What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.
-
Upload
caren-golden -
Category
Documents
-
view
237 -
download
0
Transcript of What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.
What’s new in SEP 12.1.5
Presenter’s Name HerePresenter’s Title Here
Major Attacks in 2014…
• Dragonfly
• CryptoLocker
• Gameover ZeuS
• Retail data breach
Increase in Targeted Attacks
Increase in targeted attack campaigns
+91% 2012
2013ISTR 2014
Targeted Attack Campaigns
2011 2012 2013
Email per Campaign
Recipient/Campaign
78
122
29
61
111
23
Campaigns
Duration of Campaign
165
408
779
4 days 3 days 8.3 days
ISTR 2014
Zero-Day Vulnerabilities
2006 2007 2008 2009 2010 2011 2012 20130
5
10
15
20
25
30
1315
912
14
8
14
23
Zero-Day Vulnerabilities, Annual Total,2006 - 2013Source: Symantec
23 zero-day vulnerabilities discovered in 2013
Increase from 14 in 2012
More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking
More zero-days in 2013 than in past two years combined
Targeted Industries
Public Administration (Gov.)
Services – Professional
Services – Non-Traditional
Manufacturing
Finance, Insurance & Real Estate
Transportation, Gas, Communications, Electric
Wholesale
Retail
Mining
Construction
16%15
141313
65
211
Top 10 Industries Targetedin Spear-Phishing Attacks, 2013Source: Symantec
ISTR 2014
Size of Targeted Organization
Targeted attacks are moving downstream
Move beyond Antivirus with Intelligent Security
Symantec IS Security Intelligence
Monitors Threats in 157+ countries
550 Threat Researchers
14 Data Centers World Wide
7 Billion
1 Billion+
2.5 Trillion
File, URL & IP Classifications
Devices Protected
Rows of Security Telemetry
Capturing previously unseen threats and attack methods
Putting “big data” analytics to work for every end user
More visibility across devices creates better context and deeper insight
2B+ events logged daily Over 100,000 security alerts generated annually
200,000 daily code submissions
Intelligent Endpoint ProtectionLayered protection to stop mass, targeted and advanced threats
Network Threat
ProtectionBlocks malware
before it spreads to your machine
and controls traffic
Advanced Scanning
Blocks suspicious files – even those
with no fingerprint – before they
can run and steal your data
InsightReputationSafety ratings for
every single software file on the planet, and
uses this to block targeted attacks
SONARBehavior Blocking
Blocks software with suspicious
behaviors to stop advanced threats
SymantecPower Eraser
Aggressive SMR technology roots out entrenched
infections and kills them in seconds
Intelligent security technologies
Big Data Analytics
Analytics
Warehouse
AnalystsAttack
Quarantine System
Endpoints
Gateways
3rd Party Affiliates
Global SensorNetwork
Global Intelligence Network
Global Data Collection
Honeypots
INSIGHT: Reputation Monitoring for SEP Contextual intelligence for dynamic analysis
Bad Safety RatingFile is blocked
Good Safety RatingFile is whitelisted
No Safety Rating YetCan be blocked
Monitors 1390 file behaviors to answer:
SONAR: Behavior Monitoring in SEP
Human-authoredBehavioral Signatures
Artificial Intelligence Based Classification Engine
Behavioral PolicyLockdown
Who is it related to?
What did it contain?
Where did it come from?
What has it done?
Provides Zero-Day Protection Against Unknown Threats
So… what’s new?
What’s New in 12.1.5Performance Enhancements Management Enhancements
• Better client performance
• Reduced network load with
bandwidth throttling
• Reduced network storage space
• Integrated repair tool for better
control
• Linux client management support
• Integrated Host Integrity tool
• Remote MAC deployment
• Enhanced competitive uninstaller
Performance Enhancements
Client performance
• Improve boot time by more than 10%
Bandwidth throttling
• Better control of bandwidth to SEPM
• Can control connections based on:
– File location
– Bandwidth
– Subnet
– File size
– File type
Content deltas
• Reduces disk space on SEPM by 85-95%• Store older content revisions as delta files
• Allows customers to cache more revisions
– Reduces the # of full definitions delivered over the network
Management Enhancements
Power Eraser Integration
• New option to run Power Eraser command from SEPM
• Reduce time to clean infected systems
• Mitigate False Positives
Power eraser
Repair
Linux client management
• Fully managed by SEPM
• Antivirus policy management
• Reporting, monitoring and logging
• Single client package
Host Integrity checking and policy enforcement
• Previously SNAC-only features now added to SEP– Host Integrity policies: pre-built and custom– Peer-to-Peer enforcement– Quarantine location
Remote deployment for Mac
• Remotely install Mac clients from the Symantec Endpoint Protection Manager (SEPM)
Updated competitive uninstaller
• Removes over 300 products from more than 60 vendors, including:– McAfee– Trend Micro– Kaspersky– Microsoft– Sophos– AVG– AhnLab– Avast– Bitdefender– CA– Eset– Malwarebytes
• 70 % Less scan overhead
• Smarter updates• Optimized for higher
VM densities
• Intelligent Security• Insight & SONAR• Advanced extended
protection
• Scalable, flexible control• Remote management• Granular policies and
reporting
Unrivaled Security Smarter Management
Blazing Performance
Compared to traditional scanning methods.
Symantec Endpoint Protection 12.1.5
3rd Party tests confirm Unrivaled Security & Blazing Performance
• Dennis Technology Labs (2014)• The only product to receive AAA ratings for
protection for the past FIVE quarters
• PASSMARK Report (2014)• Received the highest overall score and
dominated other products in terms of product performance
• AV-Test Org (2013)• Detects and removes more threats than any
other solution in its class
More Information…
What’s New at the Endpoint? –Move beyond AV
Customer Webcast on Oct. 28
Mini Video
Partner Webcast
Blog
Thank you!
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Presenter’s NamePresenter’s emailPresenter’s phone