Meng-Chow Kang, CISSP, CISA (ISC) 2 Asia Advisory Board. Chief Security Advisor Microsoft Greater China Region
|
|
- Laureen Douglas
- 8 years ago
- Views:
Transcription
1 Meng-Chow Kang, CISSP, CISA (ISC) 2 Asia Advisory Board Chief Security Advisor Microsoft Greater China Region
2 Vulnerability Disclosure, Malware, and Potentially Unwanted Software Information challenges in the New Economy Evolving Cybersecurity Strategy and Approach
3 Contains data and trends observed over the past several years, but focuses on the first half of 2007 (1H07) Focuses on Software Vulnerability Disclosures Software Vulnerability Exploits Malicious Software Potentially Unwanted Software Report is successor of 2H06 and 1H06 reports and the MSRT White paper: Progress Made, Trends Observed
4 Data sources Software Vulnerability Disclosures Common Vulnerabilities and Exposures Website National Vulnerability Database (NVD) Web site Security Web sites Vendor Web sites and support sites
5 Data sources Software Exploits Variety of public sources, including exploit archives, antivirus alerts, mailing lists, security related websites Microsoft Security Bulletins SecurityFocus
6 Data sources Malicious Software and Potentially Unwanted Software Data from several hundred million computers MSRT has a user base of 350+ million unique computers During 1H07 executed 1.9 billion times Since January 2005 total executions surpass 7.4 billion Product Name Windows Malicious Software Removal Tool Main Customer Segment Consumers Business Malicious Software Scan and Remove Prevalent Malware Families Real-time Protection Spyware and Potentially Unwanted Software Scan and Remove Real-time Protection Available at No Additional Charge Windows Defender Windows Live OneCare safety scanner Windows Live OneCare Microsoft Exchange Hosted Filtering Main Distribution Methods WU/AU Download Center Download Center Windows Vista Web Web Web/Store Purchase Forefront Client Security Volume Licensing
7
8 More than 3,400 new vulnerabilities disclosed in 1H07 from ALL software vendors (not just Microsoft) A decrease from 2H06 The first period-to-period decrease in total vulnerabilities since Vulnerability Disclosures
9 By severity Growth of Low and Medium severity issues appears to be reversing High severity vulnerabilities continue to grow It appears that Medium severity issues are being identified and disclosed much more aggressively Over half of all vulnerabilities disclosed in 1H07 were rated High severity Vulnerabilities by Severity Percentage Vulnerabilities by Severity Percentage 100% 80% 60% 40% 20% 0% High Medium Low High Medium Low
10 Complexity of exploit The increase in complex vulnerabilities reached a peak in 1H06, and declined in 2H06 and 1H07 to levels similar to 2004 and previous years The large drop in complexity from 2006 may be contributing to higher severity ratings Complexity of Exploit 100% 80% 60% 40% 20% 0% Complex Easy
11 OS versus application vulnerabilities Application vulnerabilities continued to grow relative to operating system vulnerabilities as a percentage of all disclosures during 1H07 Supports the observation that security vulnerability researchers may be focusing more on applications than in the past 100% 80% 60% 40% 20% 0% OS versus Non-OS Vulnerabilities OS Vulns Non-OS Vulns
12
13 Trends Vulnerabilities Vulnerabilities where Exploit Code was available While the number of vulnerability disclosures continues to increase across the software industry, the ratio of exploit code available for these vulnerabilities in Microsoft products remains steady and is even on a slight decline
14 New products Exploit code for newer Microsoft products is harder to find 2006: 29% of Microsoft vulnerabilities had public exploit code 2007: 21% of Microsoft vulnerabilities had public exploit code Newer Microsoft products are less at risk to public exploit code than Microsoft products in the market longer Later versions of Microsoft Windows and Microsoft Office show a distinct decrease in number of exploitable vulnerabilities throughout product lifetime Product Windows Microsoft Office Version Exploits 2006 Exploits ME 0 0 NT XP Vista XP X-Mac Mac
15 Strategies, mitigations, and countermeasures Prioritize which vulnerabilities require faster mitigation by checking for availability of exploit code In a product-by-product comparison, new products are at less risk to publicly available exploit code than products that have a longer time in market Participate in IT security communities Example: Microsoft Security Bulletin Webcasts
16
17 Instant Messaging threats Backdoor Trojans were an increased threat to IM users in 1H07 The large increase from 2H06 to 1H07 was due almost exclusively to a single family Win32/IRCbot 81% of all the backdoor Trojan detections in Windows Live Messenger in 1H07 60% 50% 40% 30% 20% 10% 0% 1H06 2H06 1H07
18 Borne Malware Phishing scams and containing malicious iframe attacks accounted for 37% of malware detections in 1H07 Trojan downloaders carried in dropped from 20% in 2H06 to 7% in 1H07 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 37% 7% 7% 49% worms 1H06 2H06 1H07 Phishing and fraud Downloader Trojans Greeting card scams
19 Borne Malware The Sober worm represented 40% of the top 20 malware in 1H07 (85% in 1H06) Win32/Nuwar worm (a.k.a. Storm worm ) comprised 11% of the top 20 threats detected in during 1H07 with Win32/Bagle and Win32/Netsky closely following 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 1H06 2H06 1H07 Win32/Nuwar Win32/Sober Win32/Stration Win32/Netsky Win32/Bagle
20 Borne Malware The decrease in volume of infected correlates to an equally significant increase in the number of s filtered out prior to their reaching the virus scanners The percentage drop in June corresponds to a 155% increase in the number of s blocked for spam, content, and other policy violations EHS blocked 96 percent of all , and the percentage of scanned for malware dropped to only 4 percent 8.00% 3.00% 6.00% 4.00% 2.00% 0.00% 1H06 2H06 1H % 2.00% 1.50% 1.00% 0.50% 0.00% Jan-07 Feb-07 Mar-07 Apr-07 May-07 Jun-07
21 Borne Malware Seeded Trojan downloaders disguised as greeting cards dropped only slightly, to just over 4.8 million in 1H07 Phishing scams increased from 12.4 million in 2H06 to 31.6 million in 1H07 iframe exploits in HTML-enabled continued to decline From 3.2 million in 2H06 to 1.9 million in 2H07 35,000,000 30,000,000 25,000,000 20,000,000 15,000,000 10,000,000 5,000, H06 2H06 1H07 Downloader/Greeting Card Scams IFrame Exploits Fraud/Phishing
22 Infection and Disinfection Trends Adware and potentially unwanted software detections outpaced detections for viruses, worms, Trojans, and malware threats Password stealing (PWS) and data-theft Trojans increased slightly: 2.6% in 1H07 vs. 1.4% in 2H06 Downloader and dropper Trojan infection rates declined slightly from 12% in 2H06 to 11.5% in 1H07 This slight decrease may be due to a trend in downloaders and droppers to delete themselves after executing initial tasks 25.00% 20.00% 15.00% 10.00% 5.00% 0.00% 1H06 2H06 1H07
23 Advantages of real-time protection Detection rates highlight importance of scanners in mitigating risk of exposure and illustrate the role that real-time scanning plays in protecting users Windows Live OneCare encounters significantly higher detections, likely as a result of real-time protection 25.00% 20.00% 15.00% 10.00% 5.00% 0.00% Safety Scanner OneCare
24 Infection and disinfection trends Windows Live OneCare detections are highest for adware and potentially unwanted software, downloaders/droppers and Trojans 1H07 Windows Live OneCare % Detections Trojans 21% Viruses 1% Worms 5% Adware 24% Spyware 3% Backdoors 4% PWS/Data Theft 4% Pontentially Unwanted Software 20% Downloaders and Droppers 18%
25 Disinfections / Computers Disinfections and cleans Beginning in 2H05, MSRT began measuring number of unique computers cleaned Since then MSRT has removed 50.3 million infections from 20.5 million computers worldwide MSRT removed significantly more malware in 1H07 than in previous periods Removed malware from 1 out of every 217 computers in 1H07 (1:409 in 2006, 1:359 in 2H05) Reasons for sharp increase MSRT detection improvements Addition of highly prevalent families such as Win32/Renos, Win32/Stration, Win32/Alureon 20,000,000 18,000,000 16,000,000 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000 4,000,000 2,000,000 0 Time Period Disinfections Computers Cleaned
26 Prevalence by category Figure below illustrates categories of malicious software removed by MSRT from infected computers Note that these percentages correspond to infected computers, not to all computers scanned In 1H07 the MSRT recorded a tremendous increase in the number of Trojan downloaders and droppers detected, with 5.9 million detections, up from 960,000 in the previous period This increase was almost entirely due to improvements for detection of Win32/Zlob, as well as the addition of Win32/Renos 6,000,000 5,000,000 4,000,000 3,000,000 2,000,000 1,000,000 0 Disinfections (2H05) Disinfections (1H06) Disinfections (2H06) Disinfections (1H07)
27 Prevalence by operating system The MSRT cleaned malware from 60 percent less Windows Vista computers than Windows XP SP2 computers (normalized) The MSRT cleaned malware from 91.5 percent less Windows Vista computers than from computers running Windows XP without any service pack installed H107 H107 (Normalized) Win2k3 SP2 0.1% Win Vista 1.1% Win2k SP3 0.1% Win2k SP4 3.0% Win2k3 SP1 0.4% Win2k3 Gold 0.1% WinXP Gold 3.3% WinXP SP1 4.3% Win2k3 SP1 3.4% Win2k3 Gold 5.8% Win2k3 SP2 7.3% Win Vista 2.8% Win2k SP3 13.2% Win2k SP4 6.6% WinXP SP2 7.0% WinXP SP2 87.7% WinXP SP1 20.9% WinXP Gold 32.9%
28 Top infected: Prevalence by locale The MSRT executes in almost any country/region around the world The table shows the countries/regions with the highest and lowest ratios of executions/infected computers based on MSRT data The world wide average for 1H07 was 1 computer cleaned for every 217 MSRT executions Most Infected Countries Least Infected Countries Country Normalized Disinfections - executions/removal (H107) Country Normalized Disinfections - executions/removal (H107) Mongolia 49 Albania 57 Bahrain 63 Dominican Republic 69 Turkey 70 Egypt 79 Iraq 80 Japan 631 New Zealand 491 Finland 455 Italy 446 Australia 436 Austria 433 Sweden 362
29 Prevalence by locale The figures show the infection rates determined by the MSRT from locales in Asia Pacific and Middle East Africa Malaysia 4.3% Singapore 4.9% Hong Kong SAR 5.9% Australia 2.8% Taiwan 3.5% New Zealand 2.5% 1H07 (Normalized) Asia Pacific Japan 1.9% Mongolia 25.0% Libya 4.6% Tunisia 3.9% Yemen 4.1% Kuwait 3.6% Israel 3.8% South Syria Africa 3.5% 2.0% Bahrain 8.7% 1H07 (Normalized) Middle East - Africa Egypt 7.0% Iraq 6.9% Morocco 6.7% Korea 5.9% China 6.3% India 6.4% Indonesia 6.8% Vietnam 7.5% Thailand 8.2% Macau SAR 8.1% Iran 4.9% Oman 5.0% Qatar 5.2% United Arab Emirates 5.2% Lebanon 5.9% Algeria 6.2% Jordan 6.2% Saudi Arabia 6.7%
30 Most active malware categories Trojans represented the largest number of variants that were collected during 1H07 Trojan downloaders and droppers had the second-highest number of variants for samples collected in 1H07 160, , , ,000 80,000 60,000 40,000 20,000 0
31
32 Windows Defender The standalone version of Windows Defender was released on October 23, 2006 This version of Windows Defender runs on Windows XP SP2 and Microsoft Windows Server 2003 Windows Defender is also a default component of the Windows Vista operating system
33 Windows Defender 1. Windows Defender assigns each potentially unwanted software program an alert rating Low Medium High Severe 2. Each software program has also been assigned a default recommended action from the following list of possible actions: Ignore: Users should ignore the alert for the current session Ignore Always: Users should ignore the alert from now on, even if software seen again Prompt: Users must make a decision about what to do with the software Quarantine: Removes software in such a way that it can be restored at a later point Remove: Removes software from system Software rated with alert level of High or Severe is automatically removed during scheduled scans
34 Windows Defender prevalence by category In 1H million pieces of potentially unwanted software were detected by Windows Defender Rogue security software was the largest factor in a dramatic increase in the Potentially Unwanted Software category Increases in the Trojan, downloader, and exploit categories may be indicative of greater criminal intent and an increasing botnet population Rank Category Total 1H07 Total 2H06 % Change 1 Adware 16,673,939 16,709, % 2 Potentially Unwanted Software 6,877,582 2,561, % 3 Trojan Downloader 6,554,225 2,737, % 4 Remote Control Software 3,160,543 2,755, % 5 Browser Modifier 3,117,687 1,359, % 6 Spyware 3,002,795 3,496, % 7 Trojan 2,946,479 1,352, % 8 Sofware Bundler 2,695,015 3,740, % 9 Exploit 1,072, , % 10 Setting Modifier 930,291 1,130, %
35 Windows Defender prevalence by OS Windows Defender detected 2.8 times less potentially unwanted software on computers running Windows Vista than on computers running Windows XP SP2 (normalized) The number of detections of potentially unwanted software on computers running Windows Vista was half of the number of detections of potentially unwanted software on computers running Windows Server 2003, after normalization Variation By Operating System 48% 34% Windows 2003 Windows Vista Windows XP SP2 18%
36 Geographical Differences Removals in the top 25 removal regions represent 94.9% of all removals worldwide (89% in 1H06) Region 2H06 1H07 % Change United States 21,958,236 28,125,649 28% United Kingdom 3,521,976 4,194,037 19% France 742,464 2,151, % China 527,055 2,134, % Canada 1,424,370 1,649,734 16% Netherlands 1,149,623 1,224,051 6% Australia 860,404 1,049,231 22% Germany 568, ,950 60% Japan 256, , % Italy 422, ,741 97%
37 Geographical differences Unites States United Kingdom France Canada Netherlands Australia TrojanDownloader: Win32/Zlob Program: Win32/Winfixer Adware: Win32/Claria.GAIN Settings Modifier: Win32/PossibleHostsFileHijack Program: Win32/Starware Adware: Win32/NewDotNet RemoteAccess: Win32/Rserver TrojanDownloader: Win32/Renos Adware: Win32/ZangoSearchAssistant Spyware: Win32/CnsMin SofwareBundler: Win32/BearShare Exploit: Win32/Anicmoo.A Adware: Win32/WhenU.SaveNow Trojan: Win32/Anomaly.gen SofwareBundler: Win32/NetPumper Program: Win32/SearchTool RemoteAccess: Win32/RealVNC Adware: Win32/Hotbar Adware: Win32/SurfAccuracy RemoteAccess: Win32/GhostRadmin Program: Win32/Optmedia Dialer: Win32/Riprova BrowserModifier: Win32/Matcash SoftwareBundler: Win32/KaZaA Program: Win32/Tclock All Others
38 Geographical Differences Germany Japan Turkey Italy Belgium TrojanDownloader: Win32/Zlob Program: Win32/Winfixer Adware: Win32/Claria.GAIN Settings Modifier: Win32/PossibleHostsFileHijack Program: Win32/Starware Adware: Win32/NewDotNet RemoteAccess: Win32/Rserver TrojanDownloader: Win32/Renos Adware: Win32/ZangoSearchAssistant Spyware: Win32/CnsMin SofwareBundler: Win32/BearShare Exploit: Win32/Anicmoo.A Adware: Win32/WhenU.SaveNow Trojan: Win32/Anomaly.gen SofwareBundler: Win32/NetPumper Program: Win32/SearchTool RemoteAccess: Win32/RealVNC Adware: Win32/Hotbar Adware: Win32/SurfAccuracy RemoteAccess: Win32/GhostRadmin Program: Win32/Optmedia Dialer: Win32/Riprova BrowserModifier: Win32/Matcash SoftwareBundler: Win32/KaZaA Program: Win32/Tclock All Others
39 Geographical Differences Detections in China rose 305% from 2H06, with 2.1 million in 1H07 BrowserModifier: Win/CNNIC ChineseKeywords BrowserModifier: Win/YokSearch BrowserModifier: Win/Baldu.Sobar BrowserModifier: Win/My123 BrowserModifier: Win/Kugoo Spyware: Win32/CnsMin BrowserModifier: Win/SuperUtilBar Program: Win32/PigSearch program: Win32/Sogou BrowserModifier: Win/BDPlugin
40
41 Home USB Drive Independent Consultant Mobile Devices The flow of information has no boundaries Information is shared, stored and accessed outside the control of its owner Host and network security controls not adequate to solve this problem Partner Organization
42 Regulatory Compliance Strict regulations Implications on availability People Awareness Competency Social/Culture Joint venture IT Outsourcing Branch & distributed network Mobility Information Access & Protection
43 Scenarios Testing/Drills CERTs & Industry Partnership Focus on Responsiveness Be prepared for the next incident Awareness Training Education Focus on the People Building Competency Focus on the Systems Mitigation and enablement Patch & vulnerabilities management Information security management Legal and policy foundations
44 Integrated, coordinated protection technologies across clients, server applications, and the network edge, with dynamic responses to emerging threats, including antimalware, anti-spyware, and network access protection. Comprehensive Protection Unified Management Single management console with unified security policies to protect and manage security across the entire infrastructure. Ease of deployment of configurations and updates, and collection of audit events. Critical Visibility Critical visibility into overall security state, including insights into threats and vulnerabilities. Integrated and summary reporting. What you see is what you act (WYSWYA) 45
45 Integrated security eases defense in depth architecture deployment Adoption of open standards allows cross platform integration Management System Data User Application Device Internal Network Perimeter System Center, Active Directory GPO BitLocker, EFS, RMS, SharePoint, SQL Active Directory and Identity Lifecycle Mgr SDL process, IIS, Visual Studio, and.net Forefront Client Security, Exchange MSFP Network Access Protection, IPSec Forefront Edge and Server Security, NAP
46 Services IPSec VPN Network Access Protection (NAP) Edge Server Content Client Identity Management Systems Management Guidance
47 Previously published Microsoft Security Intelligence Reports Microsoft Malware Protection Center Portal Understanding Anti-Malware Research and Response at Microsoft a fd14ef2/understanding%20malware%20research%20and%20respo nse%20at%20microsoft.pdf Anti-malware product Information for IT Professionals Windows Malicious Software Removal Tool Windows Defender
48 Windows Live OneCare Windows Live OneCare safety scanner Microsoft Exchange Hosted Services Microsoft Forefront Client Security Microsoft Forefront Security for Exchange Server Microsoft Online Safety Technologies (antispam and antiphishing) Sender ID Framework
49 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
More informationIt s critical to be able to correlate threats pre-emptively and respond to them immediately.
Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,
More informationEnterprise Mobility Suite (EMS) Overview
Enterprise Mobility Suite (EMS) Overview Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work Enable my employees
More informationMicrosoft Security Intelligence Report
Microsoft Security Intelligence Report Volume 16 July through December, 2013 Key Findings Summary This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY,
More informationGlobal Effective Tax Rates
www.pwc.com/us/nes Global s Global s April 14, 2011 This document has been prepared pursuant to an engagement between PwC and its Client. As to all other parties, it is for general information purposes
More informationMake it tight, protect with might, and try not to hurt anyone. Michael Johnson, MMPC
Make it tight, protect with might, and try not to hurt anyone Michael Johnson, MMPC Topic In 2012 the MMPC decided to change our approach to potentially unwanted software (PUS) This presentation talks
More informationExploring the Landscape of Philippine Cybersecurity
Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright
More informationSecurity Assessment and Compliance Services
Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact
More informationThe big pay turnaround: Eurozone recovering, emerging markets falter in 2015
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in
More informationAppendix 1: Full Country Rankings
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
More informationKnow the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country.
Aon Hewitt Country Profiles Your eguide to employment requirements and practices Profiles for nearly 90 countries worldwide Risk. Reinsurance. Human Resources. Know the Facts Whether you are a newcomer
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationStudent Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
More informationWorld Consumer Income and Expenditure Patterns
World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income
More informationMichael Nowacki, CISSP - ISSAP. Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com
Michael Nowacki, CISSP - ISSAP Security & Management Solutions Specialist Microsoft Canada Michael.Nowacki@Microsoft.com More advanced Application-oriented More frequent Profit motivated Too many point
More informationMicrosoft Security Intelligence Report Volume 13
Microsoft Security Intelligence Report Volume 13 Tim Rains Director, Trustworthy Computing, Microsoft Jeff Jones Director, Trustworthy Computing, Microsoft Session ID: DSP-R33 Session Classification: Intermediate
More informationConsolidated International Banking Statistics in Japan
Total (Transfer Consolidated cross-border claims in all currencies and local claims in non-local currencies Up to and including one year Maturities Over one year up to two years Over two years Public Sector
More information2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware.
More informationGlobal AML Resource Map Over 2000 AML professionals
www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationTriple-play subscriptions to rocket to 400 mil.
Triple-play criptions to rocket to 400 mil. Global triple-play criptions will reach 400 million by 2017; up by nearly 300 million on the end-2011 total and up by 380 million on the 2007 total, according
More informationForeign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
More informationScott Charney Corporate Vice President, Trustworthy Computing Microsoft Corporation
Scott Charney Corporate Vice President, Trustworthy Computing Microsoft Corporation Social: Enabling a global village Economic: Easier, faster, cheaper commerce Political: Freer exchange of ideas Loss
More informationCMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
More informationInformation Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
More informationGlobal Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 2120 Tel. 505 277 4032, Fax 505 277 1867, geo@unm.
Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 220 Tel. 505 277 4032, Fax 505 277 867, geo@unm.edu Report on International Students, Scholars and Study Abroad Programs
More informationKevin Dean Technology Strategist Education Southeast Microsoft Corporation
Kevin Dean Technology Strategist Education Southeast Microsoft Corporation Security Exploits History The Threat landscape today Microsoft Security Development Lifecycle State of Security today Trends in
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationStopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
More informationHow To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
More informationContact Centers Worldwide
A Contact Centers Worldwide Country Tel.no. Supported lang. Contact Center Albania Algeria 852 665 00 +46 10 71 66160 Angola 89900 +34 91 339 2121 (Port) and Portuguese +34 913394044 +34 913394023 (Por)
More informationHybrid Wide-Area Network Application-centric, agile and end-to-end
Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically
More informationSaheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
More informationSpyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
More informationQuick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
More informationHow we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
More informationSulfuric Acid 2013 World Market Outlook and Forecast up to 2017
Brochure More information from http://www.researchandmarkets.com/reports/2547547/ Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017 Description: Sulfuric Acid 2013 World Market Outlook and
More informationGovernance, Risk and Compliance Assessment
Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could
More informationDimension Data s Uptime Maintenance Service
Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are
More informationThe face of consistent global performance
Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls
More informationCreating A Culture of Security and Privacy in the Digital Age. Dave Welsh Microsoft Corporation dmwelsh@microsoft.com
Creating A Culture of Security and Privacy in the Digital Age Dave Welsh Microsoft Corporation dmwelsh@microsoft.com Situation Computers worldwide: 663 million1 Web users worldwide, 2004: 719,334,756,
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationFour steps to improving cloud security and compliance
white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and
More informationCisco Global Cloud Index Supplement: Cloud Readiness Regional Details
White Paper Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details What You Will Learn The Cisco Global Cloud Index is an ongoing effort to forecast the growth of global data center and
More informationList of tables. I. World Trade Developments
List of tables I. World Trade Developments 1. Overview Table I.1 Growth in the volume of world merchandise exports and production, 2010-2014 39 Table I.2 Growth in the volume of world merchandise trade
More informationAgenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE
Agenda Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE INTRACOM Group Core Companies MARKET POSITION A leading regional telecommunications systems manufacturer and solutions
More informationEndpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
More informationIntroducing GlobalStar Travel Management
Introducing GlobalStar Travel Management GlobalStar is a worldwide travel management company owned and managed by local entrepreneurs. In total over 80 market leading enterprises, representing over US$13
More informationRaveh Ravid & Co. CPA. November 2015
Raveh Ravid & Co. CPA November 2015 About Us Established in 1986 by Abir Raveh, CPA & Itzhak Ravid, CPA 6 Partners, 80 employees Located in Tel Aviv, Israel wide range of professional services highly experienced
More informationBitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
More informationU.S. Trade Overview, 2013
U.S. Trade Overview, 213 Stephanie Han & Natalie Soroka Trade and Economic Analysis Industry and Analysis Department of Commerce International Trade Administration October 214 Trade: A Vital Part of the
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationBangladesh Visa fees for foreign nationals
Bangladesh Visa fees for foreign nationals No. All fees in US $ 1. Afghanistan 5.00 5.00 10.00 2. Albania 2.00 2.00 3.00 3. Algeria 1.00 1.00 2.00 4. Angola 11.00 11.00 22.00 5. Argentina 21.00 21.00 42.00
More informationLogix5000 Clock Update Tool V2.00.36. 12/13/2005 Copyright 2005 Rockwell Automation Inc., All Rights Reserved. 1
Logix5000 Clock Update Tool V2.00.36. 1 Overview Logix5000 Clock Update Tool 1. 1. What is is it? it? 2. 2. How will it it help me? 3. 3. How do do I I use it? it? 4. 4. When can I I get get it? it? 2
More informationSenate Committee: Education and Employment. QUESTION ON NOTICE Budget Estimates 2015-2016
Senate Committee: Education and Employment QUESTION ON NOTICE Budget Estimates 2015-2016 Outcome: Higher Education Research and International Department of Education and Training Question No. SQ15-000549
More informationYTD 2015-27 CS AWARDS IN AMERICAS
YTD 2015-27 CS AWARDS IN AMERICAS Argentina Bolivia Brazil Frontline Customer Service Team of the Year, All Industries (Bronze) Customer Service Department of the Year, Airlines, Distribution & Transportation
More informationSecurity Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
More informationBahrain Telecom Pricing
Bahrain Telecom Pricing International Benchmarking December 2015 2015 Disclaimer This benchmarking report contains information collected by an independent consultant commissioned by the Telecommunications
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationBahrain Telecom Pricing International Benchmarking. April 2014
Bahrain Telecom Pricing International Benchmarking April 2014 2014 Contents of this report Report overview 3 PSTN basket results for GCC countries, including time series 4 Mobile basket results for GCC
More informationTechnical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
More informationHP Technology Services HP NonStop Server Support
Reference guide HP Technology Services HP NonStop Server Support HP Global NonStop Solution Center (GNSC) Table of contents Global NonStop Solution Center... 2 Product support for HP NonStop and Neoview
More informationKaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare. Comparative Analysis
Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare Table of Contents 1 A brief overview of functionality...3 2 General information...4 3 Installation on infected PC and treatment of active
More informationEnergy Briefing: Global Crude Oil Demand & Supply
Energy Briefing: Global Crude Oil Demand & Supply November 6, 215 Dr. Edward Yardeni 516-972-7683 eyardeni@ Debbie Johnson 48-664-1333 djohnson@ Please visit our sites at www. blog. thinking outside the
More informationWe d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please
latest thinking We d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please Enabling enterprise mobility with Microsoft System Center and cloud Enterprise mobility is no longer the domain
More informationGlobal Media Report. Global Industry Overview
Global Media Report 203 Global Industry Overview McKinsey & Company Global Media Report 203 McKinsey & Company s Global Media and Entertainment Practice Never before has an integrated view across the media
More informationopinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail
More informationHow do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?
As the world becomes a more competitive place, businesses need to respond at lightning speed to take advantage of new opportunities or avoid risks. To enable this, the data centre needs to be a dynamic
More informationIP Trading Solutions
In many mature financial organisations, middle-and back-office functions already collaborate via high-quality, well-integrated voice and video traffic. Their trading floors, on the other hand, still operate
More informationSybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical
More informationUnderstanding the 12 Requirements of PCI DSS
opinion piece Understanding the 12 Requirements of PCI DSS Practical steps to achieve and maintain compliance Regardless of whether you are a retailer, service provider or a bank, if you process any form
More informationIT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
More informationCisco Smart Care Service
Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a collaborative, comprehensive network wide service that enables your partner to deliver proactive network monitoring, health checkups,
More informationFall 2015 International Student Enrollment
Fall 2015 International Student Enrollment Prepared by The Office of International Affairs Nova Southeastern University Nova Southeastern University International Student Statistics Fall 2015 International
More informationManaged Service for Visual Communications
Managed Service for Visual Communications Managed Service for Visual Communications Videoconferencing can have multiple benefits in your organisation. It can help your employees be more productive and
More informationCisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
More informationTelephony Telephony a platform to connect, communicate and collaborate with confidence
Telephony a platform to connect, communicate and collaborate with confidence Your business needs reliable, flexible and secure communication tools to interact with your employees, customers and business
More informationThe Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *
The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost * There has been substantial consolidation among firms in many industries in countries around
More informationProtection for Mac and Linux computers: genuine need or nice to have?
Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent
More informationHow To Secure Your Business
security In our world and in our time, security is a term that places a tremendous responsibility on the people who claim it. You need to be certain that your security partner demonstrates the right values
More informationSpyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
More informationWindows Vista: Is it secure enough for business?
Windows Vista: Is it secure enough for business? Five years after the release of Windows XP, Microsoft s primary stated goal with Windows Vista has been to reduce security vulnerabilities and overall susceptibility
More informationContact Centre Integration Assessment
Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationConfiguring DHCP for ShoreTel IP Phones
Configuring DHCP for ShoreTel IP Phones Network Requirements and Preparation 3 Configuring DHCP for ShoreTel IP Phones The ShoreTel server provides the latest application software and configuration information
More informationDigital TV Research. http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample
Digital TV Research http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am -
More informationAxioma Risk Monitor Global Developed Markets 29 June 2016
Axioma Risk Monitor Global Developed Markets 29 June 2016 1. Global volatility hotspots 2. Global correlation hotspots www.axioma.com Greater than 1% rise over last week Greater than 1% fall over last
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationComposition of Premium in Life and Non-life Insurance Segments
2012 2nd International Conference on Computer and Software Modeling (ICCSM 2012) IPCSIT vol. 54 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V54.16 Composition of Premium in Life and
More informationHow To Get A New Phone System For Your Business
Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not
More informationJune 2012. Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise Regional Findings Americas (Latin and South America, Canada, U.S.A.) Europe, Africa, Middle East Asia
More informationApplication Security No Longer a Pipe Dream
opinion piece opinion piece Application Security No Longer a Pipe Dream Application Security No Longer a Pipe Dream Security professionals who find themselves struggling to chart a course through the application
More informationCarnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2010
Carnegie Mellon University Admissions Statistics for and Fall 2010 New International Students and Fall 2010 Undergraduate 208 16.1% Master's 799 61.7% Doctorate 177 13.7% Exchange 80 6.2% 31 2.4% Total
More informationMAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO
MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),
More informationINTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationHow To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
More informationSecurity and Internet Censorship
Security and Internet Censorship Computer Literacy 1 Lecture 24 13/11/2008 Topics Security Hacker Viruses Phishing Firewall Censorship of the Internet 2 Examples Hacking or Cracking Cracking = Subverting
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More information