Artificial Intelligence. Real Threat Prevention.

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Copyright 2009 Trend Micro Inc. Classification 11/3/10 1 Andy Dancer CTO – Trend Micro, EMEA Virtualisation and Cloud: New security for a new era.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Honeypot and Intrusion Detection System
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Changing World of Endpoint Protection
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
CLOUD COMPUTING cloud computing and its importance to large scale firms such as Apple and Microsoft.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Hello Cloud… Mike Benkovich
Antimalware Smackdown Name: Frank Simorjay Title: TwC Sr. Product Manager Microsoft Corporation Name: Scott Wu Title: MMPC Technical Program Manager Microsoft.
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Conclusion.
Norman Security Suite User friendly premium security.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Kaspersky Small Office Security INTRODUCING New for 2014!
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Palo Alto Networks - Next Generation Security Platform
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Artificial Intelligence. Real Threat Prevention. Todd Radermacher Renzo Saunders.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Clouding with Microsoft Azure
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Chapter 6: Securing the Cloud
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
Today’s cyber security landscape
[introduce yourself] Thanks for joining us today. We’re here to talk about why cyber security fails to provide protection for your data and what enSilo.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Panda Cloud Antivirus Pedro Bustamante
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Compliance with hardening standards
Defeat Tomorrow’s Threats Today
Active Cyber Security, OnDemand
بهترین راهکار را انتخاب کنید...
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Determined Human Adversaries: Mitigations
Capitalize on modern technology
Threat Landscape for Data Security
Cyber Security 2017 Trends and Start Ups.
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
The MobileIron® Threat Detection difference:
Determined Human Adversaries: Mitigations
NSA Security-Enhanced Linux (SELinux)
Securely run and grow your business
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Cybersecurity Simplified: Ransomware
Comparing Endpoint Protection Platforms: Comodo & Sophos
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Artificial Intelligence. Real Threat Prevention. Grant Moerschel Director of Sales Engineering

We make software that… predicts cyber attacks and blocks them on the endpoint in real-time before they ever execute. Prevents malware pre-execution Silences memory attacks, exploits, privilege escalation, fileless attacks Thwarts unauthorized scripts Rejects potentially unwanted programs (PUPs) from entering the environment Uncovers the presence of powerful tools that can be used against you All without prior knowledge Protection is not Cloud dependent

CylancePROTECT leverages the power of machines, not humans, to dissect malware’s DNA. Artificial intelligence then determines if the code is safe to run. Approved by Microsoft. We can stand alone or complement what you have. No signatures / infrequent updates Ultra light agent footprint SaaS convenience Deployment simplicity Privacy friendly Mac OS X support

2016 Gartner Endpoint Protection Platforms Magic Quadrant The Visionary Quadrant Leader “Cylance is easily the fastest growing EPP startup in the last ten years.” “The Cylance machine-learning algorithm has been demonstrated to be very accurate at detecting new variants and repacked versions of existing malware.” “Cylance will appeal to organizations looking for improved zero day malware protection, those looking for low impact protection for resource constrained platforms, and systems that are disconnected and cannot rely on regular signature updates.”

Risk vs. Cost Risk Cost Where most of the industry is focused Highest Risk Highest Cost Most Liability RESPOND Focus is on Minimizing damage – only variables are time to detect and time to contain Control Types SUSTAINED PROGRESS DETECT Focus is on Minimizing vulnerability and potential for harm Lowest Risk Lowest Cost Limited Liability PREVENT Cost Automated Semi-Automated Manual Control Approaches Source: Upcoming Release of Managing Risk and Information Security 2nd Edition – Malcolm Harkins

The Future of Security Present Cylance Past z Pre-Execution AV HIPS / ANTI-EXPLOITATION SANDBOXING ISOLATION EDR Pre-Execution Humans Needed Post-Execution Pre-Execution No Humans

Several Reasons Why Legacy Approaches are Broken AV Engines Can’t Keep Up Signatures Don’t Scale Mutations are the Rule not the Exception Humans are Required Network Encryption Makes You Blind

What is CylancePROTECT? Unrivaled Threat Prevention & Protection PREdictive PREvention PRE-Execution PRE-Zero-Day Enterprise Ready Malware | Exploits | Scripts Microsoft Approved AV Windows & Mac OS X SaaS Convenience PCI-DSS / HIPAA Compliant Lightweight & Flexible 1-3% CPU / ~40 MB Memory Footprint

DEMO

Cylance Unlocks the DNA of Malware Elastic Cloud Computing Now Makes it Possible We have 1000’s of nodes in AWS Algorithmic science puts machines to work Machine Learning Under the Hood Collect both good & bad files Extract features Train & Vectorize features Classify & Cluster A.I. produces confidence score Threat Indicators Anomalies, Destruction Data Loss, Deception

The Benefits of PROTECT What We Do: We Do NOT: Rely on Human Classifications Analyze Malware at the DNA-Level 99% Threat Prevention Require On-Premise Infrastructure Signatures Heuristics Behavioral Analysis No Updates Needed No Internet Connection Needed! Wait for Threats to Execute Micro-Virtualization Sandboxing Require Updates No Reliance on Human Knowable Indicators PREdictive & PREventative

500+ Customers. 1,200,000+ Endpoints Who We Are $77M in funding from 500+ Customers. 1,200,000+ Endpoints Awards

Questions?