agenda
play

Agenda Why we need a new approach to endpoint security Introducing - PowerPoint PPT Presentation

Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks are from within the


  1. Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2

  2. Endpoint Security has reached a Tipping Point • Attacks are from within the perimeter, delivered using software exploits • Ransomware reaches $1.2B in damages • Lack of Threat Intelligence after a Breach

  3. Driving the Paradigm Shift to Next-Generation ZERO DAY LIMITED ADVANCED EXPLOITS VISIBILITY MALWARE

  4. The Evolution of Sophos Endpoint Security From Anti-Malware to Anti-Exploit to Next-Generation Exposure Pre-Exec File Run-Time Exploit Prevention Analytics Scanning Detection URL Blocking Generic Matching Signatures Signatureless Technique Web Scripts Heuristics Known Malware Behavior Analytics Identification Download Rep Core Rules Malware Bits Runtime Behavior T RADITIONAL M ALWARE A DVANCED T HREATS

  5. ! E XECUTABLE M ALICIOUS MS F ILES R ANSOMWARE I NCIDENT E XPLOIT U NAUTHORIZED R EMOVABLE A DVANCED F ILES URL S & PDF P REVENTION R ESPONSE P REVENTION A PPS M EDIA C LEAN A ND Y ET … 90% OF D ATA B REACHES ARE >90% O F E XPLOIT A TTEMPTS U SE M ORE T HAN 60% OF IT S TAFF F ROM E XPLOITS K ITS K NOWN V ULNERABILITIES L ACK I NCIDENT R ESPONSE S KILLS P REVENT R ESPOND D ETECT B EFORE IT RUNS ON DEVICE B EFORE IT REACHES DEVICE N EXT G ENERATION E NDPOINT

  6. Introducing Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Automated Incident Response Prevent Exploit Techniques • Stops Malicious Encryption • IT Friendly Incident Response • Signatureless Exploit Prevention • Behavior Based Conviction • Process Threat Chain Visualization • Protects Patient-Zero / Zero-Day • Automatically Reverts Affected Files • Prescriptive Remediation Guidance • Blocks Memory-Resident Attacks • Identifies source of Attack • Advanced Malware Clean • Tiny Footprint & Low False Positives ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY Prevent Ransomware Attacks Faster Incident Response No User/Performance Impact Roll-Back Changes Root-Cause Visualization No File Scanning Attack Chain Analysis Forensic Strength Clean No Signatures

  7. Optional Demo

  8. ANTI-RANSOMWARE

  9. CryptoGuard - Intercepting Ransomware Monitor file access Attack detected Rollback initiated Forensic visibility • If suspicious file • Malicious process is • Original files restored • User message changes are detected, stopped and we • Malicious files • Admin alert file copies are created investigate the removed • Root cause analysis process history details available

  10. ROOT CAUSE ANALYSIS

  11. Root-Cause Analytics Understanding the Who, What, When, Where, Why and How What Happened? • Root Cause Analysis • Automatic report @ the process / threat / registry level • 90 Days of historical reporting • Detailed Visual representation of what other assets have been touched What is at Risk? • Compromised Assets • Comprehensive list of business documents, executables, libraries and files • Any adjacent device (i.e., mobile) or network resources which may be at risk Future Prevention • Security Posture • Recommendations based on historical security risks • Provides steps to prevent future attacks • Rich reporting of Compliance status

  12. 15 Sophos confidential

  13. 16

  14. ANTI-EXPLOIT

  15. Intercepting Exploits 10’s of new malware sub- techniques every year ?

  16. Intercepting Exploits Exploit Prevention 10’s of new malware sub- • Monitors processes for attempted use of techniques every year exploit techniques e.g. Buffer overflow, code injection, stack pivot and others • Blocks when technique is attempted • Malware is prevented from leveraging vulnerabilities ?

  17. SOPHOS CENTRAL

  18. A Single, Synchronized Security Platform Sophos Central In Cloud On Prem UTM/Next-Gen Firewall Endpoint/Next-Gen Endpoint Wireless Mobile Email Server Web Encryption 21

  19. Sophos Central: Admin Dashboard User-Centric Unified Powerful Simple Fast 22

  20. DEPLOYMENT OPTIONS

  21. Deployment Options SOPHOS INTERCEPT X Antivirus and endpoint Sophos Central Endpoint solutions from other Advanced vendors 24

  22. TO SUM UP…

  23. Taking Your Endpoints To The Next-Generation ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY 26

  24. Sophos Intercept X Anti-Ransomware Anti-Exploit Root-Cause Analysis Detect Next-Gen Threats Automated Incident Response Prevent Exploit Techniques • Stops Malicious Encryption • IT Friendly Incident Response • Signatureless Exploit Prevention • Behavior Based Conviction • Process Threat Chain Visualization • Protects Patient-Zero / Zero-Day • Automatically Reverts Affected Files • Prescriptive Remediation Guidance • Blocks Memory-Resident Attacks • Identifies source of Attack • Advanced Malware Clean • Tiny Footprint & Low False Positives ADVANCED ZERO DAY LIMITED MALWARE EXPLOITS VISIBILITY Prevent Ransomware Attacks Faster Incident Response No User/Performance Impact Roll-Back Changes Root-Cause Visualization No File Scanning Attack Chain Analysis Forensic Strength Clean No Signatures

Recommend


More recommend