Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Similar documents
Symantec Protection Suite Add-On for Hosted Security

Symantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1

Symantec Security.cloud

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

SR B25 Symantec.cloud Security Solutions: Expert Insights into , Web, Endpoint and IM Security Best Practices

Future-ready security for small and mid-size enterprises

SOLUTION MANAGEMENT GROUP

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

AT&T Endpoint Security

Cisco s Appliance-based Content Security: IronPort and Web Security

Symantec Enterprise Solution Product Guide

Security Gap Analysis: Aggregrated Results

Evaluation Program for Symantec Mail Security Appliances

NetDefend Firewall UTM Services

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Office 365 Buyers Guide: Best Practices for Securing Office 365

Symantec Small Business Solutions

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

Symantec Client Security. Integrated protection for network and remote clients.

Managing SonicWall Gateway Anti Virus Service

Kaspersky Security Network

2018 Cyber Security Predictions

Symantec Endpoint Protection

MESSAGING SECURITY GATEWAY. Solution overview

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Exam : Title : symantec small Business security. Version : DEMO

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Automating Security Response based on Internet Reputation

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

Training UNIFIED SECURITY. Signature based packet analysis

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Cisco Security: Advanced Threat Defense for Microsoft Office 365

IBM Security Network Protection Solutions

Consolidated Hygiene and Encryption Service E-Hub. Slide 1

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Dell Service Level Agreement for Microsoft Online Services

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Service Level Agreement for Microsoft Online Services

A Comprehensive CyberSecurity Policy

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management

A Review Paper on Network Security Attacks and Defences

NHS South Commissioning Support Unit

GFI product comparison: GFI MailEssentials vs. LogicNow - Control

Symantec ST Symantec Messaging Gateway Download Full Version :

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

AKAMAI CLOUD SECURITY SOLUTIONS

Office 365 Integration Guide Software Version 6.7

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Symantec Endpoint Protection 14

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

SonicWALL UTM Overview. Jon Piro NA Channel SE

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

What It Takes to be a CISO in 2017

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

Seqrite Antivirus for Server

Be certain. MessageLabs Intelligence: May 2006

Use Cases. E-Commerce. Enterprise

Product Guide. McAfee Web Gateway Cloud Service

Annexure E Technical Bid Format

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Product Guide. McAfee Web Gateway Cloud Service

A leading antivirus software company outsmarts viruses and malware and makes the Internet safer.

GFI has tens of thousands of customers worldwide and distribution is served by a 10,000-strong Channel.

Protection Service with Continuity

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

2 ZyWALL UTM Application Note

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

incloudone Virus & Spam Filtering Affordable, easy to use for single or multi-user environments

Key Features. DATA SHEET

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Sophos Central Admin. help

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Symantec Endpoint Protection

Phishing in the Age of SaaS

What s New in Version 3.5 Table of Contents

Deployment of security devices can result in significant financial savings from reduction or redirection of IT staff resources needed to deploy,

Symantec Endpoint Protection 12

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Putting Trust Into The Network Securing Your Network Through Trusted Access Control

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

SolarWinds Mail Assure

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security Assessment Checklist

Sophos Central Admin. help

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

Seqrite Endpoint Security

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

Next Generation Enduser Protection

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Layer by Layer: Protecting from Attack in Office 365

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed security

Cisco Security Appliances

Transcription:

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1

Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

2010 Threats 3

Window of vulnerability: Imsolk.B Here you have worm 4

Stuxnet Industrial Control Malware 5

Stuxnet Possible Target? http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8169381/iran-confirms-stuxnet-worm-halted-centrifuges.html 6

Targeted Attacks 7

What is a Targeted Attack? Targeted attacks are probably the most malicious form of viral attack, they are sent specifically to people with the intention of stealing information from that company, whether this is just simply for financial gain or to steal company secrets. 8

Targeted Link Malware Example: Compromised Web Site of Defense Contractor A Bespoke malware Latest vulnerabilities (often zero-day) Recipients researched and targeted specifically 9

Targeted Link Malware Example: Email targeted at employees of Defense Contractor B 10

11

Targeted Email Attacks 12

Targeted Email Attacks 13

Targeted attacks seen per day 14

Targeted Industries High Value Information Assets 5% 26% 7% 8% 13% 15% 13% 13% Finance Manufacturing Education Prof. Services IT Services Media/Marketing Telecoms Other 15

Targeted attack flow between regions 16

Seniority of targeted employees March 2010 November 2010 High seniority 42% 25% Medium seniority 18% 29% Low seniority 5% 4% General mailboxes 19% 19% Unknown 16% 21% 17

Defenses Against Targeted Attacks 18

Know Your Assets, Know Attack Vectors 19

Layers of Protection Provide Maximum Detection (CLOUD/APPLIANCE) 20

A Broad Portfolio of Integrated Hosted Services Protect Control Secure Recover Email Web Skeptic TM Anti-Virus Anti-Spam Anti-Virus Anti-Spyware Content Control Image Control URL Filtering Boundary Encryption Policy Based Encryption Archiving Continuity IM Anti-Virus Anti-Spam Content Control EndPoint Hosted EndPoint 21

Hosted Email Security All mail to your organization All mail from your organization is clean, legitimate, relevant Brightmail Traffic Shaper Connection Manager AntiSpam Components SMTP Heuristics User Validation Commercial DNS Blocklists Brightmail Access your email even if your mail servers fail AntiVirus Components Apply encryption based on policy Commercial AV Engines Policy Based Encryption Symantec AV Engine Skeptic (AS & AV ) Archiving Continuity Control Store only relevant mails Less onpremises storage Easier to index and search Inbound Outbound All mails delivered to your users are clean, legitimate, and relevant Less strain on your email server 22

Hosted Web Security URL FILTERING AND WEB POLICY ENFORCEMENT CONFIGURED WITH AN EASY-TO-USE WEB- BASED INTERFACE GLOBAL, LOAD- BALANCED INFRASTRUCTURE Firewall Web Proxy Web Your Network MULTI-LAYERED ANTI-VIRUS, ANTI- PHISHING & ANTI-SPYWARE DEFENSES AVAILABLE REMOTE & MOBILE USER SUPPORT OPTIONS END USER PROTECTION AND WEB POLICY ENFORCEMENT Outbound traffic Inbound Traffic Multi-layered malware defenses with Skeptic proprietary heuristics detect known and emerging threats Global distributed architecture supports minimal latency Highly configurable URL filtering Enforce Web use policies by content, browse time & bandwidth use Roaming user support options 23

Accuracy: Skeptic Heuristic Technology Connection Manager AntiSpam Components AntiVirus Components All mail to your organization Brightmail Traffic Shaper SMTP Heuristics User Validation Commercial DNS Blocklists Brightmail Symantec AV Engine Commercial AV Engines Skeptic (AS & AV) What is Skeptic? Proprietary heuristic technology Deployed & observing Internet traffic since 1999 Detects threats traditional signature based scanners often miss Utilized by our Email, Web and IM security services Shares the threat data for enhanced protection 24

Identifying more threats, taking action faster & preventing impact Relevant Global Expertise Billions of email connections and Web requests/week Accurate In-depth Analysis Zero hour protection IT Policies and Controls Skeptic Multi-protocol Converged Threat Protection Threat intelligence shared across Email, Web, and IM Email Security Service Web Security Service Instant Messaging Security Service 25

Web Email Industry Leading Service Level Agreements Buy the Outcome.not just a Tool! AntiVirus Protection 100% protection from known and unknown email viruses Credit is offered if a client infected by a virus Latency Average roundtrip time of 100% of email delivered in less than 60 seconds Credit is offered if latency exceeds 1 minute Virus False Positives 0.0001% FP capture rate Credit is offered if we do not meet this commitment Delivery 100% delivery guarantee Client may terminate if we do not meet this Spam Capture Rate 99% capture rate (95% for emails containing Asian characters) Credit is offered if we do not meet this commitment Service Availability 100% uptime Credit is offered if availability falls below 100% Client may terminate if availability falls below 95% Spam False Positives 0.0003% FP capture rate Credit is offered if we do not meet this commitment AntiVirus Protection 100% protection against known viruses Credit is offered if a client infected by a virus Latency Average scanning time of 100% of web content is within 100 milliseconds Credit is offered if latency exceeds 100 milliseconds Service Availability 100% uptime Credit is offered if availability falls below 100% Client may terminate if availability falls below 95% 26

Symantec Hosted Services: Market Leadership 10 million SaaS users 31,000 clients 104 Countries Leader in Gartner MQ for Secure Email Gateway Leader in Gartner MQ for Secure Web Gateway Worldwide leader in messaging security SaaS (IDC) 27

Protect Yourself Now! 1. Sign up for a Free Trial http://www.messagelabs.com.hk/trials/free 2. Contact our Authorized Reseller for no-obligations Consultation Phone : 2201 7303 Email: service@jos.com.hk 29

Thank you Leonard Sim (leonard_sim@symantec.com) 30