AppGuard. Defeats Malware



Similar documents
We Prevent Breaches (and surprises) Intelligent Prevention

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cisco Advanced Malware Protection for Endpoints

Advanced Endpoint Protection

Cisco Advanced Malware Protection

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Netzwerkvirtualisierung? Aber mit Sicherheit!

Security Services. 30 years of experience in IT business

CA Host-Based Intrusion Prevention System r8.1

RSA Security Analytics

The Hillstone and Trend Micro Joint Solution

SANS Top 20 Critical Controls for Effective Cyber Defense

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Speed Up Incident Response with Actionable Forensic Analytics

Carbon Black and Palo Alto Networks

SourceFireNext-Generation IPS

TRITON APX. Websense TRITON APX

Security Analytics The Beginning of the End(Point)

Cisco Advanced Malware Protection for Endpoints

Critical Security Controls

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Integrating MSS, SEP and NGFW to catch targeted APTs

Enterprise Cybersecurity: Building an Effective Defense

Cyber Situational Awareness for Enterprise Security

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Endpoint Security for DeltaV Systems

THE EVOLUTION OF SIEM

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Breaking the Cyber Attack Lifecycle

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Top 20 Critical Security Controls

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

McAfee Server Security

Stop advanced targeted attacks, identify high risk users and control Insider Threats

FROM PRODUCT TO PLATFORM

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Securing Cloud-Based

End-user Security Analytics Strengthens Protection with ArcSight

Report. Bromium: Endpoint Protection Attitudes & Trends Increasing Concerns Around Securing End Users

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Trend Micro. Advanced Security Built for the Cloud

Agenda , Palo Alto Networks. Confidential and Proprietary.

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

e2e Secure Cloud Connect Service - Service Definition Document

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Symantec Approach to Defeating Advanced Threats

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Symantec Consulting Services

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

The Protection Mission a constant endeavor

BlackRidge Technology Transport Access Control: Overview

Seven Things To Consider When Evaluating Privileged Account Security Solutions

ALERT LOGIC FOR HIPAA COMPLIANCE

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Modular Network Security. Tyler Carter, McAfee Network Security

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Fighting Advanced Threats

Devising a Server Protection Strategy with Trend Micro

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Networking for Caribbean Development

Cloud and Data Center Security

Zak Khan Director, Advanced Cyber Defence

IT Security Strategy and Priorities. Stefan Lager CTO Services

Devising a Server Protection Strategy with Trend Micro

Security Intelligence Services.

WildFire. Preparing for Modern Network Attacks

On-Premises DDoS Mitigation for the Enterprise

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Unified Security, ATP and more

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

CyberArk Privileged Threat Analytics. Solution Brief

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

Bio-inspired cyber security for your enterprise

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

24/7 Visibility into Advanced Malware on Networks and Endpoints

Content Security: Protect Your Network with Five Must-Haves

IBM Advanced Threat Protection Solution

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Transcription:

AppGuard Defeats Malware and phishing attacks, drive-by-downloads, zero-day attacks, watering hole attacks, weaponized documents, ransomware, and other undetectable advanced threats by preventing exploits Intelligent Prevention www.blueridge.com April 2015

Threats Escalating Serious Exposures Breaches Happening 2

Traditional best practice not enough Evolving Threats Evading Traditional Network Defenses IDS/IPS, Deep Packet Inspection, NGFW (detection lag, phishing) Breach Detection Systems with Network Sandbox (easily bypassed, stealth) Web Proxies and URL Filtering defenseless (malvertising, masking) Traditional Desktop Protections Repeatedly Bypassed Anti-Virus, signatures, behaviors, HIPS (zero-day, detection lag) White Listing (digitally signed software, update complexity) Anti-exploit, EMET (weaponized documents, ransomware) Perimeter boundaries blurred in modern enterprise cloud Traditional defenses limited to traditional perimeters Little protection off Enterprise, mobile endpoints, distributed ops Rising usability and support requirements with productivity impacts Complexity and costs increasing, yet risks are still rising Detection-response approaches are not enough for the emerging threat environment 3

Endpoints are the New Battlefield AppGuard Defeats Malware! Symantec estimates antivirus now catches just 45% of cyber attacks. The Wall Street Journal threat spreads to firewalls and beyond. Reuters Attacked for months - malware lying in wait. The New York Times Speed of attack is increasing while response times are lagging. Deloitte 4

May 2014: July 2014: Real-World Enterprise Attack AppGuard Defeats Malware! AppGuard deployed to protect customer endpoints Customer chose to rely on existing intrusion detection systems (IDS) for reporting and threat intelligence Dangerous PoweLiks malware discovered in marketplace January 2015: Customer best-in-class IDS finally discovered Poweliks had attacked numerous endpoints AppGuard had stopped Poweliks from exploiting endpoints No enterprise breach! AppGuard reports would have provided alerts of attempted attacks 8 months earlier than breach detection systems AppGuard should be on every Windows system in the world. Robert Bigman, former CISO, CIA 5

Key Differentiation Traditional Best Practice Scan and Compare Detect and Respond Failing to Defeat Exploits Blue Ridge Approach Isolate and Contain Prevent and Report Defeats Exploits DETECTED? Event? ANALYZED CORRECTLY? Exploit Remediated? PROPER RESPONSE? IN TIME TO MINIMIZE DAMAGE? Event? Exploit Prevented REPORT ANALYZE PROTECTED Complex Process dependencies reliance on recognizing anomalies lag time response delay integration vulnerabilities burdensome overhead Streamlined Process removes dependencies no reliance on knowledge no time futureproof protection closes vulnerability gaps removes overhead 6

AppGuard Patented exploit prevention for endpoints Stops known and unknown first-stage attacks No detection, scanning, or updates required Earlier warning of attempts while protected Efficient and non-disruptive for the end user Compatible with all Windows versions, apps, system tools, system tools, AV, IDS Easy to deploy and manage Protects on and off enterprise Futureproof Protection prevents undetectable exploits before they cause harm 7

AppGuard for the Enterprise Endpoint Agent Software agent installed on endpoint Endpoint protection with per-process log collection Agent can be distributed via network management tools Underlying PKI infrastructure for digitally signing and encrypting logs Enterprise Management System Centrally managed console Administrator rights limited to a trusted few Manages policy updates with audit trail Policy updates pushed directly to endpoints Can establish different endpoint trust groups with different security policies Collects granular endpoint logs real time - early warning of attempts while protected Support Alternatives Enterprise managed services System procurement with Admin support 8

AppGuard Threat Intelligence Early IOC reporting for DFIR Teams while protected Effective even for undiscovered malware for earlier warning Timely Advisories and Alerts digitally signed and encrypted Platform for IOC formation, identification, sharing Threat Information collectible from endpoints on and off enterprise Independent Policy administration and reporting management plane No equipment required on customer premises for managed services Logs can be integrated with other systems for analysis Post Incident analysis without remediation crisis AppGuard Threat Intel Advisory Endpoint ID: Suspicious Activity Attack Stopped: Name IOC Matching: Warning Exploit Prevention with Earlier Warning Actionable Threat Intelligence 9

Our Customers Say it Best Best Anti-Malware Solution Blue Ridge hit a homerun. It just works. No Hassle. Easy, trouble free integration. Best protection at low cost. Best in Class Field Proven Track Record Usable Scalable Best Value Intelligent Prevention Contact sales@blueridge.com or 1-800-704-5234 10