Securing the endpoint and your data

Similar documents
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

End to End Security do Endpoint ao Datacenter

Symantec Endpoint Protection

UP L13: Leveraging the full protection of SEP 12.1.x

Secure Your Mobile Workplace

Symantec Endpoint Protection

Symantec Endpoint Protection

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Integrating MSS, SEP and NGFW to catch targeted APTs

Insight. Security Response. Deployment Best Practices

Symantec Endpoint Protection Datasheet

Symantec Endpoint Protection Analyzer Report

/Endpoint Security and More Rondi Jamison

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

You ll learn about our roadmap across the Symantec and gateway security offerings.

Getting Started with Symantec Endpoint Protection

Unified Security, ATP and more

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

W H I T E P A P E R : T E C H N I C AL

2012 Endpoint Security Best Practices Survey

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

On and off premises technologies Which is best for you?

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Better Together: Microsoft Office 365 & Symantec Office 365

End-user Security Analytics Strengthens Protection with ArcSight

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Perspectives on Cybersecurity in Healthcare June 2015

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

Symantec Endpoint Protection Getting Started Guide

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Proven LANDesk Solutions

Symantec Endpoint Protection

INFORMATION PROTECTED

Find the needle in the security haystack

IBM Endpoint Manager for Core Protection

McAfee Security Architectures for the Public Sector

Symantec Endpoint Protection Getting Started Guide

Extreme Networks Security Analytics G2 Vulnerability Manager

Small and Midsize Business Protection Guide

Symantec Mobile Security

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Symantec Protection Suite Small Business Edition

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Protecting the Infrastructure: Symantec Web Gateway

Trend Micro OfficeScan Best Practice Guide for Malware

Internet threats: steps to security for your small business

The Hillstone and Trend Micro Joint Solution

The Symantec Approach to Defeating Advanced Threats

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cisco Advanced Malware Protection for Endpoints

NetDefend Firewall UTM Services

Symantec Endpoint Protection

Introducing IBM s Advanced Threat Protection Platform

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cisco Advanced Malware Protection

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Symantec Endpoint Protection Getting Started Guide

What Do You Mean My Cloud Data Isn t Secure?

NetDefend Firewall UTM Services

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

ALERT LOGIC FOR HIPAA COMPLIANCE

WEBSENSE TRITON SOLUTIONS

Endpoint protection for physical and virtual desktops

IBM Security QRadar Vulnerability Manager

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Securing OS Legacy Systems Alexander Rau

Countering Insider Threats Jeremy Ho

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Sophos Endpoint Security and Control Help

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

IBM Security IBM Corporation IBM Corporation

Transcription:

#SymVisionEmea

#SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2

Safe harbor disclaimer Any information regarding pre-release Symantec offerings, future updates or other planned modifications is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec offerings should make their purchase decision based upon features that are currently available. 3

Agenda 1 2 3 Changing Threat Landscape Protecting Endpoints Today Protecting Data on Endpoints with Encryption 4

Increase in targeted attacks 2013 2012 +91% Increase in targeted attack campaigns Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 5

Targeted attack campaigns Email per campaign Recipient/campaign 2011 2012 2013 78 122 111 779 29 61 408 23 Campaigns 165 Duration of campaign 4 days 3 days 8.3 days Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 6

Protecting endpoints today 7

Symantec data analytics platform Raw features Big Data System Intelligence driven applications Examples: Downloads Web site visits Intrusion alerts Malware alerts Behaviors File appearance Crashes Symantec Data Analytics Platform 2 1 0 0 0 0 0 0 0 0 0 0 0 2.1 trillion rows of data 55,000 rows added every second File URL Crash Behavior Forms SONAR engine File Insight Scam Insight URL Insight Crash Ratings Intelligence 8

Symantec IS Security Intelligence 7 Billion File, URL & IP 1 Billion+ Devices Protected 2.5 Trillion Rows of Security 2B+ events logged daily Monitors Threats in 157+ countries Securing the Endpoint and Your Data Classifications Telemetry Capturing previously unseen threats and attack methods More visibility across devices creates better context and deeper insight Putting big data analytics to work for every end user Over 100,000 security alerts generated annually 200,000 daily code submissions 14 Data Centers World Wide 550 Threat Researchers SYMANTEC VISION SYMPOSIUM 2014 9

Security Technology and Response (STAR ) Layers of protection Reputation Network S TA R P R O T E C T I O N File Behavioral Repair 10

Star protection Network File Reputation Behavioral Repair Stops malware as it travels over the network and tries to take up residence on a system Protocol aware IPS Browser Protection Looks for and eradicates malware that has already taken up residence on a system Antivirus Engine Auto Protect Malheur Establishes information about entities e.g. websites, files, IP addresses to be used in effective security Domain Reputation File Reputation Looks at processes as they execute and uses malicious behaviors to indicate the presence of malware SONAR Behavioral Signatures Aggressive tools for hard to remove infections Boot to a clean OS Power Eraser uses aggressive heuristics Threat-specific tools 11

Network Threat Protection Reputation Network S T A R P R O T E C T I O N File Behavioral Repair 12

Network Threat Protection blocks todays most critical threats Protect Against Drive-by Downloads that install APTs Prevent Social Engineering Attacks Find Infected Systems with Post Infection Protection Prevent Social Media Attacks Protect Against Unpatched Vulnerabilities Hundreds of Millions of threats are stopped with this technology 13

Reputation Network S T A R P R O T E C T I O N File Behavioral Repair Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 14

File-based protection Malheur - Increased use of a new Artificial Intelligence engine File Extracts 100 s of attributes from each file Looks for suspicious combinations of attributes Endpoint uses predictive classifiers or rules derived from them and corroborates with leverages Insight Reputation Backend uses complex attributes to identify malware and releases definitions for them These heuristics can detect many variants and are specifically effective at polymorphic malware families Benefits Proactive catches new 0-day threats Proactive blocks threats before they have a chance to run Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 15

Reputation Network S T A R P R O T E C T I O N File Behavioral Repair Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 16

Reputation-based Security Insight - Reputation in a Nutshell Reputation Our Insight reputation system uses the wisdom of our hundreds of millions of users to automatically derive highly accurate safety ratings for every file on the internet It is an entirely different approach to that requires no traditional virus signatures Data Collection Opt in program to collect anonymous file usage data File Attribute Database World s largest nexus of data on executable content Reputation Engine Patent pending algorithms to compute safety reputations File Safety Reputations A measure of how good or bad a file is > 210 Million Contributing Users >3 B unique program files, growing continuously Updates every rating every 4 6 hours For all files, both good and bad It can accurately identify threats even if just a single Symantec user encounters them and it blocks them without any signatures Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 17 17

Superior Protection Our reputation system improves protection in three ways: It blocks entirely new malware that traditional fingerprints miss It ratchets up the resolution of our heuristics and behavior blocking Changes the game, killing mutated malware once and for all Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 18

Reputation Network S T A R P R O T E C T I O N File Behavioral Repair Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 19

SONAR Behavioral Protection Build an engine that ignores what the threat LOOKS LIKE But detects threats based on what the threat DOES Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 20 20

SONAR Behavioral Protection SONAR (5 th Generation) Behavioral Protection New Behavioral-detection engine with significantly improved effectiveness Same Enterprise UI but totally redesigned behavioral protection under the hood Now with 1390 Behaviors Proactively detects new threats based entirely on Behaviors Day-0 detection for Hydraq/Aurora and StuxNet Sophisticated Rootkits like TidServ Non-process Based Threats (NPT s) are stopped Behavioral Rules-based Customers get up-to-date protection automatically via Liveupdate Coverage for APT like Shamoon PoisonIvy Securing the Endpoint and Your Data High-Performance real-time engine Behaviors are monitored and assessed as they happen Sandboxing to insulate system from threats No measurable impact on performance SYMANTEC VISION SYMPOSIUM 2014 21

Reputation Network S T A R P R O T E C T I O N File Behavioral Repair Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 22

Repair technology Additional options to help fix the problem: Repair 1. Symantec Power Eraser standalone & integrated 2. Bootable Recovery Tool A bootable recovery disk with full detection and repair capabilities 3. Threat Specific Tools Fix tools created for specific threats available from Security Response Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 23

Roadmap futures and near term 24

Near-term roadmap Enhanced Protection Improved Performance Extended Platform Support Ease of Use 25

Improved performance Client performance and content deltas Reduce disk space on SEPM by 85-95% Allow customers to cache more revisions -Reduces the number of full definitions delivered Improve boot time by more than 10% 26

Extended platform support Improved management of endpoints Linux client management -Single client package fully managed by SEPM -Auto update -Auto-compile kernels during install Mac client management -Client remote deployment -Device control -Firewall 27

IT Analytics 28

Enhanced protection Against advanced threats Integrated Power Eraser -Aggressively scan an infected endpoint to locate APTs -Reduce time to clean infected systems -Mitigate false positive 29

Customer participation opportunities SEP 12.1.5 Program Just released Linux & Mac Client Management Client Performance Enhancements Better Control of Bandwidth to SEPM Scan Throttling for Virtualization SEP 12.1.6 Customer Previews Q1, 2015 Embedded client updates, VDI System Lockdown enhancements Symantec Endpoint Security : ATP integration 30

Encryption 31

Causes of breaches Top Causes of Data Breach, 2013 Source: Symantec Hackers Accidentally Made Public Theft or Loss of Computer or Drive Insider Theft Unknown Fraud 6% 2% 2% 34% 29% 27% TOTAL Number of Incidents 87 72 69 15 6 4 253 Average number of identities exposed per data breach for hacking incidents was approximately 4.7 million Theft or loss + accidental breaches accounted for 56% of data breach incidents 32

Symantec encryption portfolio Endpoint Encryption Email Encryption File & Folder Encryption Renders data-at-rest inaccessible to unauthorized parties on devices such as laptops, desktops and removable media Protects email in transit and at-rest from unauthorized parties Protects individual files in transit and at-rest from unauthorized parties, allowing secure collaboration Endpoint Encryption Management Server Encryption Management Server Manage individual and group keys, create and set up encryption policies and report on encryption status 33

Symantec endpoint encryption Disk Encryption Removable Media Encryption - Also known as Full-Disk or Whole Disk Encryption - Used on laptops and desktops Additional benefits such as: Initial encryption happens in the background allowing users to keep working like normal Self-Recovery capabilities as well as Help Desk recovery Single Sign-On capability No end user interaction required - Used on USBs, portable hard drives, SD cards.. 34

Encryption strategy Enable customers to seamlessly protect sensitive information, wherever it resides, with Symantec Encryption E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N E N C R Y P T I O N Single Endpoint Encryption Offering 3rd Party Encryption Management Encryption Center of Excellence Next Generation Encryption Securing the Endpoint and Your Data SYMANTEC VISION SYMPOSIUM 2014 35 35

#SymVisionEmea Thank you! Piero DePaoli Marcus Brownell Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Securing the Endpoint and Your Data 36