Presentation on theme: "Getting a Good Night Sleep Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager Protecting Your Endpoints Going Beyond Anti-Virus."— Presentation transcript:
Getting a Good Night Sleep Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager Protecting Your Endpoints Going Beyond Anti-Virus
Agenda Say, Hello.Look good.Explain some stuff.Try not to say anything stupid.Leave.
ENDPOINT SECURITY IS NOT JUST AV So why are we here talking about a commodity sale like anti-virus? 3
AND ENDPOINT SECURITY IS WHERE IT IS AT So why are we here talking about a commodity sale like anti-virus? 4
The Endpoint is the Frontline… Attacks in 2011 targeting user devices 60% Attacks in 2012 targeting user devices 71% Verizon Data Breach Investigations Report 2013
MALWARE AND THREATS: SMARTER, FASTER, MORE
The 5 Weapons of the Enemy Malware: Ever-increasing threats Mobility: Your data is on the move Mine!: Employee-owned devices Mistakes: Vulnerabilities in applications Messy: The complexity of the IT environment
SIMPLIFY!!! So how do we fight back? 8
Think about it… 9
Home entertainment used to be simple…
11 However, home entertainment has changed… Apple TV Panasonic Blu Ray Denon Receiver Comcast Xfinity Xbox 360 Samsung Plasma TV
4 Devices 3 Devices 2 Devices 12 This Means Redundancy…and Increased Costs
13 This Means Complexity…and Lack of Integration
Increased costs, higher complexity, and lack of integration at home? Unhappy Spouse 14
Increased costs, higher complexity, and lack of integration at work? Unhappy Boss 15 Unhappy Job Unhappy End Users Increased Need for an Updated Resume
So what does this have to do with Endpoint Security?
Malware The Impact of Complexity on IT Security Browsing and Installing Mobile / BYOD Vulnerabilities in Applications 17 YOUR DATA Response: Software inventory Systems / patch management Response: Mobile Security Mobile device management (MDM) Response: Application control Web control Data is easy to Move Response: Data encryption Device control Response: Anti-malware Firewall
Malware The Impact of Complexity on IT Security Browsing and installing Mobile / BYOD Vulnerabilities in Applications 18 YOUR DATA Response: Anti-malware Firewall Response: Software inventory Systems / patch management Response: Mobile Security Mobile device management (MDM) Response: Application control Web control Data is easy to Move Response: Data encryption Device control This is complexity. COMPLEXITY IS THE ENEMY OF IT SECURITY.
Malware The Impact of Complexity on IT Security Browsing and Installing Mobile / BYOD Vulnerabilities in Applications YOUR DATA Response: Software inventory Systems / patch management Response: Mobile Security Mobile device management (MDM) Response: Application control Web control Data is easy to Move Response: Data encryption Device control 1 PLATFORM MANAGEMENT CONSOLE COST Response: Anti-malware Firewall
The Impact of Complexity on IT Security 1 PLATFORM MANAGEMENT CONSOLE COST Investment Complexity Risk Physical, Virtual, Mobile Windows, Mac, Linux --- Android, iOS, Windows Phone, BlackBerry, Symbian
PAGE 21 | Anti Malware + Firewall Kaspersky Endpoint Security for Business
McAfee TOP 3 = 21% N of tests st places - 1 Trend Micro TOP 3 = 21% 54 tests 1 st places - 3 Eset TOP 3 = 29% 51 tests 1 st places - 2 Sophos TOP 3 = 39% 28 tests 1 st places - 1 TOP3 score results comparison N of 1 st places Tests participated Symantec TOP 3 = 58% 46 tests 1 st places - 9 Bitdefender TOP 3 = 75% 53 tests 1 st places - 12 Kaspersky TOP 3 = 87% 73 tests 1 st places – (!) 31
PAGE 23 | Anti Malware + Firewall Kaspersky Security Center Web Control Device Control ApplicationControl File Server Security Systems Management (SMS) Kaspersky Endpoint Security for Business WebCollaborationMail License Mgmt VulnerabilityScan PatchMgmt Image Mgmt SW Installation Network Access Mobile Device Management (MDM) Cloud Enabled via the Kaspersky Security Network (KSN) Select Advanced Total Mobile Endpoint Security Data Protection (Encryption) Endpoint Management
SIMPLIFIED MANAGEMENT VIRTUAL ENDPOINT PROTECTION VIRTUAL NETWORK PROTECTION FLEXIBLE LICENSING Under a single- pane Unified policy management Intuitive interface Robust reporting Immediate protection Zero-day threat protection (KSN) Shared cache for high performance Maximized density Scans and protects network traffic Intrusion prevention (IPS) Intrusion detection (IDS) Prevents AV storms Per core licensing Per machine licensing Security for Virtualization Agentless Security with vShield and vCloud
Questions to Ask Yourself 25 How do you currently handle patching? Is your security simple to manage? What % of malware attacks is it okay to let through? How do you protect mobile users from malicious/improper sites? Do you have smartphones and tablets in your environment? Do you have any confidential customer/company information? Does everyone need the same level of access and permissions? Do you know what HW and SW you have in your environment? Is your virtualization environment as secure as it should be? Are you REALLY happy with your current solution?
Down and Dirty ROI If web surfing was faster from not having so many add-ons? If the computer wasnt so slow from all of the random applications installed? If the default search was not some unknown search engine? If there werent so many toolbars? If users didnt go to unsafe or inappropriate websites? If the computer didnt have to reboot in the middle of the day? How much total time would be saved each day? $24,000 average (fully encumbered) $2000/month for 12 months $500/week for 4 weeks $100/day for 5 days $12.50/hour for 8 hours $0.20/minute for 60 minutes For just one minute each day for each employee... $0.20/minute saved per day $1/week $4/month $48/year
In order to sleep peacefully at night… 27 Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting SEE Configure and deploy Set and enforce IT policies Manage employee- owned devices Prioritized patches License Mgmt. Network Access Control CONTROL Evolve beyond just anti-virus Meet security demands Protect data and devices anywhere Rely on expertise of trusted vendors PROTECT
Thank You! Kaspersky Lab Steven Winfield, Regional Channel Manager