ONE STEP AHEAD of hackers, cybersecurity, threats and the competition Thomas Werner Threat Prevention Security Engineer CER & Nordics 2015 Check 2015 Point Check Software Point Software Technologies Ltd. Ltd. 1
01 TODAY 2015 Check Point Software Technologies Ltd. 2
An Ever-Changing Threat Landscape Every year threats are becoming MORE SOPHISTICATED and MORE FREQUENT The signature gap grows 100,000+ malware variants daily 2014 1,300 known viruses 1997 50,000 known viruses VIRUSES AND WORMS 2004 ADWARE AND SPYWARE 2007 DDOS APTS 2010 RANSOMWARE HACTIVISM STATE SPONSORED INDUSTRIAL ESPIONAGE NEXT GEN APTS (MASS APT TOOLS) UTILIZING WEB INFRASTRUCTURES (DWS) 2015 Check Point Software Technologies Ltd. 3
How dangerous is it? Source: http://www.rp-online.de/nrw/staedte/neuss/neuss-computer-virus-legt-das-lukaskrankenhaus-lahm-aid-1.5760705 Source: http://www.heise.de/security/meldung/krypto-trojaner-locky-wuetet-in-deutschland-ueber-5000-infektionen-pro-stunde-3111774.html 2015 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals
Why? 62 Prozent der Exploits sind Ransomware, also Erpressungs-Trojaner die Dateien auf dem Zielsystem verschlüsseln. Wer seine Daten zurück haben möchte, muss zahlen, in der Regel über Krypto-Währungen. Laut Symantec zahlen knapp 3 Prozent der Ransomware- Opfer tatsächlich und sind dann im Schnitt 300 US-Dollar ärmer. Bei den in den 13 Stunden geschätzten 3.600 Opfern, hochgerechnet auf die 147 Proxys bei Limestone, ergäbe das mehr als 31.000 US-Dollar (rund 28.000 Euro) an einem einzigen Tag. Quelle: http://www.heise.de/newsticker/meldung/exploit-kit-angler-macht-millionen-mit-erpressungs-trojanern-2839287.html 2015 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals
02 MULTI-LAYERED THREAT PREVENTION 2015 Check Point Software Technologies Ltd. 6
Check Point Closes the Gaps with Sandblast IPS, ANTI-VIRUS & ANTI-BOT CATCHES KNOWN OR OLD MALWARE Of known malware, 71 in 1000 are not caught OS- AND CPU-LEVEL ZERO-DAY PROTECTION THREAT EXTRACTION DETECTS NEW OR UNKNOWN MALWARE With both OS- and CPU-level prevention COMPLETE THREAT REMOVAL Reconstructs and delivers malware-free documents 2015 Check Point Software Technologies Ltd. 7
03 SANDBLAST OS- and CPU Level Sandboxing 2015 Check Point Software Technologies Ltd. 8
Check Point Threat Emulation PREVENTS Undiscovered Attacks INSPECT FILE EMULATE TURN TO KNOWN PREVENT 2015 Check Point Software Technologies Ltd. 9
Identifying Zero-Days At The Exploit Phase with CPU LEVEL DETECTION Thousands VULNERABILITY Only a Handful EXPLOIT CPU Level Sandboxing SHELLCODE EVASION CODE Millions MALWARE OS Level Sandboxing 2015 Check Point Software Technologies Ltd. 10
Internet Security Gateway Network Emulation Service Local Emulation Appliance Emulation of Mail (SMTP/TLS), Web (HTTP/S) and File Shares (CIFS) on one appliance MTA for true mail prevention (not just detection) 2015 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 11
SANDBLAST MEETS LOCKY 2015 Check Point Software Technologies Ltd.
Ransomware sample Locky 2015 Check Point Software Technologies Ltd. [Confidential] For designated groups and individuals 13
04 THREAT EXTRACTION Being PROACTIVE 2015 Check Point Software Technologies Ltd. 14
2015 Check Point Software Technologies Ltd. 15
05 SANDBLAST AGENT 2015 Check Point Software Technologies Ltd. 16
SANDBLAST AGENT Z e r o - D a y P r o t e c t i o n f o r E n d p o i n t s Prevent Zero-Day Attacks Identify & Contain Infections Effective Response & Remediation THREAT EXTRACTION & EMULATION FOR ENDPOINTS Deliver sanitized content Emulation of original files Protects web downloads and file copy ANTI-BOT FOR ENDPOINTS & ENDPOINT QUARANTINE Detect & Block C&C communications Pinpoint infections Quarantine infected host AUTOMATIC FORENSIC ANALYSIS & ATTACK REMEDIATION Incident Analysis - saves time & cost Make network detections actionable Understand endpoint AV detections Clean & remediate the full attack 2015 Check Point Software Technologies Ltd. 17
06 CONCLUSION 2015 Check Point Software Technologies Ltd. 18
STAYING ONE STEP AHEAD On the Network and At the Endpoint Catches More Malware. Proactive Prevention. Complete Integrated Protection. 2015 Check Point Software Technologies Ltd. 19
THANK YOU 2015 Check 2015 Point Check Software Point Software Technologies Ltd. Ltd. 20