WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security



Similar documents
Endpoint Security and the Case For Automated Sandboxing

Host-based Intrusion Prevention System (HIPS)

Anti-exploit tools: The next wave of enterprise security

Cyber Essentials Scheme

Endpoint protection for physical and virtual desktops

Global Corporate IT Security Risks: 2013

What Do You Mean My Cloud Data Isn t Secure?

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Open an attachment and bring down your network?

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Internet threats: steps to security for your small business

What you need to know to keep your computer safe on the Internet

Symantec Endpoint Protection

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Building a Business Case:

KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

2012 Endpoint Security Best Practices Survey

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Five Trends to Track in E-Commerce Fraud

Mobile Devices and Malicious Code Attack Prevention

Common Cyber Threats. Common cyber threats include:

Network Security and the Small Business

Mobile Device Management

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

MOBILE MALWARE REPORT

Persistence Mechanisms as Indicators of Compromise

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Total Defense Endpoint Premium r12

24/7 Visibility into Advanced Malware on Networks and Endpoints

The Four-Step Guide to Understanding Cyber Risk

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Endpoint protection for physical and virtual desktops

Automated Protection on UCS with Trend Micro Deep Security

Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

End to End Security do Endpoint ao Datacenter

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

IBM Endpoint Manager for Core Protection

Fighting Advanced Threats

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Comodo Mobile Security for Android Software Version 3.0

Secure Your Mobile Workplace

Introduction (Contd )

Deploying Firewalls Throughout Your Organization

McAfee Total Protection Reduce the Complexity of Managing Security

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

A Case for Managed Security

Cyber Security Awareness. Internet Safety Intro.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Kaspersky Security Network

Cyber Security Awareness

Protecting personally identifiable information: What data is at risk and what you can do about it

ZNetLive Malware Monitoring

Defending Against. Phishing Attacks

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

10 Smart Ideas for. Keeping Data Safe. From Hackers

ANDRA ZAHARIA MARCOM MANAGER

Integrated Protection for Systems. João Batista Territory Manager

Sophistication of attacks will keep improving, especially APT and zero-day exploits

The Key to Secure Online Financial Transactions

You ll learn about our roadmap across the Symantec and gateway security offerings.

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Quick Heal Exchange Protection 4.0

... Mobile App Reputation Services THE RADICATI GROUP, INC.

Cyber Security Awareness

Top five strategies for combating modern threats Is anti-virus dead?

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Securing the endpoint and your data

Malware & Botnets. Botnets

Network Incident Report

National Cyber Security Month 2015: Daily Security Awareness Tips

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Symantec Endpoint Protection Datasheet

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Transcription:

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers are working feverishly, attacking both large and mid-sized companies across every industry and region, writing malicious code to exploit your website and computer network. Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint Every computer, laptop, tablet and mobile phone connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other malicious software all of it designed to either disrupt your operations or gain access to proprietary data and information. Yet despite the constant threat, a 2013 survey by The Small Business Authority with a portfolio of over 100,000 members reveals that the majority of business owners are unaware of their website s security with sixty percent not concerned about vulnerabilities. According to Barry Sloane the organization s President and CEO, Despite the rise of cyberattacks, there is an air of complacency with independent owners thinking it will not happen to them even though organizations experiencing such an attack run the risk of decimation. And it s not just small businesses that are under threat. In 2012, the social networking site LinkedIn was breached with more than six million customer passwords stolen then posted to an online hacker s forum for all to see. Similar incidents have occurred at the CBS music site Last.fm as well as the online dating site eharmony. Global Payments, a leading payments processing firm, revealed that expenses associated with the theft of an estimated 1.4 million of its payment cards was $84.4 million. A 2012 report places the average global cost for computer security breaches at all-time high of $136 per record. Examples of stolen information include payment transactions, employee records, social security numbers, financial data and proprietary research. Add to this the loss of reputation with customers, prospects and business partners and

it s easy to see why endpoint security has no longer become an option but a front-line priority. Mobile Security and the Rise of BYOD The average mobile security incident costs over $100,000 with many running in excess of $500,000 International Data Corporation (IDC) estimates that about half the US population owns smartphones, with the number of users expected to reach 181.4 million in 2013 and climb to 222.4 million in the coming four years. Many of those phones are used by employees to connect to corporate networks. Most of those connections are unmanaged and unsecure. The phenomenon of using your personal smartphone for business purposes is known as Bring Your Own Device or more popularly, BYOD. With so many employees accessing their corporate networks through endpoints such as smartphones and other mobile devices, it s no surprise that the majority of businesses had a mobile security incident in the past year. A report by Dimensional Research reveals that the average mobile security incident costs over $100,000 with many running in excess of $500,000. The rising rate of incidents is due to the fact that mobile security continues to remain unmanaged. 67% of firms surveyed allow personal mobile devices to connect to their networks. 88% of those devices are used to access corporate email. And 53% of those devices have customer data stored on them. Companies that allow their employees to utilize personal mobile devices say the number of devices connecting to corporate networks is growing. Most estimate they have more than five times as many personal mobile devices connecting to their corporate networks than they had two years ago. Nearly all report that they ve experienced problems implementing BYOD policies with securing corporate information as their greatest challenge.

Zero-Day Attacks & the Vulnerability Window A zero-day attack targets a previously unknown vulnerability in a computer application. Because it occurs on the first day of awareness, developers have had zero time to address the problem. It s impossible for a blacklist to be up-todate 100% of the time for 100% of the threats Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are often a primary target because of their widespread distribution and usage. Attackers can also send e-mail attachments which exploit vulnerabilities in the application opening the attachment. Vulnerabilities discovered by hackers will be kept secret for as long as possible and will circulate only through the ranks of hackers until the software or security companies become aware of the vulnerability or the attack targeting it. Antivirus systems use a file called a blacklist to prevent such attacks by determining which programs are safe to run. The problem is that a blacklist requires that a threat has already been identified, diagnosed and the antivirus system s blacklist file updated. Given the unidentified nature of a zero-day attack, it s impossible for a blacklist to be up-to-date 100% of the time for 100% of the threats. What this means is that no protection can be complete unless it addresses the gray area where a program is not on a blacklist as a known threat but also not on a whitelist as confirmed safe. The Case for Sandboxing A sandbox enables you to safely run suspected programs in a virtual environment. By sandboxing a program, you prevent it from making any permanent changes to your files or system. If the program turns out to be malicious, no harm is done.

Sandboxing is a vehicle for coping with zero day attacks that take advantage of unknown security holes in web software such as Adobe Flash, Internet Explorer and Java. Security relying on blacklists cannot protect you against these threats because the threats have not yet been identified and diagnosed. A sandbox can. If an exploit downloads malicious software while in a sandbox it will be isolated and unable to spread Running suspicious applications in a sandbox provides protection that a blacklist cannot. If an exploit downloads malicious software while in a sandbox it will be isolated and unable to spread. Not all Sandboxes are Created Equal Sandboxes can be divided into two categories: standalone solutions and those integrated into a security system. A standalone sandbox requires that the user select the programs to run in the sandbox. This type of solution is popular with companies that want to segregate high risk software such as Internet browsers. But it does not address the problem of unknown threats. Security systems that utilize sandboxes provide an additional layer of protection by incorporating antivirus scanning to spot potential threats then place them in the sandbox. Antivirus scanners deal with unknown threats by leveraging heuristics, a process that analyzes a program s behavior as well as similarities with known viruses. If a program is considered dangerous, it is segregated and run safely in the virtual sandbox. Heuristics work well but still fall short of being able to guarantee 100% protection. Like a blacklist, they must first detect a threat in order to deal with it and there will always be some percentage of threats that cannot be identified by a scanner.

Why Default Deny is the Only Guaranteed Solution Comodo s Detection+ is the only antivirus solution that guarantees your computer will not be harmed by a virus. Detection+ is a Host-Based Intrusion Protection Solution (HIPS) that incorporates a Default Deny strategy to restrict the access of all unknown applications to important files, folders, settings and the Windows Registry. Default Deny closes the hole that other antivirus systems leave open thereby eliminating the risk of unknown threats Default Deny refuses all files permission to install or execute outside of its virtual sandbox except when specifically allowed by the user or when the file appears on Comodo's whitelist. The whitelist identifies binaries that are known to be safe, such as signed code. The benefit of Default Deny is that it closes the hole that other antivirus systems leave open thereby eliminating the risk of unknown threats. Where other antivirus solutions are limited to protecting you against files they are able to definitively identify as dangerous, Comodo s Default Deny is the only strategy that protects you against any file not fully confirmed as safe. Default Deny authenticates every executable and process running on your computer and prevents them from taking actions that could compromise or harm your files Equally important, Default Deny enables you to access and work with the files as they execute within the sandbox s virtual environment. The result is total guaranteed protection without the loss of time, money or productivity.