Presentation is loading. Please wait.

Presentation is loading. Please wait.

Per Söderqvist Per Söderqvist Sales Engineer

Similar presentations


Presentation on theme: "Per Söderqvist Per Söderqvist Sales Engineer"— Presentation transcript:

1 Per Söderqvist Per Söderqvist Sales Engineer
Some points to make: 3 Crucial things Layered security – well bars will only help you so and so much Sync Security – If guards and security systems can communicate this will be a weakness. RCA: End with this what is the most important thing well learning from your mistakes… Per Söderqvist Per Söderqvist Manager, Sales Engineer Nordics Sales Engineer

2 Next-Gen Firewall UTM Endpoint Wireless Analytics Next-Gen Endpoint Education Web Mobile Server File Encryption Disk Encryption

3 ^Source: The State of Endpoint Security Today Survey
CryptoCurrency malware using other machines to mine Crypto Advanced Malware *Malware that will not be detected by traditional AV New version of ransomware *Mery Christmas Ransomware SamSam RaaS Source: SophosLabs ^Source: The State of Endpoint Security Today Survey

4 Demo

5 Most Common Network Topology
Vulnerable to lateral movement Internet Firewall Local Area Network Switch Now when it comes to the spread of threats on the internal network or LAN (also called lateral movement) it’s important to give the Firewall a fighting chance of blocking it. The Engineers in the audience probably already know this, but this illustration shows one network topology that is often used by customers that is not recommended for the best protection since all endpoints are connected through a single switch fabric and able to talk to each other without the firewall inspecting any of that traffic. In this setup, the firewall can only see traffic flowing in or out of the network, so while it can help prevent threats entering the network, it cannot prevent threats spreading unhindered within the network. INFECTED HOST INFECTED HOST

6 Best Practices Network Topology
Internet Firewall Internal Zone IoT Zone Server Zone Guest Zone That’s why we recommend network segmentation as a best-practice topology for deploying a firewall… Segment LANs into smaller, isolated zones or VLANs that are secured and connected together by the firewall.  Then be sure to apply suitable IPS policies to rules governing the traffic traversing these LAN segments to prevent exploits, worms, and bots from spreading between LAN segments. XG Firewall offers flexible and easy segmentation tools like zones and VLANs to secure your LAN and reduce the risk of lateral movement and our hardware supports lots of additional ports specifically for this kind of setup.

7 Protection layers on the Endpoint
Web Control Device Control App Control Firewall Control infection paths Web Security Deep Learning Skript- Analysis Download Reputation Live Protection Signatures Heuristics Pre-execution Host Intrusion Prevention Credential Theft Protection Exploit Prevention Anti-Hacker Anti- Ransomware Memory Scan Botnet-Traffic- Detection During execution Extended Cleanup Blocking Quarantine Recovery Synchronized Security Reaction Logging & Reporting Central Management Root Cause Analysis Alerting Visibility

8 Control infection paths
Web Control Device Control App Control Firewall Control infection paths Web Security Deep Learning Skript- Analysis Download Reputation Live Protection Signatures Heuristics Pre-execution Credential Theft Protection Exploit Prevention Host Intrusion Prevention Anti-Hacker Anti- Ransomware Memory Scan Botnet-Traffic- Detection During execution Extended Cleanup Blocking Quarantine Recovery Synchronized Security Reaction Logging & Reporting Central Management Root Cause Analysis Alerting Visibility

9 Intercept X was built to defend against not just known threats, but never-seen-before threats as well With the power of our deep learning technology and advanced capabilities, we can actually foretell the good from the bad. And in a way, it lets us “see the future.” And as we like to say here at Sophos, “Seeing the future is the future of cybersecurity.” (click)

10 What is Sophos ? PROTECTION FROM UNKNOWN THREATS
PROTECTION FROM RANSOMWARE PROTECTION FROM HACKER ACTIVITY EXTENDED CLEANUP ROOT CAUSE ANALYSIS Intercept X ist ein per Sophos Central verwaltetes Produkt, das die vorher genannten Technologien beinhaltet und zusätzlich zu einem bestehenden Endpoint/Anti-Virusprodukt eingesetzt wird – sei es ein Sophos Central verwalteter Endpoint oder ein Mitbewerber-AV

11 Invincea’s Data Scientists using DARPA driven technology
One of the first IT-Security vendors to use Deep Learning

12 Computing power and deep knowledge about Artificial Intelligence
100’s of Millions of Malware Samples Computing power and deep knowledge about Artificial Intelligence

13 Synchronized Security
Linking Network and Endpoint security to deliver unparalleled protection by automating threat discovery, analysis, and response.

14 Sneak Preview.

15 Social Engineering – One of the biggest threats
Social Engineering bypasses all technologies, including firewalls. – Kevin Mitnick

16 Demo PhishThreat

17


Download ppt "Per Söderqvist Per Söderqvist Sales Engineer"

Similar presentations


Ads by Google