan. Managed blacklisting/whitelisting. Collective intelligence. Pre-execution Heuristics. Web access control. Antispam & Antiphishing. Anti-tampering. Mail content filter. Remediation and rollback. Advanced security technologies EDR: continuous monitoring on endpoints activity. Prevention of execution of unknown processes. Cloud-based Machine Learning of behavior to classify 100% unknown processes (APTs, ransomware, Rootkits, etc.) Cloud-based Sandboxing in real environments. Behavioral analysis and IoA detection (scripts, macros, etc.). Automatic detection and response to memory exploits. Managed Threat Hunting for malwareless attacks.

OPTIONAL MODULES Panda Patch Management Panda Patch Management is an intuitive solution for managing vulnerabilities in operating systems and third-party applications on Windows endpoints and servers. It provides centralized, real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software. As well as easy-to-use and real-time to install and monitor updates. The result is a reduced attack surface, strengthening preventive capabilities and incident containment. Panda Advanced Reporting Tool Reporting platform automates the correlation of the information generated by the execution of processes and applications on protected endpoints and their context, which collects and enriches in the Cloud Protection Platform. Panda Advanced Reporting Tool automatically generates intelligence on organization activity and enables the searching, correlation and configuration of alerts regarding events. The SIEMFeeder module sends to organizations, in real time, the events collected on endpoints and enriched with security intelligence in the Cloud Protection Platform so it can be integrated in the corporate SIEM. Find out more at: www.pandasecurity.com/business/solutions

AWARDS AND CERTIFICATIONS Panda Security regularly participates in and receives awards for protection and performance from Virus Bulletin, AV-Comparatives, AV-Test, NSSLabs. Panda Adaptive Defense achieved the EAL2+ certification in its evaluation for the Common Criteria standard. Panda Security acknowledged as Visionary in the Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) 2018. https://www.pandasecurity. com/ gartner-magic-quadrant/ Single Product test AV-Comparatives endorses Adaptive Defense 360 As this solution classifies all executed processes, it cannot fail to record any malware Foresight is our greatest ally when it comes to defining our future needs and preventing risks. Adaptive Defense 360 gives us the visibility we need to achieve this foresight. Jean-Yves Andreoletti Systems and Networks Integration, Validation and Maintenance Platform Engineer Operating systems supported on endpoints Windows workstations: XP SP3 or later Windows servers: Server 2003 (32/64-bit and R2) SP2 or later MacOS workstations and servers: macos 10.10 Yosemite or later Linux workstations and servers: Ubuntu 14.04 LTS, 14.10, 15.04, 15.10, 16.0.4 LTS and 16.10. Fedora 23, 24 and 25. Contact your Panda Security sales representative or partner for details of other supported distributions. Android: Version 4 or later Platform certifications: ISO27001, SAS 70

More information at: pandasecurity.com/business/adaptive-defense/