MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Similar documents
PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

A GLOBAL SOLUTION ADAPTED TO THE CONSTRAINTS OF OPERATIONAL TECHNOLOGY INDUSTRIAL SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Securing the SMB Cloud Generation

AT&T Endpoint Security

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

CA Host-Based Intrusion Prevention System r8

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Symantec Endpoint Protection Family Feature Comparison

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Comodo APT Assessment Tool

COMPUTER NETWORK SECURITY

Chapter 9. Firewalls

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Building Resilience in a Digital Enterprise

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

ANATOMY OF AN ATTACK!

VISION: MULTILAYER COLLABORATIVE SECURITY

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

DIGITAL TRUST Making digital work by making digital secure

SentinelOne Technical Brief

Seqrite Endpoint Security

TRAPS ADVANCED ENDPOINT PROTECTION

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Symantec Endpoint Protection

Symantec Endpoint Protection 14

Seqrite Antivirus for Server

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

Securing Your Most Sensitive Data

McAfee Embedded Control

The best for everyday PC users

CompTIA A+ Certification ( ) Study Guide Table of Contents

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Introduction to Information Security Dr. Rick Jerz

Security by Default: Enabling Transformation Through Cyber Resilience

Security

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

TestBraindump. Latest test braindump, braindump actual test

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Security Policy (EN) v1.3

Changing face of endpoint security

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

McAfee Embedded Control for Retail

Massive Attack WannaCry Update and Prevention. Eric Kwok KL.CSE

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Product Overview Version 1.0. May 2018 Silent Circle Silent Circle. All Rights Reserved

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

How WebSafe Can Protect Customers from Web-Based Attacks. Mark DiMinico Sr. Mgr., Systems Engineering Security

SentinelOne Technical Brief

Cyber Security. Our part of the journey

Combating Today s Cyber Threats Inside Look at McAfee s Security

McAfee Embedded Control for Healthcare

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

ConnectWise Automate. What is ConnectWise Automate?

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Audience. Overview. Enterprise Protection Platform for PCI DSS & HIPAA Compliance

What is Zemana AntiLogger?

A Review Paper on Network Security Attacks and Defences

Built without compromise for users who want it all

SECURING DEVICES IN THE INTERNET OF THINGS

Gladiator Incident Alert

McAfee Embedded Control

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Un SOC avanzato per una efficace risposta al cybercrime

Ceedo Client Family Products Security

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Mobility, Security Concerns, and Avoidance

Automated Threat Management - in Real Time. Vectra Networks

Maximum Security with Minimum Impact : Going Beyond Next Gen

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

ein wichtiger Baustein im Security Ökosystem Dr. Christian Gayda (T-SEC) und Ingo Kruckewitt (Symantec)

CloudSOC and Security.cloud for Microsoft Office 365

Simplify Your Network Security with All-In-One Unified Threat Management

Transcription:

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

FACT: COMPUTERS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE UP Despite pouring millions in investments into them, corporations can attest to the failure of conventional defense tools in the battle against targeted or sophisticated attacks. Antivirus or HIPS tools offer a reactive rather than a proactive approach to detecting malicious programs and behaviors. They use signature bases restricted to known threats and often find themselves helpless against any new attacks. Furthermore, hackers devise advanced camouflage mechanisms to cover their tracks and thereby manage to make their way past these signature-based protections. INCREASINGLY ADVANCED AND TARGETED ATTACKS Attacks are considered to be sophisticated if they can bypass conventional security mechanisms. This level of sophistication is achieved as a result of the combination of multiple advanced attack methods, such as the exploitation of an application vulnerability (web server or PDF file reader), followed by the spread of a malware through the corporate network, or the retrieval of access to sensitive assets by fraudulently increasing privileges. $14 Billion Cost of investments in conventional security tools in 2014 53% Increase in the financial cost of an intrusion in 1 year (Source : Global State of Information Security Survey)

Illustration of a sophisticated attack How Advanced Targeted Attacks (ATA) work Hacker The hacker conceals a virus in a bogus invoice in PDF format and sends it to the accounting department of the target company PDF 1 PRIMARY INFECTION Vulnerability exploitation: PDF, Flash, browsers, etc. Removable peripheral devices in use Targeted corporation OS 3 STEAL OR DESTROY Data exfiltration (C&C) Destruction of sensitive data Modification of hardware behavior Office Suite PDF Reader 2 SPREAD TO NEW TARGETS Accounts (Vulnerable workstation) Account theft: Pass-the-Hash Removable peripheral devices in use R&D (Target workstation) Logistics Management Sales

A solution exists Stormshield Endpoint Security protects you from Advanced Targeted Attacks (ATA) Hacker The hacker conceals a virus in a bogus invoice in PDF format and sends it to the accounting department of the target company 1 PDF PROTECTING AGAINST UNKNOWN ATTACKS Our unique protection blocks unknown attacks proactively, by detecting for example, the exploitation of a vulnerability. Targeted corporation 3 PROTECTING AND KEEPING DATA Stormshield Endpoint Security embeds a wide array of protection, based both on signatures and behavioral analyses, which aim to detect data transfers or undesirable maneuvers. 2 Accounts BLOCKING THE SPREAD OF A THREAT Stormshield Endpoint Security enables the prevention of account data theft PROTECTION through DES the TERMINAUX granular monitoring ET DES of UTILISATEURS operations performed on the hard disk, on USB keys, on the registry database and even on the processes of the operating system. SÉCURITÉ ENDPOINT R&D Logistics Management Sales

Comprehensive and proven protection of servers and terminals Stormshield Endpoint Security 2 products FULL PROTECT The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks. FULL CONTROL The Full Control product allows the granular definition of computer protection in a context that complies with the corporate security policies. PROTECTION FROM UNKNOWN THREATS Protection against the exploitation of vulnerabilities on the operating system Protection against the exploitation of vulnerabilities on third-party applications Monitors the integrity of the system s memory PROTECTION FOR COMPUTERS Detection of malicious programs through behavioral analysis Reinforcement of the operating system Application control (whitelisting or blacklisting) Granular control over user privileges Granular control over the exfiltration of sensitive data INTRUSION PREVENTION Firewall Network intrusion detection PERIPHERAL DEVICE MONITORING AND AUDIT Allows or blocks peripheral devices according to their type or serial number Blocks or restricts certain operations carried out by the peripheral device Protects against infection by external peripheral devices (e.g. by an infected USB key) Tracks files copied to a particular peripheral device and/or by a particular user Evaluates file transfers (appropriate or otherwise) COMMUNICATION CONTROL Firewall Quarantining of infected PCs Authorization of public Wi-Fi hotspots only when the corporate VPN is used Whitelisting of corporate Wi-Fi access points Imposition of WPA/WPA2 security standards Prohibition of Wi-Fi in ad-hoc mode Both products may be enabled in the same management console and on the same agent. VARIOUS OPTIONS ARE AVAILABLE ENCRYPTION SURFACE ENCRYPTION Encryption of the disk with pre-boot authentication One-time authentication (SSO) with Windows session Centralized administration, role segregation Safe file deletion SECURITY MONITORING ADVANCED MONITORING SERVICE RANGE Vulnerability analysis that covers operating systems or applications Periodic generation of an analysis report that attests to the actual level of protection Recommendations provided to deal with any residual risks Efficient response for operating systems that are no longer supported

STORMSHIELD ENDPOINT SECURITY IN A FEW KEY POINTS A RESPONSE FOR EVERY TYPE OF THREAT You are protected from the remote exploitation of vulnerabilities, the threat of malicious internal users, data leaks, and attacks specific to certain types of sensitive environments (SCADA, point of sale, etc.). EASY INTEGRATION Compatible with all antivirus protection solutions, Stormshield Endpoint Security provides an additional level of security. CENTRALIZED ADMINISTRATION Managing Stormshield Endpoint Security products and options is a simple affair involving a single console. A SOLUTION ADAPTED TO OFFLINE ENVIRONMENTS For environments governed by tight constraints, such as industrial systems, the solution s proactive approach keeps the environment safe without updating signature bases. A CLOUD-READY SOLUTION Stormshield Endpoint Security s management server can be installed in a public or private cloud infrastructure, allowing you to easily integrate our security solution without the constraint of hardware restrictions. Stormshield, a fully-owned subsidiary of Airbus Defence and Space, offers innovative end-to-end security solutions to protect networks (Stormshield Network Security), computers (Stormshield Endpoint Security) and data (Stormshield Data Security). WWW.STORMSHIELD.EU Version 2.3 - Copyright Stormshield 2017