Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Similar documents
Symantec VIP Quick Start Guide. Enabling Help Desk. Version 1.0. Author Travis Harmon Symantec. All rights reserved.

The Symantec Approach to Defeating Advanced Threats

Symantec Endpoint Protection 14

Symantec Advanced Threat Protection: Endpoint

Symantec Endpoint Protection

CloudSOC and Security.cloud for Microsoft Office 365

Securing Office 365 with Symantec

Symantec Security.cloud

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Symantec Secure One Services Program Brief

Symantec Security Monitoring Services

Symantec Protection Suite Add-On for Hosted Security

IBM Security Network Protection Solutions

Symantec Endpoint Protection

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Symantec Client Security. Integrated protection for network and remote clients.

2018 Edition. Security and Compliance for Office 365

THE ACCENTURE CYBER DEFENSE SOLUTION

Building Resilience in a Digital Enterprise

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CA Host-Based Intrusion Prevention System r8

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Endpoint Security for the Enterprise. Multilayered Defense for the Cloud Generation FAMILY BROCHURE

IC B01: Internet Security Threat Report: How to Stay Protected

IT & DATA SECURITY BREACH PREVENTION

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Symantec Endpoint Protection 12

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Symantec Network Access Control Starter Edition

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Security and Compliance for Office 365

IT Analytics 7.1 for Altiris IT Management Suite from Symantec

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Symantec Cloud Workload Protection

with Advanced Protection

Securing Today s Mobile Workforce

An Aflac Case Study: Moving a Security Program from Defense to Offense

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Symantec Network Access Control Starter Edition

Symantec Ransomware Protection

AKAMAI CLOUD SECURITY SOLUTIONS

Copyright 2011 Trend Micro Inc.

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Symantec Network Access Control Starter Edition

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By:

Security Analytics Appliances

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Symantec Enterprise Solution Product Guide

Un SOC avanzato per una efficace risposta al cybercrime

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

I D C T E C H N O L O G Y S P O T L I G H T

Make security part of your client systems refresh

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Defend Against the Unknown

Information Security Specialist. IPS effectiveness

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Office 365 Buyers Guide: Best Practices for Securing Office 365

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Symantec Small Business Solutions

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Symantec Endpoint Protection Family Feature Comparison

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Technical Brief Veritas Technical Education Services

Clearing the Path to PCI DSS Version 2.0 Compliance

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

McAfee Endpoint Security

Automating Security Response based on Internet Reputation

FIREWALL BEST PRACTICES TO BLOCK

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER

Administration of Symantec Cyber Security Services (July 2015) Sample Exam

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

: Administration of Symantec Endpoint Protection 14 Exam

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The business case for end-toend data protection

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Are we breached? Deloitte's Cyber Threat Hunting

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

Symantec and its partner community are securing the cloud generation, together

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

Segment Your Network for Stronger Security

Industry 4.0 = Security 4.0?

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

McAfee Advanced Threat Defense

Neustar Security Solutions Overview

Symantec System Recovery 2013 Management Solution FAQ

Best Practices in Securing a Multicloud World

Total Threat Protection. Whitepaper

A Simple Guide to Understanding EDR

June 2 nd, 2016 Security Awareness

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

RSA NetWitness Suite Respond in Minutes, Not Months

Technical Brochure F-SECURE THREAT SHIELD

What is an Endpoint Protection Platform?

Transcription:

WHITE PAPER: SYMANTEC ADVANCED THREAT PROTECTION........................................ Prevent and Detect Malware with Symantec Advanced Threat Protection: Network Who should read this paper This white paper is intended for CIOs, CISOs, and security professionals tasked with protecting their organization from targeted attacks and advanced threats.

Content Preventing Threats in the Network....................................................................................... 1 Advanced Malware Analysis with Symantec Cynic........................................................................ 1 Better Visibility Through Correlation..................................................................................... 2

Preventing Threats in the Network Symantec Advanced Threat Protection: Network provides revolutionary protection in a gateway appliance. So how does this combine with other Symantec products like Symantec Endpoint Protection to help you get better visibility into the current threats your company is facing? What new visibility should you expect from Advanced Threat Protection: Network? As a network appliance, Advanced Threat Protection: Network has the ability to monitor all the devices on your network. Many organizations have non-compliant machines where endpoint protection wasn't installed, and Advanced Threat Protection: Network protects these machines. With the rise of Bring Your Own Device, many networks have employee or visitor-owned phones, tablets, and laptops on the company s network. Each of these are potential ways for attackers to enter your environment. Advanced Threat Protection: Network monitors traffic for each of these machines for threats, such as Command and Control activity, without the need to install additional software on any of these devices. Advanced Threat Protection: Network leverages Symantec s industry-leading Insight, SONAR, and Vantage Network Intrusion Prevention technologies. These technologies are implemented just inside the firewall, which allows them be to tuned very aggressively without the risk of false positives on internal use only applications, resulting in unparalleled detection of both known and unknown threats. Advanced Malware Analysis with Symantec Cynic Advanced Threat Protection: Network offers the brand new Symantec Cynic anti-malware service. Suspicious files are dynamically analyzed for malicious activity using Symantec Workspace Virtualization to allow detonation against a wide variety of vulnerable applications, including the latest versions as well as older, more vulnerable versions, using aggressively tuned versions of Symantec s SONAR and Vantage engines. The most advanced malware attempts to evade advanced protection by not running in virtualized environments. Cynic detects even this cutting-edge malware by detonating such malware on bare metal physical machines and by leveraging Symantec Skeptic static analysis to find malware in ways undetectable by even advanced malware attempting to evade security or virtualization But Cynic is far more than a static and dynamic malware detonation system. Cynic leverages intelligence gathered from Symantec s vast intelligence network of over 100 million machines, using over 4 petabytes of data and trillions of records. By leveraging this intelligence, Cynic can identify not just malicious files but also attribute never-before-seen malware to worldwide families. This is done by observing the behavior of malware all over the world. Malware authors, of course, recompile their code, re-obfuscate their code, and repack their code, resulting in unique binaries every time. However, even the most advanced attackers have large investments in their code base and reuse this code in different attacks. Since Cynic has this huge database of malware behaviors across the world, it can identify that a brand new binary is a member of a known malware family given the behavior patterns that exist despite their evasive techniques. This intelligence provides global context to individual attacks. Not only does Cynic give visibility into what the malware did, but based on Symantec s global intelligence, Cynic can determine where else in the world this malware has been seen, the source of the attack, and the infection vectors used. 1

Better Visibility Through Correlation Advanced Threat Protection: Network not only identifies threats inside your organization, but it also points out the larger patterns in the attacks, such as internal machines continually seeing malicious activity, external actors repeatedly attempting to breach your defenses, and similar exploit attempts probing your network. This shows the bigger picture and enables you to see the whole battlefield instead of an individual skirmish. Advanced Threat Protection: Network uses Symantec Synapse to correlate with Symantec Endpoint Protection and Symantec Email Security.cloud to further increase this vision, showing what other activities occurred on the endpoint or how a spear phishing email participated in larger attacks. Advanced Threat Protection: Network combines proven and cutting-edge technologies to give better insight into attacks on organizations. Visibility is vastly improved both for organizations that utilize Symantec Endpoint Protection and those without. 2

About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2014, it recorded revenue of $6.7 billion. To learn more go to www.symantec.com or connect with Symantec at: go.symantec.com/socialmedia. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 5/2015