Cloud Services Prevent Zero-day and Targeted Attacks



Similar documents
Check Point: Sandblast Zero-Day protection

Uncover security risks on your enterprise network

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

Fighting Advanced Threats

Data Center security trends

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

The Hillstone and Trend Micro Joint Solution

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Security Administration R77

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Cisco Advanced Malware Protection for Endpoints

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

How Attackers are Targeting Your Mobile Devices. Wade Williamson

You ll learn about our roadmap across the Symantec and gateway security offerings.

Unified Security, ATP and more

NetDefend Firewall UTM Services

Modular Network Security. Tyler Carter, McAfee Network Security

TRITON APX. Websense TRITON APX

IBM Security re-defines enterprise endpoint protection against advanced malware

WildFire. Preparing for Modern Network Attacks

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Total Defense Endpoint Premium r12

Next Generation IPS and Reputation Services

OPC & Security Agenda

CHECK POINT NEXT GENERATION ZERO-DAY PROTECTION

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Breaking the Cyber Attack Lifecycle

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Stopping zombies, botnets and other - and web-borne threats

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Comprehensive Advanced Threat Defense

ONE STEP AHEAD of hackers, cybersecurity, threats and the competition

2015 Miercom Next Generation Firewall Solution Testing: Performance, Compliance and Advantages

Unknown threats in Sweden. Study publication August 27, 2014

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Protecting Your Organisation from Targeted Cyber Intrusion

Security Services. 30 years of experience in IT business

Security A to Z the most important terms

WHITE PAPER. Understanding How File Size Affects Malware Detection

IBM Security Strategy

Anti-exploit tools: The next wave of enterprise security

WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System

Agenda , Palo Alto Networks. Confidential and Proprietary.

NetDefend Firewall UTM Services

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

13 Ways Through A Firewall What you don t know will hurt you

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Malware, Zero Day and Advanced Attack Protection Analysis Zscaler Internet Security and FireEye Web MPS

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

End to End Security do Endpoint ao Datacenter

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

ENABLING FAST RESPONSES THREAT MONITORING

Stop advanced targeted attacks, identify high risk users and control Insider Threats

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Attacks from the Inside

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Automated Protection on UCS with Trend Micro Deep Security

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

isheriff CLOUD SECURITY

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Endpoint Security Management

FortiGuard Security Services

Securing OS Legacy Systems Alexander Rau

Advanced Endpoint Protection

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Simple security is better security Or: How complexity became the biggest security threat

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Top Ten Cyber Threats

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Cloud App Security. Tiberio Molino Sales Engineer

Secure Your Mobile Workplace

WildFire Cloud File Analysis

Transcription:

Cloud Services Prevent Zero-day and Targeted Attacks

WOULD YOU OPEN THIS ATTACHMENT? 2

TARGETED ATTACKS BEGIN WITH ZERO-DAY EXPLOITS Duqu Worm Causing Collateral Damage in a Silent Cyber-War Worm exploiting zero-day vulnerabilities in a Word document 3

Exploiting Zero-day vulnerabilities New vulnerabilities Countless new variants nearly 200,000 new malware samples appear around the world each day - net-security.org, June 2013 4

Check Point Multi-Layered Threat Prevention IPS Antivirus Anti-Bot Stops exploits of known vulnerabilities WHAT ABOUT Block download of malware infested files NEW ATTACKS? Detect and prevent bot damage 5

Check Point introducing Check Point ThreatCloud Emulation Service PREVENTION OF ZERO-DAY ATTACKS! 6

INSPECT INSPECT FILE EMULATE SHARE PREVENT Stop undiscovered attacks with Check Point Threat Emulation 7

Identify files in email attachments and downloads over the web Requires no infrastructure change or adding devices INSPECT Send file to virtual sandbox Exe files, PDF and Office documents 8

EMULATE Emulating Multi OS environments WIN 7, 8, XP & user customized Open file and monitor abnormal behavior Monitored behavior: file system system registry network connections system processes 9

Emulation @ Work A STANDARD CV? 10

Emulation @ Work 11

Emulation @ Work Abnormal file activity Naive processes created Tampered system registry Remote Connection to Command & Control Sites File System Activity System Registry System Processes Network Connections 12

PREVENT Security Gateway Inline stopping of malicious files on any gateway 13

SHARE Immediate update of all gateways 14

INSPECT FILE EMULATE SHARE PREVENT Stop undiscovered attacks with ThreatCloud Emulation Service 15

Real Life Example Prevented 140 phishing emails targeting 4 customers in 2 days! New exploit variant of vulnerability (CVE-2012-0158) Installs a bot agent Opens network ports for bot communication Steals user credentials 16

Most Accurate and Fastest Prevention Zero false-positive in document emulation Optimize analysis by inspecting only files at risk THREAT EMULATION with ongoing innovation 17

ThreatCloud Emulation Service Branch Headquarters ThreatCloud Emulation Service Branch Agent for Exchange Server Single Global Solution For the entire organization 18

ThreatCloud Emulation Service Advantages Cloud based service works with your existing infrastructure. No need to install new equipment Control expenses with manageable lower monthly costs Organizations can choose from 5 subscription options for global file inspections, starting at 10,000 files per month and up 19

Anyone can submit files for THREAT EMULATION threats@checkpoint.com threatemulation.checkpoint.com 20

Check Point Threat Prevention Solution Multi-Layered Protection Against all Incoming Cyber Threats 21

Top Reasons customers pick Check Point Threat Emulation A Complete Threat Prevention Solution for Known and Unknown threats works with your existing infrastructure -- No need to install any new equipment 22

Other Threat Emulation Solutions Miss malicious files hiding in encrypted communication Require multiple appliances per each network Cannot prevent threats from infecting the organization. Emulating Win XP only leaves Windows 7 attacks vulnerable Don t have a protection against unknown threats 23

Summary Check Point Prevents Zero-day Attacks Stopping undiscovered malware Prevent infections from malicious documents & executables Simple deployment requires no Infrastructure change Part of Check Point multi-layered Threat Prevention 24

Thank You