How To Test For Security Protection
|
|
|
- Ophelia Moore
- 5 years ago
- Views:
Transcription
1 False Sense of Security: New Anti-Virus Testing Methodologies are Critical to Educate Customers Charlotte Dunlap Independent Security Analyst
2 Charlotte Dunlap is an independent security analyst and regular columnist for Forbes.com, covering primarily secure messaging, threat management, and hosted services. She has two decades of experience as a senior industry analyst and high-tech journalist. Charlotte has worked for research firms including Current Analysis and has written for leading industry publications including Dark Reading, Information Week, and CNET, and spent an eight-year stint at Computer Reseller News as a senior editor. She also served as European bureau chief for news service Edittech International, based in London. Introduction Traditional methodologies used to test the effectiveness of anti-virus solutions are no longer adequate in providing an accurate gauge of a product s performance. Methods that worked in the past designed to test for worms and viruses in a stagnant environment unconnected to the Internet are incapable of assessing protection against the new forms of malware that are now prevalent. The old methods are often based on a static list of threats, and the vast majority of malware is not even included in that list. The industry is doing customers a disservice by stamping a lab certification on their boxes, indicating they have been through rigorous testing procedures when in fact they have not. The static testing methods are far behind the reality of rapidly evolving threats from the Internet. What is needed is new, Internet-savvy methodology to test the efficacy of anti-virus security. The new methodology should reflect the way current threats are propagating under real-world scenarios. This paper will discuss traditional anti-virus product testing methods and describe how they fall short in providing customers with the most accurate insight into how well security products fight today s malware. We discuss the realities of today s testing environment, including the limited scope of testing among the major testing bodies, the increasingly sophisticated threat landscape that demands new realtime tests, and the economic realities of changing current testing methodologies. Why Existing Test Methodologies are Broken The debate surrounding the use of the WildList or the Virus Bulletin list as a threat protection testing methodology has been underway for several years, but the need to update the industry s current testing methods has becoming more urgent in light of the way threats are now spreading. Traditionally, test labs primary method of testing anti-virus solutions has been the use of a list of threats, compiled primarily by security vendors. The list is used as the foundation
3 for testing and certifications by labs including ICSA, Westcoast Labs, Virus Bulletin, AV- Comparatives and others. In the past, anti-virus vendors and third-party testers used the industry-standard list to compare the effectiveness of their software. Labs test multiple products by security vendors against this list on a regular basis (as often as monthly) and issue a pass/fail mark. This approach was fine for testing past threats that included viruses and worms. However, threats have evolved. Threats are now monetarily motivated, authored by cyber-criminals looking to steal data for profit, and delivered using the web in order to keep malware under the radar. Threat Evolution: Exploiting the Newest, Most Popular and Least Secure Delivery Methods Modern Malware Characteristics Low Visibility. The last thing criminals want is for their malware to make the news and set off alarms to law enforcement, so cyber-criminals are looking to cause a limited number of infections using one type of malware. Quiet Damage. There has been a clear shift from headline-making worms and viruses to Trojans, which don t automatically spread and do their damage quietly, stealing data without disrupting other work. Rapid Evolution. Of the tens of thousands of malicious programs in the wild, each piece of malware detected is constantly evolving, and may have hundreds or even thousands of variants associated with it. This is why the industry is now documenting approximately 50,000 new malware samples per day. Criminals are constantly pushing new forms of malware through the Internet to evade advanced threat protection solutions. Short Lifespans. The average lifespan of a typical piece of malicious software is one to two days, so malware may live anywhere from a couple of minutes or even seconds, to several days, usually depending on the expertise of the author.
4 Self Updating. The discovery of the Conficker worm in November 2008 marked a change in malware capability. Written by professional criminals, the worm spreads to other machines without the need for human interaction. But Conficker as well was able to update itself via the Internet, and did this several times, like all modern malware. The WildList only reflects worms, viruses and some variants of bots which contain self-replicating malware. And yet this collection represents only a small subset of today s threats about 5 percent to 10 percent, because self-replicating malware is not the way people get infected anymore. In response to these more sophisticated threats, vendors have developed advanced security technologies aimed at tackling malware such as Trojan horses and botnets. Yet testing methods do not take into consideration new threat management technologies, like blocking threats at their source, the Internet, and are still focused on file-based technologies. The WildList does not include Trojans, rootkits, keyloggers, and spyware. The list contained 922 viruses in August 2009, and TrendLabs reports a new piece of malware is now created every 1.5 seconds. Because of the changing nature of the threats, the industry is sorely lacking in adequate product testing services that help customers make informed decisions about security management. More often, confused security managers are hesitant to make new purchases without having access to up-to-date standardized efficacy benchmark tests. For users to have relevant product information and for security industry to prove its relevance and continue its steady market growth, more real-world testing is required. This issue needs to be a priority to the security industry, especially considering the fact that anti-virus software community competes on its ability to respond quickly to new virus and malware threats. Perhaps most worrisome of all, the broken testing system gives users have a false sense of security. Research indicates that organizations are pinning unrealistic expectations on that prominent checkmark stamped on their anti-virus boxes. Of 499 respondents surveyed by testing body NSS Labs (October 2009), half believed their endpoint anti-virus software would protect them from malware 100 percent of the time. Another 10 percent thought their software would protect them 99 percent of the time. However, this same testing body in recent real-time testing of AV solutions found that for zero hour threats, leading vendors protected against malware 26 percent to 70 percent of the time and in subsequent days provided overall protection against malware 67 percent to 96 percent of the time.
5 Current State of the Testing Market Indeed, vendors and testing bodies all agree the WildList, and other collections like it, only provides a baseline of measurement for security protection. Security experts from around the globe gather regularly to debate the issue and discuss solutions. AMTSO (Anti-Malware Testing Standards Organization) is the most prominent consortium created in 2008 to develop best practices and standards around improving anti-malware testing methodologies. The issue seems straight-forward. The WildList and the VB100 list are not timely just by the nature of their research-gathering techniques. For a new threat to be added, a minimum of two independent reporters must file the same threat information, and follow a process which delays publishing by as much as weeks and even months. Testing bodies should simply do away with this method and conduct live, continuous Internetbased tests as a way to measure the quality of a product. But it s not so simple. Replication of live testing is not easy. The difficulty in setting up new methodologies that involve dynamic lab tests is that by the mere nature of the Internet, the tests cannot be reproduced, and therefore, it is difficult to prove why one product may have passed or failed a test. It is difficult (if not impossible) to ensure competitive products receive the exact same tests. (Currently the world s largest international standards body ISO, among others, requires that a test be repeatable and reproducible.) Malware is geographically sensitive. A testing machine may be sitting on a US domain and it will gather different forms of malware. The Conficker virus infecting machines in various countries had more damning effects in some parts of the world vs. others, depending on the country in which the computer resided. New dynamic testing methodology is resource-intensive, and therefore very expensive. It is more affordable to have 20 products scan half a million samples than to have the same products scan 50 threats using dynamic testing. That s because real-time testing over the Internet is difficult to automate and requires hands-on testers to move the tests along. For example, if the product presents pop-up queries, someone needs to be on hand to respond. Need to understand the timing of threat interception by a security product. Risks and impact of threats differ depending on where the security product intercepts it before it reached the machine, whether it executed, or was detected after it executed. Real-time testing requires testers to understand this measure of potential impact and have a granular expertise while static testing simply determines whether a product detected a threat or not. Testing bodies are very much aware of challenges of dynamic tests. However, they are keen to solve the problem and make dynamic tests possible or they risk becoming obsolete.
6 Today s Most Accurate Tests NSS Labs launched its Live Testing methodology for anti-virus solutions in the summer of The labs concurrently test anti-virus products and are connected to the Internet. They examined tens of thousands of malware sites and found as many as 350 new malware per day during a 17-day testing period in July. NSS is leading the pack in conducting real-time, concurrent tests which provide an apples-to-apples comparison of threat protection by allowing competing products to hit the same URLs at the same time. Westcoast Labs has also begun offering a dynamic version of its Checkmark Certification, recently announcing its first security vendor to take advantage of the new services. ICSA is currently not conducting any real-time testing. However, ICSA and others such as Virus Bulletin state they will be evolving their certification practices in coming months to include real-time testing and/or testing against today s threats. These alterations include testing against Trojan horse programs to mirror the threats encountered in the wild by enterprise users and consumers more accurately. Key Testing Principles So what is a comprehensive testing formula based on current threat conditions? A number of criteria make up the most effective testing guidelines, and while many in the security-testing sector are planning major upgrades in their methodology, labs are at various stages in applying the methodologies. Some key principles of new testing methodology should include: Real-time or Dynamic Testing: Computers must field live threats in order to demonstrate the level of zero-day and ongoing protection provided by products. A more holistic approach in testing AV products will better reflect a corporate user s daily and varied habits. Testing needs to replicate real-world behavior such as: o visiting websites o downloading content o simulating attacks such as social engineering o exposing vulnerabilities that result in drive-by downloads o executing malicious files.. Ideally, the dynamic testing process will be automated, visit a variety of web sites, download content, and execute malicious files. Lastly, the test should take into account the number of false positives a product triggers. The goal would be to determine when a threat is blocked: from the source URL, or IP address, when download is attempted, or on execution. The best approach is to block the threat earlier, at its source, or download, rather than execution. Repeatability and Reproducibility: Variations of malicious software can be generated in seconds, making it difficult to test multiple products against the
7 same exact malware, although some testers are trying to get around this dilemma by conducting concurrent tests. If tests cannot be exactly replicated, what steps can be taken? o Testers must be able to provide documentation to verify details of how a product reacted to specific malware. This is a sensitive issue because some test labs have begun to conduct dynamic testing and vendors have disputed claims that its technology missed particular malware. o Testers must provide a consistent reporting system, such as adequate log records, to support claims of missed threat detection.. Broad and Diverse Sampling: Sample contributions by vendors and testers need to include a broad spectrum of various classes of threats to reflect a comprehensive view of Internet malware, including threats that are relevant to specific regions and various markets. For example, it may not be fair to some vendors if sampling emphasizes a vertical such as banking spyware, or if it does not represent various geographic regions. Time to Protect: In addition to measuring the ability of vendor products to protect against threats known to the testers, measurements of vendor response times to previously unseen threats are needed. By simultaneously exposing vendor products to new, previously unseen threats and then repeating the exposure over time, one can measure how long it takes the vendor products to protect against them. Early measurements of this time to protect indicate that most vendor products respond in the range of one hour to one week. This information translates directly to how well customers are protected and provides a highly significant discrimination in performance. What Customers Can Do Customers should understand that current static testing methodologies are inadequately measuring protection because threats are evolving faster, spreading quietly, and have different goals than the world in which these tests were designed. To understand a product s real-world protection capability more accurately, customers can take the following steps: o o o o Look beyond the checkmarks and certification such as ICSA, Virus Bulletin and others not based on live testing. They will not accurately predict a product s protection from current and rapidly evolving threats. Evaluate products based on Internet-savvy tests such as NSS Labs Live Tests and Westcoast Labs dynamic Checkmark Certification. Ask testing bodies to move from static testing to more realistic, live testing methods. Check for independent tests, not those commissioned by the company. NSS Labs and soon, AV-test.org provides well documented, independent testing.
8 Summary Current testing methodologies are no longer relevant to today s threat landscape, and test results or pass/fail stamps do not offer corporate users enough intelligence to make the best purchasing decisions. The testing boards <state whom, specifically> view the state of the testing market as being so broken that certification stamps are no longer meaningful to the industry. While AMTSO has been formed and other steps to strengthen testing are being taken, the industry will need to agree on a set of key testing principles very quickly. Testing bodies will need to revamp their labs significantly to move from static to real-time, dynamic testing processes. If this issue does not move to the forefront of vendor and testing body business strategies in 2010, growth in the threat management market will stall as customers become disenchanted with the industry s ability to guide and educate them about how well their solutions actually protect them. This report is sponsored by Trend Micro, Inc. Learn more at by Trend Micro. All rights reserved., Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
Kaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Trend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Building a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
NetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
NetDefend Firewall UTM Services
Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY
Microsoft Security Intelligence Report volume 7 (January through June 2009)
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
Module 5: Analytical Writing
Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop
How To Understand What A Virus Is And How To Protect Yourself From A Virus
Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?
Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
A New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Endpoint Security: Moving Beyond AV
Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Understanding Anti-Malware Research and Response at Microsoft. An introduction to the Malware Protection Center
Understanding Anti-Malware Research and Response at Microsoft An introduction to the Malware Protection Center Understanding Anti-Malware Research and Response at Microsoft An introduction to the Microsoft
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
ENDPOINT PROTECTION Understanding the Challenges and Evaluating a Solution
ENDPOINT PROTECTION Understanding the Challenges and Evaluating a Solution A Paper Sponsored by Microsoft Author: Martha Vazquez, Network Security Analyst TABLE OF CONTENTS TABLE OF CONTENTS Introduction
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Introduction (Contd )
Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
