Presentation is loading. Please wait.

Presentation is loading. Please wait.

Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz

Similar presentations


Presentation on theme: "Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz"— Presentation transcript:

1 Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz support@ipuzzlebiz.com

2 Symantec Targeted Attack Protection 2 66% Breaches went undetected for 30 days or more 243 Days before detected 4 Months to remediate Organizations are NOT Stopping Targeted Attacks 42% Increase in Targeted Attacks Last Year

3 Not Just Big Companies Symantec Targeted Attack Protection 3 Greatest growth in 2012 is at companies with <250 employees Employees 2,501+ 50% 2,501+50% 1 to 2,500 50% 1,501 to 2,500 1,001 to 1,500 501 to 1,000 251 to 500 1 to 250 18% in 2011 9% 2% 3% 5% 31%

4 Symantec Stops Targeted Attacks TODAY Symantec Targeted Attack Protection 4 EndpointGatewayData Center Global Intelligence

5 Symantec IS Security Intelligence Symantec Targeted Attack Protection 5 7 Billion File, URL & IP Classifications 2.5 Trillion Rows of Security Telemetry 1 Billion+ Devices Protected 550 Threat Researchers 240 Million+ Contributing Users & Sensors 14 Operations & Response Centers

6 Symantec Targeted Attack Protection 6 EndpointGatewayData Center Global Intelligence

7 Proactive Endpoint Protection: Symantec Endpoint Protection Symantec Targeted Attack Protection 7 Intrusion Prevention Symantec’s patented Network Intrusion Prevention System blocks attackers from connecting over the network to your PCs and injecting their attacks. Advanced Scanning Symantec’s next- generation scanning technology blocks suspicious files – even those with no fingerprint – before they can run and steal your data. Insight Reputation Our Insight System leverages the wisdom of Symantec’s 100s of millions of users to compute safety ratings for every single software file on the planet, and uses this to block targeted attacks. SONAR Behavior Blocking Monitors software as it runs on your endpoints and automatically blocks software with suspicious behaviors even if that software has never been seen before. Symantec Maximum Repair The reality is that threats occasionally get through… Our aggressive SMR technology roots out such entrenched infections and kills them in seconds.

8 New: Network Threat Protection for Mac Symantec Targeted Attack Protection 8 Protect against drive-by downloads Prevent social engineering attacks Post infection detection Prevent social media attacks Protect against unpatched vulnerabilities

9 Symantec Targeted Attack Protection 9 EndpointGatewayData Center Global Intelligence

10 Symantec Web Gateway Proactive Gateway Protection Symantec Targeted Attack Protection 10 Symantec Messaging Gateway Symantec Email Security.cloud

11 Email Targeted Attack Trends Most targeted attacks are sent via email Burying Zero-Day Attacks inside of an attachment is a popular method Example: RSA Breach Secure Email Gateways will not block Other examples including malicious and/or shortened URLs Symantec Targeted Attack Protection 11

12 New: Gateway: Disarm for Symantec Messaging Gateway Disarm removes all active content and reconstructs a clean version Clean attachment is delivered in real-time User is never exposed to the attack Symantec Targeted Attack Protection 12 98% of Zero Day Exploits in 2013 BlockedWorks with Attachments Innovation Made by Symantec Research Labs

13 Gateway: Proactive Protection Email Security.cloud Symantec Targeted Attack Protection 13 SkepticReal Time Link Following Detect Malware At Final Destination Targeted Attacks, Spear Phishing, Phishing, Spam Evasion Tactics Understands short URLs, freewebs, delays, multi hops, multi destination Anticipate evolution of malware Predictive heuristics Identify anomalies Delivery behavior, message attributes, social engineering tricks, attachment method

14 Gateway: Proactive Protection Web Gateway Leverages anonymous telemetry data from hundreds of machines to construct a massive nexus of files, machines and domains Tracks nearly every binary in the world – Billions of files, adding millions every week – Uses age, prevalence, source and other attributes to assign a reputation rating to files Can accurately identify and block threats even if just a single Symantec user encounters them 14 Bad Safety Rating File is blocked Good Safety Rating File is whitelisted No Safety Rating Yet Can be blocked Symantec Targeted Attack Protection

15 15 EndpointGatewayData Center Global Intelligence

16 Data Center: The Real Target Symantec Targeted Attack Protection 16 “ …. More often endpoints / user devices simply provide an initial “foothold” into the organization, from which the intruder stages the rest of their attack.” 97 % of stolen data is from servers

17 Data Center: Proactive Protection for Physical/Virtual Least Privilege with Symantec Critical System Protection Symantec Targeted Attack Protection 17 Harden & Protect VMware Infrastructure Protect Domain Controllers Address PCI Compliance Requirements Stop Zero Day Attacks Shield Embedded Systems

18 Symantec Stops Targeted Attacks Symantec Targeted Attack Protection 18 EndpointGatewayData Center Global Intelligence New Network Threat Protection for Mac Disarm for Messaging Gateway

19 Thank you! Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Targeted Attack Protection 19


Download ppt "Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz"

Similar presentations


Ads by Google