you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services



Similar documents
Cisco Advanced Malware Protection for Endpoints

Palo Alto Networks. October 6

Cisco Advanced Malware Protection

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Unified Security, ATP and more

Cisco Advanced Malware Protection for Endpoints

Fighting Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Requirements When Considering a Next- Generation Firewall

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

McAfee Network Security Platform

The Hillstone and Trend Micro Joint Solution

Symantec Endpoint Protection

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Analyzing HTTP/HTTPS Traffic Logs

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

How To Buy Nitro Security

Market Guide for Network Sandboxing

Symantec Advanced Threat Protection: Network

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

FROM PRODUCT TO PLATFORM

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Redefining SIEM to Real Time Security Intelligence

McAfee Next Generation Firewall (NGFW) Administration Course

WildFire. Preparing for Modern Network Attacks

IBM Advanced Threat Protection Solution

IBM Security X-Force Threat Intelligence

Check Point: Sandblast Zero-Day protection

Reduce Your Network's Attack Surface

Braindumps QA

IBM Security Intrusion Prevention Solutions

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Agenda , Palo Alto Networks. Confidential and Proprietary.

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Next Generation Enterprise Network Security Platform

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Symantec Endpoint Protection

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Cisco Web Security: Protection, Control, and Value

Security Services. 30 years of experience in IT business

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Cloud Services Prevent Zero-day and Targeted Attacks

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Cisco Security Intelligence Operations

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Advanced Persistent Threats

SourceFireNext-Generation IPS

IBM Security re-defines enterprise endpoint protection against advanced malware

Integrating MSS, SEP and NGFW to catch targeted APTs

WEBSENSE TRITON SOLUTIONS

End-user Security Analytics Strengthens Protection with ArcSight

APPLICATION PROGRAMMING INTERFACE

Enterprise Security Platform for Government

Achieve Deeper Network Security

OVERVIEW. Enterprise Security Solutions

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

AppGuard. Defeats Malware

Endpoint Threat Detection without the Pain

Securing Your Business with DNS Servers That Protect Themselves

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

End to End Security do Endpoint ao Datacenter

Symantec Advanced Threat Protection: Network

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Vulnerability Management

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Safeguarding the cloud with IBM Dynamic Cloud Security

Next Generation IPS and Reputation Services

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Symantec Endpoint Protection

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

How To Protect Your Cloud From Attack

Next-Generation Firewalls: Critical to SMB Network Security

SPEAR PHISHING AN ENTRY POINT FOR APTS

isheriff CLOUD SECURITY

Carbon Black and Palo Alto Networks

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

ENABLING FAST RESPONSES THREAT MONITORING

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Stop advanced targeted attacks, identify high risk users and control Insider Threats

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

I D C A N A L Y S T C O N N E C T I O N

Cisco Cloud Web Security Datasheet

Transcription:

MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced malware. With Lastline s software platform, your company can add premium, highly-profitable, advanced malware protection to your service offering. Your Advanced Malware Protection Services: Empower your customers to catch and stop advanced malware that traditional security technologies and first-generation APT defense systems miss while complementing your traditional managed security services with a software solution that is practical for your business model. Business Benefits: Improve your margin Drive top-line revenue Upsell to your base Enhance service offering No hardware to finance Service Benefits: Serve various customers Subscription pricing Co-branded availability Operationally scalable Serve multiple networks Lastline products provide a rich (Application Protocol Interface) that can connect to 3rd party network security products and includes multi-vector support, so that you can offer advanced malware managed security services for email, web, content and mobile. 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Zero-Day 0 1 0 1 0 1 0 1 0 1 Exploits 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 Web 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Content 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 Polymorphic 1 0 1 0 1 0 1 0 1 0 1 0 1 0 Viruses 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 Evasive 1 0 1 0 1 0 1 0 Malware 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Email 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 APAC: +65 6829 2207 1 of 5

How is Lastline different? Lastline software products have been designed and developed to operate in multi-tenant environments. We provide unparalleled scalability, protection, management, and integration with existing systems to optimize your MSSP operational process. Your Service Differentiation With Lastline Flexible multi-tenant architecture allows for scalability as your customer base grows. Lastline offers the ability to deploy on commodity hardware or in virtual environments, so you and your customers can deploy without having to worry about expensive proprietary hardware costs. Highlights Scalability Multi-tenant architecture Roll-out to multiple customer locations Provide services at multiple price points Protection Actionable threat intelligence Next-generation sandbox Complementary to traditional defenses Management Lastline has superior detection. By using both network and object analysis techniques, Lastline lets you accurately identify highlyadvanced threats and stop them. Lastline s full-system emulation functionality dissects not only APTs, but advanced malware crafted to evade detection of traditional sandboxes used by first-generation APT security vendors. Correlation of advanced threats Threat scoring for surgical analysis Threat taxonomy for complete understanding Interoperability Interconnect with other security systems Make your single pane malware aware Empower your ops to customize systems APAC: +65 6829 2207 2 of 5

Managing alerts is simple. The platform correlates several low-level events into a few high-level incidents, to enable your staff to quickly and cost-effectively respond to threats impacting your customers. Detailed drill-down capabilities also allow for a clear understanding of the entire threat taxonomy. Infection Incident 1 Incident 2 Incident 3 Lastline s unrivaled capabilities allow you to easily integrate our software solution with existing security infrastructure to add malware understanding and better protect against advanced cyber threats. SWGs (secure web gateways), IPSs (Intrusion Protection System), NGFWs (next-generation firewalls) and SIEM (Security Information Event Management) installations can interoperate seamlessly with the Lastline platform. Analysis SIEM Object Analysis Endpoint & Cloud APAC: +65 6829 2207 3 of 5

How will Lastline work in your environment? Lastline s platform consists of five core components: Component Function Sensor Sensors, provide multi-vector support. Can analyze network, email, web, content and mobile traffic. Sensors can extract objects for advanced malware analysis and stop cyber threats. Sensors can run on commodity servers or VMware instances. Manager Managers, are multi-tenant, and interconnect Sensors to Engines. Managers route objects for analysis to Engines. Managers correlate threat events into incident views of network and object activity. Managers can be installed on commodity servers or hosted by Lastline. Analysis 3rd Party Security Engine Engines analyze objects with a nextgeneration sandbox using full-system emulation. This approach allows for greater visibility of advanced malware. Engines can be installed on commodity servers or hosted by Lastline. SIEM Object Analysis Endpoint & Threat Intel Lastline crawls the web, uses emulated browsers, machine learning, information on objects analyzed, big data analytics to build a knowledge base of malicious objects, bad IP addresses and active command-and-control systems. Available as a subscription service. Cloud The (Application Program Interface) provides the ability to submit objects for advanced malware analysis from any 3rd party sensor or system, query the Threat Intelligence and display pertinent threat level information. Available with the platform. APAC: +65 6829 2207 4 of 5

Lastline s platform can easily be deployed in your environment and your customer s network. Lastline Environment MSSP Environment Customer Locations Security Operations Center Integrate with existing management Correlate events HQ Web Data Center SITE 1 Content Threat Intelligence Multi-tenant Manager SITE 2 Email SITE 3 Engines VM Lastline s Environment In Your MSSP Environment Customer s Environment The multi-tenant Managers in your data center pull the latest Threat Intelligence of known advanced threats from Lastline. This intelligence gets pushed to the Sensors in your customers networks from your Managers. The Manager and Engine components are installed onpremise in your private data center. As the need to inspect more objects for advanced malware increases, simply install and cluster additional Engines. Managers correlate events processed by all sensors and engines, and rolls them up via an to your existing management systems. Sensors are deployed throughout your customers locations and layers of defense to monitor traffic and capture objects for advanced malware. Deploy sensors behind traditional NGFW, NIPS, ESG, SWG to inspect email, web, content and mobile traffic. Sensors can be deployed on physical or virtual networks. Third-party sensors can also be used to collect objects for Engine analysis. Lastline s Threat Intelligence allows Sensors to identify traffic associated with advanced threats and, depending on the configuration, generate an alarm and/or stop the attack. If the Sensors identify unknown artifacts (programs or documents) being downloaded, they extract the objects from the network and send them to the Engine cluster in your private data center for further analysis using full-system emulation techniques. Start offering advanced malware managed services now using Lastline s premier software platform. About Lastline, Inc. Lastline, Inc. provides the best-in-class malware protection platform to detect and stop advanced persistent threats, zeroday exploits, and evasive malware. The company was founded in 2011 by world-renowned security researchers and creators of Anubis and Wepawet malware analysis tools used by thousands of security vendors, enterprises, and government agencies worldwide. The company is headquartered in Redwood City, California, with offices in North America, Europe and Asia Pacific. To learn more, visit. APAC: +65 6829 2207 5 of 5