Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product Manager, Enterprise Security Product Development, Symantec
Cyberattacks on SMBs in Australia Almost one in five (19 percent) of Australian SMBs have been targeted by a cyberattack. 2
Impact of Cyberattacks on SMBs The average financial loss was just under $6,600 3
Ransomware Attacks on SMBs 11% of business operators had been affected by a ransomware attack. 34% had paid the ransom, which, on average, had amounted to $4,677. 8% of those who paid the ransom still didn t get their files back. $50K was the ransom paid by two respondents. 4
Adoption of Internet Security SMB USE OF INTERNET SECURITY: 5
Symantec s Layered Approach To Protection Network System Hardening Intrusion Prevention Browser Protection Smart Firewall Proactive Exploit Prevention File Reputation Behavioural Antivirus Engine Auto Protect Malware heuristics Domain/IP Reputation File Reputation SONAR Behavioural profiles Emulation Predictive Machine Learning Engine Repair Boot to a clean OS Power Eraser aggressive heuristics Threat-specific tools 6
Ransomware Attack Chain MALWARE DELIVERY MALWARE INSTALLATION ENCRYPTION COMMAND CALL C&C SERVER 7
Common Ransomware Variations Different ransom amounts Delete or infect backup Target specific user files or all user files Download additional threats Propagate onto servers, USBs, cloud
When there is an attack chain, there is a kill chain AntiVirus Engine Behavior MALWARE (SONAR) Machine Learning Engine INSTALLATION ENCRYPTION Behaviour (SONAR) COMMAND MALWARE DELIVERY Anti-Spam Intrusion Prevention Proactive Exploit Prevention IP Reputation (SafeWeb) File Reputation (Download Insight) CALL Intrusion C&C Prevention SERVER
3 rd Party Performance Tests: Passmark Report PRODUCT NAME OVERALL SCORE Norton Security 255 ESET Smart Security 250 McAfee Internet Security 207 Kaspersky Internet Security 207 F-Secure Internet Security 186 Panda Internet Security 177 Avast Internet Security 174 AVG Internet Security 174 AVG Internet Security 174 SourceNext ZERO 172 Bitdefender Internet Security 171 G Data Internet Security 162 Avira Internet Security 155 Trend Micro Internet Security 137 Trend Micro Virus Buster 114 Norton was #1 out of 15 security vendors in Passmark s Report which measures 23 key performance indicators 10
Norton and SEP Cloud Positioning Does the business have a server? You can use SEP Cloud on the server and Norton for the endpoints 11
SEP Cloud and Norton Differentiating Features Symantec Endpoint Protection Cloud Features: USB Device Lock-down Management Console Encryption Management Syncs with Azure AD, supports MFA Provides Simple Mobile Device Management Support for Windows Servers Norton Features: SafeWeb Browser Markups Antiphishing Browser Protection Client Anti-Spam Identity Safe Password Manager Local Backup Performance Tuning End User Managed Both solutions offer: Easy deployment Per-user licensing (up to 5 devices per user) Coverage for mobile devices Industry leading protection powered by our GIN Effortless protection from today s threats 12
Symantec Endpoint Protection Cloud: Protect Everywhere from the Cloud Cloud-Based Management Key Features Comprehensive Threat Protection Windows, Mac, ios, Android Leading Mobile Threat Protection Cloud Based Management Self-service provisioning Centralized Management User Compliance/Enforcement Policy Assessments Auto & Remote Remediation Single-extendable Agent Technology Integrated Cloud Management User-based Policy Management Native Encryption Key Management PC/ Laptop BYOD/ Mobile Server Workloads Cloud Workloads Cross-endpoint User Risk & Threat Visibility User Controlled Self-Enrollment & Device Management Support for BYOD 13 Symantec Confidential
SEP Cloud: Mobile Security and Management Features App Advisor Warns user of app reputation before downloading an app Privacy Advisor Analyze your apps for data leakage Mobile Malware Scanning Device health monitoring Call & SMS Blocking Protects you from known bad actors Device Management Track mobile and modern assets across your enterprise Lock and wipe devices Access Policy Management Encryption Report Encryption status on ios/android Copyright 2016 Symantec Corporation
Norton WiFi Privacy
Why a VPN? Extend protection beyond the device to the connection Protect against Man in the Middle Attacks 84% Australians have used public wifi Address privacy concerns Solve for leakage of unencrypted PII from Mobile Apps Opportunity to simplify the technology 81% don t regularly use a VPN. Most don t know what it is or don t know how to use it. Lack of trusted brands in market Large number of offerings from unknown brands with data limits or excessive advertising. CSIRO (Data 61) VPN Research 18% do not encrypt any traffic 38% contained malware Copyright 2015 Symantec Corporation 16
Consumers Are Concerned Daily news about online monitoring and personal information theft has pushed privacy concerns to an all-time high 92 of people worry about their online privacy 1 % 60 % 35 of consumers believe using public Wi-Fi is riskier than using a public restroom 2 % believe having more easy-to-use tools would lower their concern 1 1 TRUSTe/NCSA survey conducted by Ipsos, December 17-22, 2015 2 2015 Norton Cybersecurity Insights Report 17
Cybercrime fears have even merged with consumer perception of real-world risk 58 % of consumers say they believe entering financial information online when connected to public Wi-Fi is more dangerous than reading credit card information aloud. 18
Who is Watching The Data You Send And Receive? Anonymous Hackers Malicious Big Business Big Data Identity Theft Password Theft Wi-Fi Hacking Ad Tracking Location Sharing Browsing History Financial Damage Loss of Control 19
Norton Wifi Privacy Video
Copyright 2015 Symantec Corporation 21
Norton WiFi Privacy: Mobile Client Protects your sensitive information like passwords and credit card numbers while using public hotspots Wi-Fi SECURITY Bank-grade encryption lets you surf safely on public Wi-Fi hotspots and other unsecured networks. PRIVACY Browse the web anonymously and avoid being tracked by companies, or cyber thieves. ONLINE FREEDOM Access your favorite applications from anywhere in the world just like you were at home. 22
Thank you! Come visit us at the Symantec and Norton stand for more information Mark Gorrie, Director, Consumer Sales, Symantec Christopher Covert Principal Product Manager, Enterprise Security Product Development, Symantec