agenda
play

Agenda Why we need a new approach to endpoint security Introducing - PowerPoint PPT Presentation

Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks are from within the


  1. Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2

  2. Endpoint Security has reached a Tipping Point • Attacks are from within the perimeter, delivered using software exploits • Ransomware reaches $1.2B in damages • Lack of Threat Intelligence after a Breach

  3. Driving the Paradigm Shift to Next-Generation ZERO DAY LIMITED ADVANCED EXPLOITS VISIBILITY MALWARE

  4. The Evolution of Sophos Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Pre-Exec File Run-Time Exploit Prevention Analytics Scanning Detection URL Blocking Generic Matching Signatures Signatureless Technique Web Scripts Heuristics Known Malware Behavior Analytics Identification Download Rep Core Rules Malware Bits Runtime Behavior T RADITIONAL M ALWARE A DVANCED T HREATS

  5. ! E XECUTABLE M ALICIOUS MS F ILES R ANSOMWARE I NCIDENT E XPLOIT U NAUTHORIZED R EMOVABLE A DVANCED F ILES URL S & PDF P REVENTION R ESPONSE P REVENTION A PPS M EDIA C LEAN A ND Y ET … 90% OF D ATA B REACHES ARE >90% O F E XPLOIT A TTEMPTS U SE M ORE T HAN 60% OF IT S TAFF F ROM E XPLOITS K ITS K NOWN V ULNERABILITIES L ACK I NCIDENT R ESPONSE S KILLS P REVENT R ESPOND D ETECT B EFORE IT RUNS ON DEVICE B EFORE IT REACHES DEVICE N EXT G ENERATION E NDPOINT

  6. Introducing Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Automated Incident Response Prevent Exploit Techniques • Stops Malicious Encryption • IT Friendly Incident Response • Signatureless Exploit Prevention • Behavior Based Conviction • Process Threat Chain Visualization • Protects Patient-Zero / Zero-Day • Automatically Reverts Affected Files • Prescriptive Remediation Guidance • Blocks Memory-Resident Attacks • Identifies source of Attack • Advanced Malware Clean • Tiny Footprint & Low False Positives ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY Prevent Ransomware Attacks Faster Incident Response No User/Performance Impact Roll-Back Changes Root-Cause Visualization No File Scanning Attack Chain Analysis Forensic Strength Clean No Signatures

  7. Optional Demo

  8. ANTI-RANSOMWARE

  9. CryptoGuard - Intercepting Ransomware Monitor file access Attack detected Rollback initiated Forensic visibility • If suspicious file • Malicious process is • Original files restored • User message changes are detected, stopped and we • Malicious files • Admin alert file copies are created investigate the removed • Root cause analysis process history details available

  10. ROOT CAUSE ANALYSIS

  11. Root-Cause Analytics Understanding the Who, What, When, Where, Why and How What Happened? • Root Cause Analysis • Automatic report @ the process / threat / registry level • 90 Days of historical reporting • Detailed Visual representation of what other assets have been touched What is at Risk? • Compromised Assets • Comprehensive list of business documents, executables, libraries and files • Any adjacent device (i.e., mobile) or network resources which may be at risk Future Prevention • Security Posture • Recommendations based on historical security risks • Provides steps to prevent future attacks • Rich reporting of Compliance status

  12. 15 Sophos confidential

  13. 16

  14. ANTI-EXPLOIT

  15. Intercepting Exploits 10’s of new malware sub- techniques every year ?

  16. Intercepting Exploits Exploit Prevention 10’s of new malware sub- • Monitors processes for attempted use of techniques every year exploit techniques e.g. Buffer overflow, code injection, stack pivot and others • Blocks when technique is attempted • Malware is prevented from leveraging vulnerabilities ?

  17. SOPHOS CENTRAL

  18. A Single, Synchronized Security Platform Sophos Central In Cloud On Prem UTM/Next-Gen Firewall Endpoint/Next-Gen Endpoint Wireless Mobile Email Server Web Encryption 21

  19. Sophos Central: Admin Dashboard User-Centric Unified Powerful Simple Fast 22

  20. DEPLOYMENT OPTIONS

  21. Deployment Options SOPHOS INTERCEPT X Antivirus and endpoint Sophos Central Endpoint solutions from other Advanced vendors 24

  22. TO SUM UP…

  23. Taking Your Endpoints To The Next-Generation ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY 26

  24. Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Automated Incident Response Prevent Exploit Techniques • Stops Malicious Encryption • IT Friendly Incident Response • Signatureless Exploit Prevention • Behavior Based Conviction • Process Threat Chain Visualization • Protects Patient-Zero / Zero-Day • Automatically Reverts Affected Files • Prescriptive Remediation Guidance • Blocks Memory-Resident Attacks • Identifies source of Attack • Advanced Malware Clean • Tiny Footprint & Low False Positives ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY Prevent Ransomware Attacks Faster Incident Response No User/Performance Impact Roll-Back Changes Root-Cause Visualization No File Scanning Attack Chain Analysis Forensic Strength Clean No Signatures

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend