Presentation is loading. Please wait.

Presentation is loading. Please wait.

Advanced Endpoint Security Data Connectors-Charlotte January 2016

Similar presentations


Presentation on theme: "Advanced Endpoint Security Data Connectors-Charlotte January 2016"— Presentation transcript:

1 Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential

2 Users Endpoints Are the Biggest Attack Surface
Breaches increased 48% in 2014 (PWC) Threats are more sophisticated Most start at the endpoint The biggest attack surface And the hardest to control Users take risks Browsing the web, opening attachments, connecting to public WiFi And they just want to work – security is not their top concern

3 More Protection with Higher Productivity
We need to protect users from advanced threats And $1 of prevention is worth $1,000,000 of detection But security should not lower productivity Restrict employee access to information Get in their way with alarms and blocks Weigh IT down with investigation and reimaging Gartner: Prevention is more cost-effective than detection But how do we make it work?

4 Today’s endpoint protection
Most companies have only AV and other signature based protection Application Control/Whitelisting Detection based protection- Behavior based Policy – no access to external storage, no internet browsing

5 Detection Is Never 100% Accurate
Threats are constantly changing IT is overwhelmed by non-stop alarms, investigation and remediation User productivity is constantly interrupted Gartner: Prevention is more cost-effective than detection But how do we make it work?

6 BUFFERZONE Advanced Endpoint Security
You can’t detect all threats. But you can contain them with BUFFERZONE. Isolates browsers, , removable media, Skype and more Increases user productivity with unrestricted internet access Protects against drive-bys, zero-days, advanced malware…w/o updates Reduces alarms, enables users to work while IT investigates Provides valuable data for incident investigation and forensics

7 Safe Browsing BUFFERZONE enables employees to browse the net safely
When the user browses to an untrusted location, the browser opens in the container (red) Anything that is downloaded (intentionally or not) is stuck inside the container IT can define trusted sites – e.g. SharePoint They are automatically opened in a different window, outside the container

8 Safe Removable Media Open any external media safely inside a container
USB memory, mobile phones, cameras… Any file is opened inside a container Users can view, edit and even save files back to the removable media without risk Blocks auto-runs

9 Safe Email Attachments
Attachments are opened in a dedicated container separate from one used for web browsing Provides protection from all types of malware, including phishing attempts and targeted attacks It is “locked-down” to prevent any exfiltration of data Employees can securely open attachments that contain personally identifiable information (PII) or other sensitive data, without risk of data leakage

10 How it Works

11 Dimensions of Isolation

12 Demo How it works animation User experience demo
LANDESK management demo

13 BUFFERZONE in the Enterprise

14 Using the Bridge to Extract Files
Users should view and save most files in the container Optimal from the security perspective If the user accidentally downloads malware it will be trapped inside the container and cannot infect the rest of the organization The BUFFERZONE Bridge is used to: Extract files from the container – e.g., to share them with another person or upload to an application Move files between the internet and containers

15 Three Bridge Options Basic bridge Extracts files from the container
Part of the standard product Secure Bridge Extracts files and then processes them to disarm and disable potentially malicious content Optional addition Compliant Bridge Extracts files and scans them with up to 3 antivirus engines to provide compliance with regulatory standards

16 Secure Bridge – How it Works
Downloaded files are automatically sent to the bridge server Disarms malicious content in seconds Makes invisible microchanges to file structure and metadata that destroy exploits Extracts text, formatting and safe components Supports Microsoft® Office, RTF, PDF, images, archives Optional – multiple AV scanners

17 Endpoint Intelligence
Organizations need better endpoint data to: Determine if an alarm indicates a real breach Identify attacks that have spread across the organization BUFFERZONE collects over 40 types of events: Registry alterations, file system activity, network activity and more Shares directly with SIEM and other analytics platforms

18 Click a logo for more info
Management Certified integration with LANDESK and McAfee Install, update, manage policy and more Can also be managed through Microsoft GPO On-premise BUFFERZONE management server for smaller installations Setup wizard for small installations Easy to manage for thousands of endpoints Click a logo for more info

19 The BUFFERZONE Advantage
Isolates all types of threats Configurable bridge Valuable intelligence Protects off-network devices Protection from advanced threats Easy to manage, no updates required Reduces false positives Complements existing security products Lower Total Cost of Ownership (TCO) Unrestricted access to the internet Access to removable media Continue working while alerts are verified Transparent User Experience

20 Thank You


Download ppt "Advanced Endpoint Security Data Connectors-Charlotte January 2016"

Similar presentations


Ads by Google