What Cybercriminals Want: Company Data – by United Security Providers
Protect Yourself Against Today's Cybercriminals and Hackers
-
Upload
kaseya -
Category
Technology
-
view
798 -
download
0
description
Transcript of Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
Sept 14, 2011
Speakers
Jeff KeyesProduct Marketing
Scott BrackettProduct Manager
What We SeeThe Impact of Endpoint Attacks
04/12/2023
3 Copyright 2010. All Rights Reserved.
Losing the Battle Against Cybercrime
04/12/2023
4 Copyright 2010. All Rights Reserved.
– Bill Brenner, Senior Editor, CIO Magazine
Even those companies making sizable efforts to keep their data secure
admit it's almost impossible to outpace the
bad guys.
Losing the Battle Against Cybercrime
04/12/2023
5 Copyright 2010. All Rights Reserved.
– SANS.ORG, “The Top Cyber Security Risks”
The number of attacks is now so large and the criminals
sophistication is so great that many organizations are having trouble determining which new threats and vulnerabilities pose
the greatest risk and how resources should be allocated to ensure that the most probable
and damaging attacks are dealt with first.
Your Business is a Target
Cyber criminals have stolen at least
from small to mid-sized companies across America in a sophisticated but increasingly common
form of online banking fraud…
— Brian Krebs, Washington Post, 26 October 2009
$100 million
Malware Categories*WikiPedia
04/12/2023
Copyright 2010. All Rights Reserved.7
Viruses
• Programs that attach / embed to other applications (and then attempt to hide).
• Distribution– File sharing– Email– Instant Messenger– Hosted Email
• Polymorphic /Metamorphic
04/12/2023
Copyright 2010. All Rights Reserved.8
Worms (i.e. Conficker)
04/12/2023
Copyright 2010. All Rights Reserved.9
Trojans
04/12/2023
Copyright 2010. All Rights Reserved.10
Rootkits
04/12/2023
Copyright 2010. All Rights Reserved.11
Malware For Profit
• Spyware– Search revenue, Pop up ads
• Key logger– Information pushed to bad guys
• Botnet– General purpose network– DoS, SPAM, Brute Force Attacks
1204/12/2023
Copyright 2010. All Rights Reserved.
Phishing
Losing the Battle Against Cybercrime
04/12/2023
14 Copyright 2010. All Rights Reserved.
– Uri Rivner, RSA
88% of Fortune 500 companies has
compromised PC’s running Trojan’s in their
environments.
"Endpoint . . . solutions are now a PRIMARY line of defense . . .”
— Charles KolodgyResearch Director,
IDC Security Products Program
The Endpoint Is The TargetMalware On The Desktop Is The Goal
04/12/2023
15 Copyright 2010. All Rights Reserved.
"Endpoint . . . solutions are now a PRIMARY line of defense . . .”
— Charles KolodgySearch Director,
IDC Security Products Program
Why The Endpoint Is The TargetMalware On The Desktop Is The Goal
04/12/2023
16 Copyright 2010. All Rights Reserved.
Decentralized Data
Keys To The Kingdom
Complete Control
Why The Endpoint Is The TargetThe Endpoint is An Easy Target
04/12/2023
17 Copyright 2010. All Rights Reserved.
Easy Access
Mobile Data
Multiple Vectors
Scareware
The Web Under Permanent SiegeTargeted Attacks
2008 2009 2010 (Jan/Feb)
Adobe Reader MS Word MS Excel MS PowerPoint
28.61%
49.50%
61.20%
34.55%38.50%
24.30%19.97%
6.90%7.10%
16.87%
5.10%7.40%
Losing the Battle Against Cybercrime
04/12/2023
20 Copyright 2010. All Rights Reserved.
– Uri Rivner, RSA
“Once infected, malware, typically Trojans, will start
recording all Internet related traffic, perform keylogging, grab emails, browser-stored passwords, and a long list of
additional items.
Key Protection Elements
04/12/2023
Copyright 2010. All Rights Reserved.21
Internet / WANFirewall - Router /
Unified Threat Management
SPAM / Virus Filtered Email
Wireless Access
Phishing / Web Filtering
Kaseya’s Solution
04/12/2023
Copyright 2010. All Rights Reserved.22
Blended Protection / Unified Platform / Remediation / Partners
Patching
Operating SystemMS Office
3rd Party *
Antivirus
Kaseya Antivirus
Kaseya Endpoint Security
AntiMalware
Kaseya AntiMalw
are
Remediation
Agent Procedures
Monitoring
Service Desk & PSA
Scheduling & Management
Why Is Kaspersky Different?
• A Pioneer in Fighting IT Threats for 25 Years
• Security Technology of Choice
04/12/2023
Copyright 2010. All Rights Reserved.23
The Most Immediate ProtectionSmall Updates for the Best Protection and User Experience
Microsoft
Symantec
Trend Micro
CA
McAfee
Updates per Month
0 100 200 300 400 500 600 700
24
28
32
33
138
664
04/12/2023
24 Copyright 2010. All Rights Reserved.
Kaseya Antivirus
Fastest Response Time to New Threats
Eset
Sophos
Symantec
McAfee
Hours0 2 4 6 8
4 to 8 hours
4 to 6 hours
2 to 4 hours
2 to 4 hours
< 2 hours
04/12/2023
25 Copyright 2010. All Rights Reserved.
Kaseya Antivirus
AV Competition: General Overview
Criteria Kaspersky Lab
Symantec McAfee Sophos Panda BitDefender Avast!
AV-Comparatives: Approved 2010 Corporate Product
Yes No Yes Yes No Yes No
AV-Comparatives: Dec’ 09 Performance Test Score
193 188 174 193 Not incl. 154 188
AV-Comparatives: May’10 Proactive Test Advanced+Few false alarms
AdvancedFew false alarms
StandardMany false alarms
AdvancedFew false alarms
AdvancedMany false alarms
Advanced+V. few false alarms
AdvancedFew false alarms
AV-Comparatives: 2010 Overall Whole Product Dynamic Test
Advanced+ Advanced+ Not incl. Not incl. Advanced Advanced Not incl.
AV-Comparatives: Oct’ 09 Removal Test Advanced+ Advanced+ Advanced Advanced Not incl. Advanced+ Advanced
VB100: Aug’10 Reactive and Proactive Protection (RAP) Score
90.66% 66.06% 69.52% 78.87% Not incl. 86.95%(failed test)
86.06%
VB100: Aug’10 On-Demand Trojan Protection
93.79% 77.40% 87.19% 88.59% Not incl. 81.35%(failed test)
94.54%
VB100: Successful Results In Total 63 56 48 57 1 26 41
AV-test.org Q4-2010, Protection/Repair score
5.5 / 6.0 5.0 / 5.5 3.5 / 3.5 4.0 / 3.0 5.5 / 5.0 5.5 / 5.5 3.5 / 4.0
Worldwide System Infrastructure Software Revenue, 2009 Growth
42.0% -4.8% 1.8% 25.9% -6.2% Not in Top50 Not in Top50
International awards
| April 12, 2023
Kaspersky Lab Technology Alliances Business DivisionPAGE 27 |
The largest number of industry awards from IT publications and malware testing organizations globally
Why Anti-Malware?Best in the industry• 100+Million Downloads • 5+ Billion Threats Removed
What does it add?• Layered Protection • Lightweight Add-on to Antivirus• Focuses MAINLY on
– Working WITH Antivirus Engines– Zero Day– Pulled from Web– Antivirus Weaknesses
• Remediation & Cleaning
04/12/2023
Copyright 2010. All Rights Reserved.28
Cleanup
• Best in the industry for cleanup • Completely automated cleaning• Cleaning all aspects
– Processes– Browser Helper Objects– Toolbars– Registry– Files– Orphaned Folders– Rootkits
04/12/2023
Copyright 2010. All Rights Reserved.29
UI Conventions
Typical Workflow
• Consider location-specific settings
• Deploy Software
• Monitor & Remediate
Roadmap
Aggressive feature-set enhancements:
• Server Support (KAV)• LAN Share Support• Alert Integration• Improved Reporting• Enhanced logging and forensics• Integration with newest releases• UI Refinement and standardization• Much more…
Industry Buzz
Kaseya's products have a reputation for being easy to install and use, compared with many competitive products.
Gartner, 2011 (#G00209766)
“”
Kaseya’s IT Automation Framework can help many types of IT management organizations. Quickly. Affordably.
EMA, 2008 (#1429091307)
“
”
Service automation is vital to IT success. Kaseya is purpose-built for this next era of computing.
OVUM, 2010 (#TA001974ITM)
“”
Kaseya’s strength lies in the ease of implementation, support for their customers, and comprehensive service level management.
IDC, 2009 (#219336)
“
”
Industry Awards
Resources
Learn More About Kaseya http://www.kaseya.com/industries/service-providers.aspx
Free Trialhttp://www.kaseya.com/forms/free-trial.aspx
Price Quotehttp://www.kaseya.com/forms/price_ent.aspx
Contact [email protected], or toll free +1 415-694-5700