Securing the SMB Cloud Generation

Similar documents
Norton Security for Professionals Partner Deck Ingram Micro Cloud Marketplace

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Download antivirus free

Symantec Endpoint Protection

How To Remove Personal Antivirus Security Pro Virus

Symantec Endpoint Protection Family Feature Comparison

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

MRG Effitas 360 Degree Assessment & Certification Q1 2018

Symantec Ransomware Protection

How To Remove Personal Antivirus Security Pro Virus Windows 8

MRG Effitas 360 Degree Assessment & Certification Q4 2017

How To Removing Personal Antivirus Security Pro From Windows 8

Free antivirus software download

MRG Effitas 360 Assessment & Certification Programme Q4 2015

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Personal Cybersecurity

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Maximum Security with Minimum Impact : Going Beyond Next Gen

Symantec Endpoint Protection 12

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

MRG Effitas 360 Degree Assessment & Certification Q MRG Effitas 360 Assessment & Certification Programme Q2 2017

AT&T Endpoint Security

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Dom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Transforming Security Part 2: From the Device to the Data Center

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Firewall Antivirus For Windows Xp Full Version 2013

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Service Provider View of Cyber Security. July 2017

User Experience Review

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Getting over Ransomware - Plan your Strategy for more Advanced Threats

ONLINE BANKING: PROTECTION NEEDED INTRODUCING KASPERSKY FRAUD PREVENTION PLATFORM

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Endpoint Protection : Last line of defense?

Course Outline (version 2)

Free antivirus software download windows 10

How To Remove Personal Antivirus Security Pro Virus Manually

Copyright 2011 Trend Micro Inc.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Protecting Your Devices. Dr. Leon D. Chapman

mhealth SECURITY: STATS AND SOLUTIONS

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Manual Removal Norton Internet Security Won't Open Or

DOCUMENT* PRESENTED BY

Securing Enterprise or User Brought mobile devices

Symantec Endpoint Protection Cloud (SEPC)

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Securing the Modern Data Center with Trend Micro Deep Security

Remove Trend Micro Titanium Internet Security Without Password

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best

Changing face of endpoint security

Built without compromise for users who want it all

MRG Effitas Android AV review

Best Practices in Securing a Multicloud World

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

protectiontestagainst ransomwarethreats

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

The best for everyday PC users

Get BitDefender Business Security 3 Years 15 PCs pc software site download ]

Seqrite Endpoint Security

RANSOMWARE. All Locked Up and No Place to Go. Mark

Kaspersky Open Space Security

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Security Made Simple by Sophos

Manually Remove Of Xp Internet Security Protect Virus Manually

CloudSOC and Security.cloud for Microsoft Office 365

Online Security and Safety Protect Your Computer - and Yourself!

Managed Endpoint Defense

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Get BitDefender Security for File Servers 2 Years 5 PCs computer new software download ]

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Get BitDefender Client Security 2 Years 30 PCs software suite ]

ANATOMY OF AN ATTACK!

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

How To Remove Xp Internet Security 2011 Virus Manually

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

Trend Micro SMB Endpoint Comparative Report Performed by AV-Test.org

PRACTICING SAFE COMPUTING AT HOME

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

Transcription:

Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product Manager, Enterprise Security Product Development, Symantec

Cyberattacks on SMBs in Australia Almost one in five (19 percent) of Australian SMBs have been targeted by a cyberattack. 2

Impact of Cyberattacks on SMBs The average financial loss was just under $6,600 3

Ransomware Attacks on SMBs 11% of business operators had been affected by a ransomware attack. 34% had paid the ransom, which, on average, had amounted to $4,677. 8% of those who paid the ransom still didn t get their files back. $50K was the ransom paid by two respondents. 4

Adoption of Internet Security SMB USE OF INTERNET SECURITY: 5

Symantec s Layered Approach To Protection Network System Hardening Intrusion Prevention Browser Protection Smart Firewall Proactive Exploit Prevention File Reputation Behavioural Antivirus Engine Auto Protect Malware heuristics Domain/IP Reputation File Reputation SONAR Behavioural profiles Emulation Predictive Machine Learning Engine Repair Boot to a clean OS Power Eraser aggressive heuristics Threat-specific tools 6

Ransomware Attack Chain MALWARE DELIVERY MALWARE INSTALLATION ENCRYPTION COMMAND CALL C&C SERVER 7

Common Ransomware Variations Different ransom amounts Delete or infect backup Target specific user files or all user files Download additional threats Propagate onto servers, USBs, cloud

When there is an attack chain, there is a kill chain AntiVirus Engine Behavior MALWARE (SONAR) Machine Learning Engine INSTALLATION ENCRYPTION Behaviour (SONAR) COMMAND MALWARE DELIVERY Anti-Spam Intrusion Prevention Proactive Exploit Prevention IP Reputation (SafeWeb) File Reputation (Download Insight) CALL Intrusion C&C Prevention SERVER

3 rd Party Performance Tests: Passmark Report PRODUCT NAME OVERALL SCORE Norton Security 255 ESET Smart Security 250 McAfee Internet Security 207 Kaspersky Internet Security 207 F-Secure Internet Security 186 Panda Internet Security 177 Avast Internet Security 174 AVG Internet Security 174 AVG Internet Security 174 SourceNext ZERO 172 Bitdefender Internet Security 171 G Data Internet Security 162 Avira Internet Security 155 Trend Micro Internet Security 137 Trend Micro Virus Buster 114 Norton was #1 out of 15 security vendors in Passmark s Report which measures 23 key performance indicators 10

Norton and SEP Cloud Positioning Does the business have a server? You can use SEP Cloud on the server and Norton for the endpoints 11

SEP Cloud and Norton Differentiating Features Symantec Endpoint Protection Cloud Features: USB Device Lock-down Management Console Encryption Management Syncs with Azure AD, supports MFA Provides Simple Mobile Device Management Support for Windows Servers Norton Features: SafeWeb Browser Markups Antiphishing Browser Protection Client Anti-Spam Identity Safe Password Manager Local Backup Performance Tuning End User Managed Both solutions offer: Easy deployment Per-user licensing (up to 5 devices per user) Coverage for mobile devices Industry leading protection powered by our GIN Effortless protection from today s threats 12

Symantec Endpoint Protection Cloud: Protect Everywhere from the Cloud Cloud-Based Management Key Features Comprehensive Threat Protection Windows, Mac, ios, Android Leading Mobile Threat Protection Cloud Based Management Self-service provisioning Centralized Management User Compliance/Enforcement Policy Assessments Auto & Remote Remediation Single-extendable Agent Technology Integrated Cloud Management User-based Policy Management Native Encryption Key Management PC/ Laptop BYOD/ Mobile Server Workloads Cloud Workloads Cross-endpoint User Risk & Threat Visibility User Controlled Self-Enrollment & Device Management Support for BYOD 13 Symantec Confidential

SEP Cloud: Mobile Security and Management Features App Advisor Warns user of app reputation before downloading an app Privacy Advisor Analyze your apps for data leakage Mobile Malware Scanning Device health monitoring Call & SMS Blocking Protects you from known bad actors Device Management Track mobile and modern assets across your enterprise Lock and wipe devices Access Policy Management Encryption Report Encryption status on ios/android Copyright 2016 Symantec Corporation

Norton WiFi Privacy

Why a VPN? Extend protection beyond the device to the connection Protect against Man in the Middle Attacks 84% Australians have used public wifi Address privacy concerns Solve for leakage of unencrypted PII from Mobile Apps Opportunity to simplify the technology 81% don t regularly use a VPN. Most don t know what it is or don t know how to use it. Lack of trusted brands in market Large number of offerings from unknown brands with data limits or excessive advertising. CSIRO (Data 61) VPN Research 18% do not encrypt any traffic 38% contained malware Copyright 2015 Symantec Corporation 16

Consumers Are Concerned Daily news about online monitoring and personal information theft has pushed privacy concerns to an all-time high 92 of people worry about their online privacy 1 % 60 % 35 of consumers believe using public Wi-Fi is riskier than using a public restroom 2 % believe having more easy-to-use tools would lower their concern 1 1 TRUSTe/NCSA survey conducted by Ipsos, December 17-22, 2015 2 2015 Norton Cybersecurity Insights Report 17

Cybercrime fears have even merged with consumer perception of real-world risk 58 % of consumers say they believe entering financial information online when connected to public Wi-Fi is more dangerous than reading credit card information aloud. 18

Who is Watching The Data You Send And Receive? Anonymous Hackers Malicious Big Business Big Data Identity Theft Password Theft Wi-Fi Hacking Ad Tracking Location Sharing Browsing History Financial Damage Loss of Control 19

Norton Wifi Privacy Video

Copyright 2015 Symantec Corporation 21

Norton WiFi Privacy: Mobile Client Protects your sensitive information like passwords and credit card numbers while using public hotspots Wi-Fi SECURITY Bank-grade encryption lets you surf safely on public Wi-Fi hotspots and other unsecured networks. PRIVACY Browse the web anonymously and avoid being tracked by companies, or cyber thieves. ONLINE FREEDOM Access your favorite applications from anywhere in the world just like you were at home. 22

Thank you! Come visit us at the Symantec and Norton stand for more information Mark Gorrie, Director, Consumer Sales, Symantec Christopher Covert Principal Product Manager, Enterprise Security Product Development, Symantec