Per Söderqvist Per Söderqvist Sales Engineer

Slides:



Advertisements
Similar presentations
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
LittleOrange Internet Security an Endpoint Security Appliance.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network security Product Group 2 McAfee Network Security Platform.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Synchronized Security Revolutionizing Advanced Threat Protection
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Understanding and breaking the cyber kill chain
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Proactive Incident Response
Chapter 40 Internet Security.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
ServerSwitch Intelligent Appliance Technology
Sophos Central for partners and customers: overview and new features
Your Partner for Superior Cybersecurity
A Virtual Tour of SophosLabs Building next-generation protection
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Synchronized Security
Critical Security Controls
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Real-time protection for web sites and web apps against ATTACKS
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Lesson Objectives Aims You should be able to:
Sophos Intercept Next-Gen Endpoint Protection
Securing Information Systems
Matt G change over point ?
McAfee Security Connected – Next Generation Security
Call AVG Antivirus Support | Fix Your PC
Intercept X for Server Early Access Program Sophos Tester
Cybersecurity Strategy
UNM Enterprise Firewall
Sizing …today. T: Here’s how. .
Intercept X Install alongside competitive AV
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Software-Defined Secure Networks in Action
Secure once, run anywhere Simplify your security with Sophos
Chapter 4: Protecting the Organization
What’s new in the Fall Creators Update for Windows Defender ATP
Network hardening Chapter 14.
(With Hybrid Network Support)
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Test 3 review FTP & Cybersecurity
6. Application Software Security
Cybersecurity Simplified: Ransomware
Presentation transcript:

Per Söderqvist Per Söderqvist Sales Engineer Some points to make: 3 Crucial things Layered security – well bars will only help you so and so much Sync Security – If guards and security systems can communicate this will be a weakness. RCA: End with this what is the most important thing well learning from your mistakes… Per Söderqvist Per Söderqvist Manager, Sales Engineer Nordics Sales Engineer

Next-Gen Firewall UTM Endpoint Wireless Analytics Next-Gen Endpoint Education Web Mobile Email Server File Encryption Disk Encryption

^Source: The State of Endpoint Security Today Survey CryptoCurrency malware using other machines to mine Crypto Advanced Malware *Malware that will not be detected by traditional AV New version of ransomware *Mery Christmas Ransomware SamSam RaaS Source: SophosLabs ^Source: The State of Endpoint Security Today Survey

Demo

Most Common Network Topology Vulnerable to lateral movement Internet Firewall Local Area Network Switch Now when it comes to the spread of threats on the internal network or LAN (also called lateral movement) it’s important to give the Firewall a fighting chance of blocking it. The Engineers in the audience probably already know this, but this illustration shows one network topology that is often used by customers that is not recommended for the best protection since all endpoints are connected through a single switch fabric and able to talk to each other without the firewall inspecting any of that traffic. In this setup, the firewall can only see traffic flowing in or out of the network, so while it can help prevent threats entering the network, it cannot prevent threats spreading unhindered within the network. INFECTED HOST INFECTED HOST

Best Practices Network Topology Internet Firewall Internal Zone IoT Zone Server Zone Guest Zone That’s why we recommend network segmentation as a best-practice topology for deploying a firewall… Segment LANs into smaller, isolated zones or VLANs that are secured and connected together by the firewall.  Then be sure to apply suitable IPS policies to rules governing the traffic traversing these LAN segments to prevent exploits, worms, and bots from spreading between LAN segments. XG Firewall offers flexible and easy segmentation tools like zones and VLANs to secure your LAN and reduce the risk of lateral movement and our hardware supports lots of additional ports specifically for this kind of setup.

Protection layers on the Endpoint Web Control Device Control App Control Firewall Control infection paths Web Security Deep Learning Skript- Analysis Download Reputation Live Protection Signatures Heuristics Pre-execution Host Intrusion Prevention Credential Theft Protection Exploit Prevention Anti-Hacker Anti- Ransomware Memory Scan Botnet-Traffic- Detection During execution Extended Cleanup Blocking Quarantine Recovery Synchronized Security Reaction Logging & Reporting Central Management Root Cause Analysis Alerting Visibility

Control infection paths Web Control Device Control App Control Firewall Control infection paths Web Security Deep Learning Skript- Analysis Download Reputation Live Protection Signatures Heuristics Pre-execution Credential Theft Protection Exploit Prevention Host Intrusion Prevention Anti-Hacker Anti- Ransomware Memory Scan Botnet-Traffic- Detection During execution Extended Cleanup Blocking Quarantine Recovery Synchronized Security Reaction Logging & Reporting Central Management Root Cause Analysis Alerting Visibility

Intercept X was built to defend against not just known threats, but never-seen-before threats as well With the power of our deep learning technology and advanced capabilities, we can actually foretell the good from the bad. And in a way, it lets us “see the future.” And as we like to say here at Sophos, “Seeing the future is the future of cybersecurity.” (click)

What is Sophos ? PROTECTION FROM UNKNOWN THREATS PROTECTION FROM RANSOMWARE PROTECTION FROM HACKER ACTIVITY EXTENDED CLEANUP ROOT CAUSE ANALYSIS Intercept X ist ein per Sophos Central verwaltetes Produkt, das die vorher genannten Technologien beinhaltet und zusätzlich zu einem bestehenden Endpoint/Anti-Virusprodukt eingesetzt wird – sei es ein Sophos Central verwalteter Endpoint oder ein Mitbewerber-AV

Invincea’s Data Scientists using DARPA driven technology One of the first IT-Security vendors to use Deep Learning

Computing power and deep knowledge about Artificial Intelligence 100’s of Millions of Malware Samples Computing power and deep knowledge about Artificial Intelligence

Synchronized Security Linking Network and Endpoint security to deliver unparalleled protection by automating threat discovery, analysis, and response.

Sneak Preview.

Social Engineering – One of the biggest threats Social Engineering bypasses all technologies, including firewalls. – Kevin Mitnick

Demo PhishThreat