INTRODUCING SOPHOS INTERCEPT X

Similar documents
Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Next Generation Enduser Protection

Sustainable Security & Compliance Solutions

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Symantec Ransomware Protection

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

SophosLabs 2019 Threat Report

Microsoft Security Management

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Mastering The Endpoint

Synchronized Security

SentinelOne Technical Brief

Stopping the Threat at the Door

Cybersecurity & Security as a Service Trends. SteakOut, August 1, 2017

Real-time, Unified Endpoint Protection

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Server Protection Buyers Guide

Securing the Modern Data Center with Trend Micro Deep Security

MaaS360 Unified Mobility Management

Threat Centric Vulnerability Management

Synchronized Security: Outsmart Hackers by Coordinating Your Defenses

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Security Made Simple by Sophos

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

McAfee Endpoint Threat Defense and Response Family

Compare Security Analytics Solutions

Cisco Advanced Malware Protection (AMP) for Endpoints

MODERN DESKTOP SECURITY

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

THE ACCENTURE CYBER DEFENSE SOLUTION

Maximum Security with Minimum Impact : Going Beyond Next Gen

Office 365 Buyers Guide: Best Practices for Securing Office 365

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

Synchronized Security

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

10 FOCUS AREAS FOR BREACH PREVENTION

Security Gap Analysis: Aggregrated Results

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Securing Your Most Sensitive Data

Best Practices in Securing a Multicloud World

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Symantec Endpoint Protection 12

Endpoint Security Buyers Guide

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Building Resilience in a Digital Enterprise

Managed Endpoint Defense

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

McAfee Advanced Threat Defense

WHO AM I? Been working in IT Security since 1992

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Guide to Cyber Security Compliance with GDPR

Symantec Protection Suite Add-On for Hosted Security

Next-generation Endpoint Security and Cybereason

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

Reinvent Your 2013 Security Management Strategy

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Next-Gen Firewall Buyers Guide

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

The Artificial Intelligence Revolution in Cybersecurity

FIREWALL BEST PRACTICES TO BLOCK

IDC MarketScape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment

TREND MICRO SMART PROTECTION SUITES

Cognitive Threat Analytics Tech update

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Security Operations & Analytics Services

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

Advanced Threat Protection Buyer s Guide GUIDANCE TO ADVANCE YOUR ORGANIZATION S SECURITY POSTURE

Endpoint Protection : Last line of defense?

PEOPLE CENTRIC SECURITY THE NEW

BUFFERZONE Advanced Endpoint Security

Sophos Intercept X. Stopping Active Adversaries An explanation of features included in Sophos Intercept X. Last updated 22th June 2017 v1.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Getting over Ransomware - Plan your Strategy for more Advanced Threats

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Transcription:

INTRODUCING SOPHOS INTERCEPT X Matt Cooke Senior Product Marketing Manager November 2016

A Leader in Endpoint Security Sophos delivers the most enterprise-friendly SaaS endpoint security suite. Sophos offers a tightly integrated suite of endpoint security capabilities, with a good balance of advanced threat prevention, detection, and automatic remediation. Buyers will appreciate its intuitive administrative interface along with the flexibility and scalability required for most enterprise deployments, both large and small. Sophos is also one of the few endpoint security suite vendors in this Forrester Wave to offer a full-featured suite either on-premises or through a SaaS-based service.. The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

4

Endpoint Security has reached a Tipping Point Attacks are from within the perimeter, focused on Software Exploits Ransomware reaches $1.2B in damages Lack of Threat Intelligence after a Breach

Driving the Paradigm Shift to Next-Generation ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY 6

The Evolution of Sophos Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Prevention Pre-Exec Analytics File Scanning Run-Time Exploit Detection URL Blocking Web Scripts Download Rep Generic Matching Heuristics Core Rules Signatures Known Malware Malware Bits Signatureless Behavior Analytics Runtime Behavior Technique Identification TRADITIONAL MALWARE ADVANCED THREATS

! MALICIOUS URLS UNAUTHORIZED APPS REMOVABLE MEDIA EXECUTABLE FILES MS FILES & PDF RANSOMWARE PREVENTION EXPLOIT PREVENTION ADVANCED CLEAN INCIDENT RESPONSE 90% OF DATA BREACHES ARE FROM EXPLOITS KITS >90% OF EXPLOIT ATTEMPTS USE KNOWN VULNERABILITIES AND YET MORE THAN 60% OF IT STAFF LACK INCIDENT RESPONSE SKILLS BEFORE IT REACHES DEVICE PREVENT BEFORE IT RUNS ON DEVICE DETECT RESPOND NEXT GENERATION ENDPOINT

Introducing Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis No User/Performance Impact No File Scanning No Signatures Faster Incident Response Root-Cause Visualization Forensic Strength Clean

DEMO

Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Stops Malicious Encryption Behavior Based Conviction Automatically Reverts Affected Files Identifies source of Attack Prevent Exploit Techniques Signatureless Exploit Prevention Protects Patient-Zero / Zero-Day Blocks Memory-Resident Attacks Tiny Footprint & Low False Positives Automated Incident Response IT Friendly Incident Response Process Threat Chain Visualization Prescriptive Remediation Guidance Advanced Malware Clean ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis No User/Performance Impact No File Scanning No Signatures Faster Incident Response Root-Cause Visualization Forensic Strength Clean

Deployment Options SOPHOS INTERCEPT X Sophos Central Endpoint Advanced Antivirus and endpoint solutions from other vendors 34

matt.cooke@sophos.com 36