Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.



Similar documents
Network Flow Analysis. egambit, your defensive cyber-weapon system. You have the players. We have the game.

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

egambit Your defensive cyber-weapon system. You have the players. We have the game. TEHTRI-Security

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

End-user Security Analytics Strengthens Protection with ArcSight

Critical Security Controls

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Defending Against Data Beaches: Internal Controls for Cybersecurity

AppGuard. Defeats Malware

Protecting Your Organisation from Targeted Cyber Intrusion

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Total Defense Endpoint Premium r12

Cisco Advanced Malware Protection for Endpoints

IT Security Strategy and Priorities. Stefan Lager CTO Services

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Advanced Threats: The New World Order

Enterprise Cybersecurity: Building an Effective Defense

Firewalls for the Home & Small Business. Gordon Giles DTEC Professor: Dr. Tijjani Mohammed

Cisco Advanced Malware Protection for Endpoints

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Breach Found. Did It Hurt?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Trend Micro OfficeScan Best Practice Guide for Malware

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Symantec Endpoint Protection

The Hillstone and Trend Micro Joint Solution

Unknown threats in Sweden. Study publication August 27, 2014

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Under the Hood of the IBM Threat Protection System

How Do Threat Actors Move Deeper Into Your Network?

Global Partner Management Notice

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Endpoint protection for physical and virtual desktops

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Intelligence Services.

Best Practices for Deploying Behavior Monitoring and Device Control

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

24/7 Visibility into Advanced Malware on Networks and Endpoints

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

All Information is derived from Mandiant consulting in a non-classified environment.

Sophos Computer Security Scan startup guide

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

On-Premises DDoS Mitigation for the Enterprise

Host-based Intrusion Prevention System (HIPS)

Advanced Endpoint Protection Overview

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

CyberArk Privileged Threat Analytics. Solution Brief

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Content Security: Protect Your Network with Five Must-Haves

BlackRidge Technology Transport Access Control: Overview

Analyzing HTTP/HTTPS Traffic Logs

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How To Protect A Virtual Desktop From Attack

How To Buy Nitro Security

SPEAR PHISHING AN ENTRY POINT FOR APTS

Industrial Security for Process Automation

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

overview Enterprise Security Solutions

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Speed Up Incident Response with Actionable Forensic Analytics

Enterprise Security Platform for Government

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Evolving Threat Landscape

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Internet threats: steps to security for your small business

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

Symantec Endpoint Protection

Combating a new generation of cybercriminal with in-depth security monitoring

Symantec Endpoint Protection

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Seven Strategies to Defend ICSs

Endpoint protection for physical and virtual desktops

Persistence Mechanisms as Indicators of Compromise

Network Security Monitoring

Top Four Considerations for Securing Microsoft SharePoint

CYBER ATTACK DEFENSE A KILL CHAIN STRATEGY WHITE PAPER

Endpoint Threat Detection without the Pain

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Ovation Security Center Data Sheet

Memory Forensics & Security Analytics: Detecting Unknown Malware

Transcription:

egambit Endpoint Security - egambit, your defensive cyber-weapon system. You have the players. We have the game. TEHTRI-Security 2010-2015 www.tehtri-security.com

Endpoint Security In this document, we will introduce how egambit can help at improving endpoint security, thanks to a Host-based Intrusion Prevention System: egambit-. Based on egambit version 3.1 September 2015

About Endpoint Security - Let s focus on Microsoft Windows environment - Windows is one of the main operating systems used in current infrastructures Ø Servers Ø Workstations, Laptops - Attackers spend an incredible time at creating unknown and undetected weapons in order to get illegal remote accesses - The problem is that current defensive technologies like antivirus, anti-malwares, personal firewall, cannot handle intruders alone Ø This explains why most attacks will finally success, thanks to human errors or poor configurations and insecurity Evil link followed, Evil attachment open

About egambit - To struggle against potential intruders over your Windows environment, egambit offers an - Host-based Intrusion Prevention System Ø Detection + Prevention in your Windows - This Endpoint Security technology will securely connect your Windows environments to their nearest egambit appliance - Then, egambit will be able to detect weird behaviors, suspicious files, exfiltration of data - egambit is the best friend of your Antivirus, as it will help at catching what is usually missed

egambit- overview Standard windows box with Antivirus, Antimalware, Firewall, Proxy, Hardening Remotely owned by attackers. Nothing happens. Stealth attack successful. egambit worldwide cloudbased intelligence Local egambit Engine Data from the ground Remote checks & analysis Proportional Responses Defensive Cyber-weapons Same situation, except that the will detect, report, and answer to the threat.

Example based on 2014, November experience SCADA Production network attacked in a multinational company. Unknown Trojan horse [0/57 on Virustotal] with SSL exfiltration. Local egambit Engine egambit results = detection + retaliation 1) Detection of suspicious unknown activity ( engine) 2) Reporting to the worldwide cloud-based intelligence (global analysis) 3) Remote advanced analysis of the Windows (from egambit appliance) IP of attackers retrieved. Evil tools stolen and sent to Sandbox in minutes. 4) TEHTRIS MSSP: alert sent to IT Security expert team from customer (SOC) 5) Mitigation authorized by customer (protection of the SCADA production) Exfiltration path broken. Physical location of attackers found. Offensive weapons remotely broken. Offensive actions broken.

These weapons, called defensive missiles, can be enabled or disabled by the customer, to adapt the threat response to the desired level. For increased security, an integrity check is run at each missile reception to avoid running something the customer didn t specifically allowed. EXAMPLES OF DEFENSIVE CYBER-WEAPONS

Oletools Support Oletools is a must-have technology created by the well-known security expert Philippe LAGADEC (@decalage2). egambit version 3.1 [September 2015] is fully compatible with Oletools. - Scans of office documents (Word, Excel, Powerpoint) - Automatic scans - Live security analysis of macro-based threats

YARA Support YARA is a tremendous technology created by Victor Manual Alvarez (@plusvic) from VirusTotal. Some say YARA is like an, for files+memory. egambit version 3.1 [September 2015] is fully compatible with YARA. - Scans of memory + file system - On-demand scans + Automatic scans - Custom YARA rules supported - Build specific YARA based rules as Indicators Of Compromise (IOC) to scan your whole infrastructure memory during a malware / spyware global hunt

Cloud-based intelligence - Live reports from analysis made on the ground in the Windows computers are shared with the nearest egambit appliance - Some results might be sent to a cloud-based intelligence in order to beneficiate from all experiences from worldwide global fighting Ø When a new malware is caught somewhere on earth, all egambit brothers get stronger Ø It s a kind of collective cloud-based artificial intelligence dedicated to IT Security - Example Ø Threats are hunted by more than 50 antiviruses at the same time, with no CPU impact on your Endpoints [More than 50 antiviruses] is stronger than [1 or 2 antiviruses]

Defensive cyber-weapon system - Others defensive missiles Ø ARP Spoofing detection Ø Malware persistence detection Ø Running processes scan Ø Web browser insecurity checks Ø Potentially Unwanted Programs checks Ø Local system information gathered Ø Network exfiltration detection Ø Network mitigation missiles Ø System mitigation missiles Ø

egambit = + + + Console

Compatibility matrix - egambit was successfully running on these environments so far Ø Windows XP Ø Windows 2003 Ø Windows 2008 Ø Windows 2012 Ø Windows 7 Ø - The deployment is pretty easy as it contains hardened auto-configuration protocol and features. Ø Just launch the MSI on your Windows, and the cyber protection against malwares and intruders works alone.

Synthesis egambit [Endpoint Security] - Two complementary levels of work Ø Live Intrusion Detection alerts (monitoring) Ø Retaliation and interaction against threats (mitigation) - Multiple skills and features added to your security Ø Follow the activity in your Windows boxes Ø Improve your security and check compliance issues Ø Detect unusual and unwanted programs Ø Follow weird behaviors and anomalies Ø Detect hidden software, insiders threats Ø Retrieve APT, lateral movements, malwares Ø Increase SOC/CSIRT capacities and speed Ø Ease Forensics and Incident Management

Join us Ready for innovative solutions against cyber threats?

www.tehtri- security.com egambit egambit is a product that can monitor and improve your IT Security against complex threats like cyber-spy or cyber-sabotage activities. This product is realized by the TEHTRI-Security company in FRANCE. It is fully designed and developed near Bordeaux, and Paris as well. Created in 2012, the egambit product has already helped companies in China, Brazil, USA and Europe against internal and external cyber threats. In 3 years egambit has already caught billions of events related to security issues worldwide, thanks to the tremendous skills and motivation of expert Consultants working on the project with a real Ethical Hacking spirit. 100% of the source code is within TEHTRIS hands, and it was designed with extended security features. egambit is your defensive cyber-weapon system.

egambit Your defensive cyber-weapon system You have the players. We have the game. Let s use egambit in your environment, in order to improve hardening and detection of security issues and incidents.

Follow-up Do not hesitate to contact our team TEHTRI-Security Managed Security Service Provider www.tehtri-security.com egambit Complete defensive weapon system @tehtris www.tehtri-security.com