Synchronized Security: Outsmart Hackers by Coordinating Your Defenses

Similar documents
Sophos. Allan Widell Channel Account Executive. 24. August 2017

Synchronized Security

Endpoint Security Buyers Guide

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Next Generation Enduser Protection

INTRODUCING SOPHOS INTERCEPT X

FIREWALL BEST PRACTICES TO BLOCK

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Sophos XG Firewall. IP Partners ICT Systems & Services.

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Synchronized Security In Action

SophosLabs 2019 Threat Report

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Server Protection Buyers Guide

Securing Your Most Sensitive Data

The Art and Science of Deception Empowering Response Actions and Threat Intelligence

High risk, unwanted and even malicious applications are hiding like parasites on many organizations' networks.

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Managed Endpoint Defense

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Security Made Simple by Sophos

A Data-Centric Approach to Endpoint Security

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

with Advanced Protection

Sophos MSP Connect. One flexible MSP program to connect you and your customers to one complete and simple security solution.

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

FIREWALL BEST PRACTICES TO BLOCK

Mastering The Endpoint

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

AKAMAI CLOUD SECURITY SOLUTIONS

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

From Firewall to Cloud, Diocese of Brooklyn Enthusiastically Embraces Unified Sophos Security Across its Parishes and Schools

Securing the Modern Data Center with Trend Micro Deep Security

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

INFINIT Y TOTAL PROTECTION

Building Resilience in a Digital Enterprise

Threat-Agnostic Defense tm is the New Security Paradigm

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Cybersecurity for Service Providers

ANATOMY OF AN ATTACK!

Consolidating to a Best of Breed Security System

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

Incorporating Hunt Teams To Defend Your Enterprise

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

Designing and Building a Cybersecurity Program

CloudSOC and Security.cloud for Microsoft Office 365

Spotlight Report. Information Security. Presented by. Group Partner

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

THE ACCENTURE CYBER DEFENSE SOLUTION

Vectra Cognito Automating Security Operations with AI

Stopping Advanced Persistent Threats In Cloud and DataCenters

RSA Security Analytics

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Securing and File Sharing in the Cloud

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Sophos Central Admin. help

The security challenge in a mobile world

Automated Threat Management - in Real Time. Vectra Networks

Real-time, Unified Endpoint Protection

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Symantec Ransomware Protection

Securing the SMB Cloud Generation

Security and Compliance for Office 365

in collaboration with

RSA INCIDENT RESPONSE SERVICES

Gujarat Forensic Sciences University

Symantec Endpoint Protection

Synchronized Security

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

McAfee epolicy Orchestrator

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Secure Gateway Market Quadrant 2016

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Sophos Central Admin. help

WHITEPAPER. How to secure your Post-perimeter world

ForeScout ControlFabric TM Architecture

BETTER Mobile Threat Defense (BMTD)

XG Firewall. What s New in v17. Setup, Control Center and Navigation. Initial Setup Wizard. Synchronized App Control Widget.

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

TECHNOLOGY. Roberto Corso. Territory Manager NW - Italy. 6 Giugno 2017

Endpoint Protection : Last line of defense?

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

esendpoint Next-gen endpoint threat detection and response

Improved C&C Traffic Detection Using Multidimensional Model and Network Timeline Analysis

Transcription:

Synchronized Security: Outsmart Hackers by Coordinating Your Defenses Seth Geftic Endpoint Security Group November 2 nd, 2017

What could you do in two hours? What could an attacker do in two hours?

Attacks Are Increasingly Unique Attack complexity Expanding attack surface Uncoordinated defenses 46% Organizations believe they have a problematic shortage of cybersecurity skills ESG Group Lack of resources 3

What if we could simplify security and unify our defences?

Benefits of an Integrated System Simplify IT management Increase visibility across environment Reduce risk of threats spreading Respond faster to potential security incidents Maximize IT team by leveraging automation Achieve better ROI from security investments

then something happened which unleashed the power of our imagination. We learned to talk. Pink Floyd, Keep Talking Introducing Synchronized Security

Proven Technology in Key Areas Gartner Magic Quadrant UNIFIED THREAT MANAGEMENT Gartner Magic Quadrant ENDPOINT PROTECTION The Forrester Wave TM ENDPOINT ENCRYPTION Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Rajpreet Kaur, 30 August, 2016 Magic Quadrant for Endpoint Protection Platforms, Eric Ouellet, Ian McShane, Avivah Litan 30 January, 2017 The Forrester Wave: Endpoint Encryption, Chris Sherman, 16 Jan 2015

Sophos Synchronized Security Real-time intelligence sharing between your endpoints and firewall No other company is close to delivering this type of communication between endpoint and network security products. Chris Christianson, Vice President of Security Programs, IDC

Synchronized Security Benefits Unparalleled Protection Best-of-breed products packed with next-gen technology actively work together to detect and prevent advanced attacks like ransomware and botnets. Automated Incident Response Security information is shared and acted on automatically across the system, isolating infected endpoints before the threat can spread and slashing incident response time by 99.9%. Real-time Insight and Control See - and control - what's happening in real-time for simpler, better IT security management. 9

Sophos Security Heartbeat Next-Gen Firewall Wireless Security Heartbeat Next-Gen Endpoint Mobile Web Server Email Sophos Central Encryption 10

Synchronized Security In Action

Automated Incident Response Before Synchronized Security Minimum 2 hours to identify user, process, machine and wider impact Often days, weeks After Synchronized Security Automatic isolation of endpoints at threat identification < 8 seconds Results of testing by Analyst ESG

Sharing Information. Automating Response.! Endpoint communicates to Sophos Central Network access Firewall isolates returned endpoint Endpoint automatically cleans up malware Endpoint detects and blocks malware Endpoint communicates to Sophos Central Encryption Encryption keys keysrevoked restored Heartbeat changes status changes back to GREEN to RED A%b_ My @hhj* Secret (+ Data

It only took 2 minutes to find out that everything was under control. Sophos XG Firewall detected the threat and Security Heartbeat allowed the infected host to be immediately identified, isolated and cleaned up. Instead of going into fire drill mode, we were able relax and finish our lunch. DJ Anderson, CTO, IronCloud 14

Attacker s Predicament Leaves Sophos Security alone Disable Sophos Security Disable Heartbeat Sophos sees everything they do, Intercept X blocks attack Red health sent through Heartbeat, Firewall isolates endpoint FW detects missing Heartbeat, Firewall isolates endpoint 15

Lateral Movement Detection and Prevention XG Firewall Security Heartbeat Endpoints Internet Servers Credential Theft Attempt Detected By Intercept X

Lateral Movement Detection and Prevention Internet XG Firewall Security Heartbeat Endpoints Servers Detection and Isolation

Lateral Movement Detection and Prevention Internet XG Firewall Security Heartbeat Endpoints Servers Detection and Isolation Endpoint Stonewalling

Lateral Movement Detection and Prevention Security Heartbeat Internet XG Firewall Security Heartbeat Endpoints Servers Detection and Isolation Wireless Heartbeat

Real-time Insight and Control Infrastructure visibility Machine, Process, User Threat chain visibility Security Heartbeat Active Threat ID Root Cause Analysis 20

Sophos Synchronized App Control A breakthrough in network visibility and control What Firewalls See Today What XG Firewall Sees 21

An Elegant Solution Synchronized App Control 1 2 Unknown Application XG Firewall sees app traffic that does not match a signature Endpoint Shares App Info Sophos Endpoint passes app name, path and even category to XG Firewall for classification XG Firewall Internet Security Heartbeat Synchronized App Control Sophos Endpoints 3 Application is Classified & Controlled Automatically categorize and control where possible or admin can manually set category or policy to apply. Sophos is the only vendor to offer this level of app visibility & control

Synchronized Security In Action 99% Reduction in incident response time ~2,500 Organizations w/ Security Heartbeat 423 Avg. users per customer ~42K Encrypted devices w/ Security Heartbeat Firewall Web Wireless Email Sophos Central Server Encryption Mobile Endpoint ~5K Firewalls w/ Security Heartbeat 2 Avg. firewalls per customer ~40K Servers w/ Security Heartbeat 22 Avg. servers per customer 450K+ Endpoints w/ Security Heartbeat 188 Avg. endpoints per customer As of March 2017

Customer Quotes The time we save is equivalent to at least one part-time person that s huge. Gus Garcia, Sr. Project Manager, Diocese of Brooklyn Synchronized Security was able to respond in real-time to the ever-more aggressive threats. Igor Bovio, IT Manager, Mirato Synchronized Security allows us to identify the cause and origin of threats and blocks the spread of these threats within the network. Oscar Macchi, CTO, MedicAir We like Synchronized Security because it prevents a single infection from spreading to the rest of the network. Robert Glinski, IT Security, North Sydney Council Synchronized Security has prevented hundreds of exploits from infecting the systems. Derrick Morse, Pine Cove Synchronized Security is the reason I bought Sophos and went with XG Firewalls. CNS Healthcare

The Future of Synchronized Security

Sophos Security Heartbeat Now Coming Soon Next-Gen Firewall Wireless Security Heartbeat Next-Gen Endpoint Mobile Web Server Email Sophos Central Encryption 26