PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY



Similar documents
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Using Remote Desktop Clients

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

Driving Company Security is Challenging. Centralized Management Makes it Simple.

AVG AntiVirus. How does this benefit you?

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Symantec Endpoint Protection Datasheet

DriveLock and Windows 7

Anti-exploit tools: The next wave of enterprise security

CA Host-Based Intrusion Prevention System r8.1

McAfee Server Security

Ovation Security Center Data Sheet

Endpoint protection for physical and virtual desktops

AVeS Cloud Security powered by SYMANTEC TM

Introduction. PCI DSS Overview

Host-based Protection for ATM's

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Proven LANDesk Solutions

Features Business Perspective.

Fighting Advanced Threats

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Ovation Security Center Data Sheet

Multi-factor authentication

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

The Key to Secure Online Financial Transactions

The Challenge of a Comprehensive Network Protection. Introduction

How To Manage A System Vulnerability Management Program

Protecting productivity with Plant Security Services

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Cybersecurity Health Check At A Glance

Seven for 7: Best practices for implementing Windows 7

Host-based Intrusion Prevention System (HIPS)

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

5 Steps to Advanced Threat Protection

Critical Security Controls

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Symantec Endpoint Protection Analyzer Report

Advanced Endpoint Protection Overview

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Cisco Advanced Malware Protection for Endpoints

Next Gen Firewall and UTM Buyers Guide

24/7 Visibility into Advanced Malware on Networks and Endpoints

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Kaspersky Security for Mobile Administrator's Guide

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Stormshield Network Security vs Fortinet

Carbon Black and Palo Alto Networks

Kaspersky Security Network

Integrated Protection for Systems. João Batista Territory Manager

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Network protection and UTM Buyers Guide

Symantec Endpoint Protection

EndUser Protection. Peter Skondro. Sophos

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Top tips for improved network security

Section 12 MUST BE COMPLETED BY: 4/22

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

End to End Security do Endpoint ao Datacenter

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Guideline on Auditing and Log Management

PCI Data Security Standards (DSS)

Zone Labs Integrity Smarter Enterprise Security

Inspection of Encrypted HTTPS Traffic

End-user Security Analytics Strengthens Protection with ArcSight

DriveLock and Windows 8

Advanced Persistent Threats

Data Access Request Service

Chapter 9 Firewalls and Intrusion Prevention Systems

Endpoint Security Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Endpoint protection for physical and virtual desktops

Top five strategies for combating modern threats Is anti-virus dead?

Cisco Advanced Malware Protection

Course: Information Security Management in e-governance

Quick Heal Exchange Protection 4.0

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Trend Micro OfficeScan Best Practice Guide for Malware

Protecting Your Organisation from Targeted Cyber Intrusion

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Getting a Secure Intranet

Transcription:

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

FACT: WORKSTATIONS AND SERVERS ARE STILL AT RISK CONVENTIONAL TOOLS NO LONGER MEASURE UP Despite millions in investment corporations attest to the failure, corporations can attest to the failure of conventional defense tools in the battle against targeted or sophisticated attacks. Antivirus or HIPS tools offer a reactive rather than a proactive approach to detecting malicious programs and behaviors. They use signature bases restricted to known threats and often find themselves helpless against any new attacks. Furthermore, hackers devise advanced camouflage mechanisms to cover their tracks and thereby manage to make their way past these signature-based protections. INCREASINGLY ADVANCED AND TARGETED ATTACKS Attacks are considered to be sophisticated if they can bypass conventional security mechanisms. This level of sophistication is achieved as a result of the combination of multiple advanced attack methods, such as the exploitation of an application vulnerability (web server or PDF file reader), followed by the spread of a malware through the corporate network, or the retrieval of access to sensitive assets by fraudulently increasing privileges. 14 Billion of Cost of investments in conventional security tools in 2014 53% Increase in the financial cost of an intrusion in 1 year (Source : Global State of Information Security Survey)

Illustration of a sophisticated attack How Advanced Targeted Attacks (ATA) work Hacker The hacker conceals a virus in a bogus invoice in PDF format and sends it to the accounting department of the target company PDF 1 PRIMARY INFECTION Vulnerability exploitation: PDF, Flash, browsers, etc. Removable peripheral devices in use Targeted corporation OS 3 STEAL OR DESTROY Data exfiltration (C&C) Destruction of sensitive data Modification of hardware behavior Office Suite PDF Reader 2 SPREAD TO NEW TARGETS Accounts (Vulnerable workstation) Account theft: Pass-the-Hash Removable peripheral devices in use R&D (Target workstation) Logistics Management Sales

A solution exists Stormshield Endpoint Security protects you from Advanced Targeted Attacks (ATA) Hacker The hacker conceals a virus in a bogus invoice in PDF format and sends it to the accounting department of the target company 1 PDF PROTECTING AGAINST UNKNOWN ATTACKS Our unique protection blocks unknown attacks proactively, by detecting for example, the exploitation of a vulnerability. Targeted corporation 3 PROTECTING AND KEEPING DATA Stormshield Endpoint Security embeds a wide array of protection, based both on signatures and behavioral analyses, which aim to detect data transfers or undesirable maneuvers. 2 Accounts BLOCKING THE SPREAD OF A THREAT Stormshield Endpoint Security enables the prevention of account data theft PROTECTION through DES the TERMINAUX granular monitoring ET DES of UTILISATEURS operations performed on the hard disk, on USB keys, on the registry database and even on the processes of the operating system. SÉCURITÉ ENDPOINT R&D Logistics Management Sales

Comprehensive and proven protection of servers and terminals Stormshield Endpoint Security 2 products FULL PROTECT The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks. FULL CONTROL The Full Control product allows the granular definition of workstation protection in a context that complies with the corporate security policy. PROTECTION FROM UNKNOWN THREATS Protection against the exploitation of vulnerabilities on the operating system Protection against the exploitation of vulnerabilities on third-party applications Monitors integrity of the system s memory PROTECTION FOR WORKSTATIONS Detection of malicious programs through behavioral analysis Reinforcement of the operating system Application control (whitelisting or blacklisting) Granular control over user privileges Granular control over the exfiltration of sensitive data INTRUSION PREVENTION Firewall Network intrusion detection PERIPHERAL DEVICE MONITORING AND AUDIT Allows or blocks peripheral devices according to their type or serial number Blocks or restricts certain operations carried out by the peripheral device Protects against infection by external peripheral devices (e.g. by an infected USB key) Tracks files copied to a particular peripheral device and/or by a particular user Evaluates file transfers (appropriate or otherwise) COMMUNICATION CONTROL Firewall Quarantining of infected PCs Authorization of public Wi-Fi hotspots only when the corporate VPN is used Whitelisting of corporate Wi-Fi access points Imposition of WPA/WPA2 security standards Prohibition of Wi-Fi in ad-hoc mode Both products may be enabled in the same management console and on the same agent. VARIOUS OPTIONS ARE AVAILABLE ANTIVIRUS SIGNATURE-BASED ANTIVIRUS File analysis in real time or on demand Scanning of e-mails before they reach the inbox Analysis of internet traffic Seamless management of the module by the management console ENCRYPTION SURFACE ENCRYPTION Encryption of the disk with pre-boot authentication One-time authentication (SSO) with Windows session Centralized administration, role segregation Safe file deletion SECURITY MONITORING ADVANCED MONITORING SERVICE RANGE Vulnerability analysis that covers operating systems or applications Periodic generation of an analysis report that attests to the actual level of protection Recommendations provided to deal with any residual risks Efficient response for operating systems that are no longer supported

STORMSHIELD ENDPOINT SECURITY IN A FEW KEY POINTS A RESPONSE FOR EVERY TYPE OF THREAT You are protected from the remote exploitation of vulnerabilities, the threat of malicious internal users, data leaks, and attacks specific to certain types of sensitive environments (SCADA, point of sale, etc.). EASY INTEGRATION Compatible with all other antivirus protection solutions, Stormshield Endpoint Security provides an additional level of security. CENTRALIZED ADMINISTRATION Managing Stormshield Endpoint Security products and options is a simple affair involving a single console. A SOLUTION ADAPTED TO OFFLINE ENVIRONMENTS For environments governed by tight constraints, such as industrial systems, the solution s proactive approach keeps the environment safe without updating signature bases. A CLOUD-READY SOLUTION Stormshield Endpoint Security s management server can be installed in a public or private cloud infrastructure, allowing you to easily integrate our security solution without the constraint of hardware restrictions. Arkoon and Netasq, fully owned subsidiaries of Airbus Defence and Space, run the Stormshield brand and offer innovative end-to-end security solutions to protect networks (Stormshield Network Security), workstations (Stormshield Endpoint Security) and data (Stormshield Data Security). WWW.STORMSHIELD.EU Version 2.1 - Copyright Arkoon 2015