AT&T Endpoint Security

Similar documents
Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Copyright 2011 Trend Micro Inc.

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Securing Your Most Sensitive Data

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Office 365 Buyers Guide: Best Practices for Securing Office 365

Take Risks in Life, Not with Your Security

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Securing the SMB Cloud Generation

May the (IBM) X-Force Be With You

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Security by Default: Enabling Transformation Through Cyber Resilience

deep (i) the most advanced solution for managed security services

Compliance Audit Readiness. Bob Kral Tenable Network Security

2017 Annual Meeting of Members and Board of Directors Meeting

Keys to a more secure data environment

align security instill confidence

McAfee Advanced Threat Defense

Digital Wind Cyber Security from GE Renewable Energy

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

accelerate your ambition Chris Jenkins

SYMANTEC DATA CENTER SECURITY

NetDefend Firewall UTM Services

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

CA Host-Based Intrusion Prevention System r8

DDoS MITIGATION BEST PRACTICES

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Changing face of endpoint security

Maximum Security with Minimum Impact : Going Beyond Next Gen

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

GUIDE. Navigating the General Data Protection Regulation Mini Guide

Symantec Client Security. Integrated protection for network and remote clients.

CYBERSECURITY RISK LOWERING CHECKLIST

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Kaspersky Security. The Power to Protect Your Organization

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

A Guide to Closing All Potential VDI Security Gaps

Managed Endpoint Defense

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Securing the Modern Data Center with Trend Micro Deep Security

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

CYBER RESILIENCE & INCIDENT RESPONSE

Verizon Software Defined Perimeter (SDP).

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

McAfee Embedded Control

Symantec Security Monitoring Services

Synchronized Security

FIREWALL BEST PRACTICES TO BLOCK

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

McAfee Public Cloud Server Security Suite

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Information Security Controls Policy

Building Resilience in a Digital Enterprise

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

CCISO Blueprint v1. EC-Council

External Supplier Control Obligations. Cyber Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

SaaS Flyer for Trend Micro

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Symantec Ransomware Protection

CloudSOC and Security.cloud for Microsoft Office 365

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Future-ready security for small and mid-size enterprises

Proactive Approach to Cyber Security

INFINIT Y TOTAL PROTECTION

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cisco s Appliance-based Content Security: IronPort and Web Security

Education Network Security

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

THE ACCENTURE CYBER DEFENSE SOLUTION

Cisco Security: Advanced Threat Defense for Microsoft Office 365

locuz.com SOC Services

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Guide to Cyber Security Compliance with GDPR

Transcription:

AT&T Endpoint Security November 2016

Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction Off Shoring TCO / ROI Focus Focus on Growth Organizational Drivers Productivity Focus Scarce Qualified Resources Rightsizing Consolidation Managed Services / Outsourcing Customers Suppliers Employees Compliance Drivers Compliance with laws and regulations requiring an annual IT assessment Risk Drivers Broader Threats Increased Vulnerability Greater Risk and Exposure Business Continuity / Security Issues Technology Drivers Intelligent / Application Networking Exponential Storage Growth / ILM Mobility / PDAs / Wi-Fi / Wider-Fi Application Mgmt & Performance Visibility Utility / Grid Computing / Netsourcing Natural / Intelligent User Interfaces 2

Today s threat landscape requires a multi-layered approach We help secure connections end to end, helping protect data at rest & in motion Strategy & Governance Consulting Endpoint Mobile, IoT, Office/Fixed Connectivity Securing the network Data/Application Securing workloads/ applications Threat Management Detection & response 3

Endpoint Vulnerabilities & Challenges Endpoint is often the weakest link in a company s network security defense Employees using company assets for unapproved purposes Company data on external devices Not keeping up-to-date with emerging threats signatures Perimeter firewalls that cannotinspect trusted VPN traffic Intrusion detection systems that doesn t block attacks 4

Why AT&T Endpoint Security? It is important to protect endpoint devices and the data within them. Compromised endpoint devices can become an entry point for threats in the company network and resources. AT&T EPS complements network security as it includes: o deploying effective desktop level firewall and Web access policies o enforcing company security procedures related to antivirus o Protect external devices when inside he company network and remotely. AT&T EPS also adds another layer of defense is a great complement to AT&T Firewalls and Managed Intrusion Detection and Prevention Services (MIDS). Our 24x7 staff of Security Professionals, and analysis tools 5

What is AT&T Endpoint Security? AT&T Endpoint Security is a part of the AT&T Managed Security Services helps protect end user computing devices from hazards posed by doing business on the Internet whether working in the office or remotely. designed to help enforce customer-defined policies for firewall, web access control, enforcing company security procedures related to antivirus and the option of allowing/blocking use of external devices. provides the flexibility to define unique and detailed policies specific to the customer s security requirements. The endpoint software agent installed on the endpoint device. The management server pushes the predefined security policy information and updates to the endpoints. 6

AT&T Endpoint Security (AEPS) Features Anti-malware signature based anti-virus malware scanning and removal. Web Protection Website reputation/risk rating, and check files when downloading or executing. Website category blocking (e.g., gambling, Adult sites). Desktop firewall Application-aware firewall, controls inbound and outbound traffic. Device controls Enables/disables use of external devices (e.g., USB, CD/DVD, etc.) Encryption Data at rest and/or file-level encryption for data stored on endpoints. Behavioral Analysis monitors different application behaviors and characteristics in order to determine if the application is likely to be malicious. Application Control controls file and registry access and how processes are allowed to run. Allows whitelisted applications to run, or blocking blacklisted applications). Host IPS monitors all inbound and outbound network traffic, looking for attack attempts or malicious communications to external systems. Location-Based Policies automatically switches between multiple policy sets based on dynamic attributes, including a wide range of network configuration attributes, Trusted Platform Module (TPM) usage or a registry key setting. Advanced Threat Detection (ATD) Intelligence and Analysis designed to detect stealthy, zero-day malware with a layered approach. It combines antivirus signatures, reputation, and near real-time emulation defenses with in-depth static code and dynamic analysis (sandboxing) to analyze actual behavior. ATD also has intelligence to convert threat information found into action for protection on the endpoints. Rogue Device Detection provides near real-time discovery of unknown devices connected to the network. Anti-Virus for Email Servers Scans email for signature based virus. Threat Reputation Monitoring a cloud-based intelligence application which determines if a new application is likely to be legitimate or malicious. Host Integrity - checks systems configurations compliance with existing IT policies (e.g., latest antivirus signatures, any configuration item on the system, such as patch levels, password strength settings or the existence of a required application).

AT&T Endpoint Security (AEPS) Offers Available Offers Small Busines Enterprise Customers Features AEPS - SaaS AEPS - Option 1 AEPS - Option 2 AEPS - SaaS2 Anti-Malware X X X Cloud based, File Attributes Web Protection X X X X Desktop Firewall X X X Device Controls X X X Encryption Optional X Behavioral Analysis X X X Application Control X X X Host IPS X X Location-Based Policies X X Advanced Threat Detection Intelligence and Analysis Rogue Device Detection Anti-Virus for Email Servers X X Host Integrity Threat Reputation Monitoring X X X Mobile Device VPN X X X X Android X

AT&T EPS Reporting AT&T Endpoint security reports are available at AT&T BusinessDirect. Security Reports available can be accessible by the Customer Central Point of Contact (Customer CPOC ) include: Endpoint Monitor Endpoint Activity Infection History Client Events Report 9

Why AT&T? Presentation title here edit on Slide Master We help protect what is important to our customers Virtually Seamless security experience End-to-end solutions Virtual security delivered by AT&T Software Defined Networking Unparalleled visibility and predictive analytics Proactive response Strategic ecosystem Managed solutions with industry leading technologies Comprehensive threat intelligence Global cyber community Cyber expertise 8 global Security Operations Centers 24x7 global monitoring & support Cybersecurity thought leaders with decades protecting AT&T assets Consultants to help customers best prepare for an evolving threat landscape Innovation 5 AT&T Foundry locations worldwide Mobile, Cloud and IoT security 179 security & privacy patents 200+ startups engaged with AT&T Foundry 10