Agenda Why we need a new approach to endpoint security Introducing - - PowerPoint PPT Presentation
Agenda Why we need a new approach to endpoint security Introducing - - PowerPoint PPT Presentation
Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks are from within the
Agenda
Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A
2
Endpoint Security has reached a Tipping Point
- Attacks are from
within the perimeter, delivered using software exploits
- Ransomware reaches
$1.2B in damages
- Lack of Threat
Intelligence after a Breach
Driving the Paradigm Shift to Next-Generation
ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
TRADITIONAL MALWARE ADVANCED THREATS
The Evolution of Sophos Endpoint Security
From Anti-Malware to Anti-Exploit to Next-Generation
Exposure Prevention
URL Blocking Web Scripts Download Rep
Pre-Exec Analytics
Generic Matching Heuristics Core Rules
File Scanning
Signatures Known Malware Malware Bits
Run-Time
Signatureless Behavior Analytics Runtime Behavior
Exploit Detection
Technique Identification
EXECUTABLE FILES MALICIOUS URLS UNAUTHORIZED APPS REMOVABLE MEDIA EXPLOIT PREVENTION MS FILES & PDF ! ADVANCED CLEAN RANSOMWARE PREVENTION INCIDENT RESPONSE
DETECT RESPOND PREVENT
BEFORE IT REACHES DEVICE
BEFORE IT RUNS ON DEVICE
NEXT GENERATION ENDPOINT
90% OF DATA BREACHES ARE FROM EXPLOITS KITS >90% OF EXPLOIT ATTEMPTS USE KNOWN VULNERABILITIES AND YET… MORE THAN 60% OF IT STAFF LACK INCIDENT RESPONSE SKILLS
Introducing Sophos Intercept X
ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY Anti-Exploit Prevent Exploit Techniques
- Signatureless Exploit Prevention
- Protects Patient-Zero / Zero-Day
- Blocks Memory-Resident Attacks
- Tiny Footprint & Low False Positives
No User/Performance Impact No File Scanning No Signatures Automated Incident Response
- IT Friendly Incident Response
- Process Threat Chain Visualization
- Prescriptive Remediation Guidance
- Advanced Malware Clean
Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean Detect Next-Gen Threats
- Stops Malicious Encryption
- Behavior Based Conviction
- Automatically Reverts Affected Files
- Identifies source of Attack
Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis
Optional Demo
ANTI-RANSOMWARE
CryptoGuard - Intercepting Ransomware
Monitor file access
- If suspicious file
changes are detected, file copies are created
Attack detected
- Malicious process is
stopped and we investigate the process history
Rollback initiated
- Original files restored
- Malicious files
removed
Forensic visibility
- User message
- Admin alert
- Root cause analysis
details available
ROOT CAUSE ANALYSIS
Root-Cause Analytics
Understanding the Who, What, When, Where, Why and How
What Happened?
- Root Cause Analysis
- Automatic report @ the process / threat / registry level
- 90 Days of historical reporting
- Detailed Visual representation of what other assets have been touched
What is at Risk?
- Compromised Assets
- Comprehensive list of business documents, executables, libraries and files
- Any adjacent device (i.e., mobile) or network resources which may be at risk
Future Prevention
- Security Posture
- Recommendations based on historical security risks
- Provides steps to prevent future attacks
- Rich reporting of Compliance status
15 Sophos confidential
16
ANTI-EXPLOIT
Intercepting Exploits
?
10’s of new malware sub- techniques every year
Intercepting Exploits
?
10’s of new malware sub- techniques every year Exploit Prevention
- Monitors processes for attempted use of
exploit techniques e.g. Buffer overflow, code injection, stack pivot and others
- Blocks when technique is attempted
- Malware is prevented from leveraging
vulnerabilities
SOPHOS CENTRAL
A Single, Synchronized Security Platform
Sophos Central
Endpoint/Next-Gen Endpoint Mobile Server Encryption UTM/Next-Gen Firewall Wireless Email Web
In Cloud On Prem
21
Sophos Central: Admin Dashboard
User-Centric Unified Powerful Simple Fast
22
DEPLOYMENT OPTIONS
Deployment Options
24
Sophos Central Endpoint Advanced Antivirus and endpoint solutions from other vendors SOPHOS INTERCEPT X
TO SUM UP…
Taking Your Endpoints To The Next-Generation
26
ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY
Sophos Intercept X
ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY Anti-Exploit Prevent Exploit Techniques
- Signatureless Exploit Prevention
- Protects Patient-Zero / Zero-Day
- Blocks Memory-Resident Attacks
- Tiny Footprint & Low False Positives
No User/Performance Impact No File Scanning No Signatures Automated Incident Response
- IT Friendly Incident Response
- Process Threat Chain Visualization
- Prescriptive Remediation Guidance
- Advanced Malware Clean
Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean Detect Next-Gen Threats
- Stops Malicious Encryption
- Behavior Based Conviction
- Automatically Reverts Affected Files
- Identifies source of Attack
Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis