1 / 28

Getting a Good Night Sleep

Going Beyond Anti-Virus. Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager. Getting a Good Night Sleep. Protecting Your Endpoints. Agenda. So why are we here talking about a commodity sale like anti-virus?. Endpoint Security is not just AV.

mercer
Download Presentation

Getting a Good Night Sleep

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Going Beyond Anti-Virus Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager Getting a Good Night Sleep Protecting Your Endpoints

  2. Agenda

  3. So why are we here talking about a commodity sale like anti-virus? Endpoint Security is not just AV

  4. So why are we here talking about a commodity sale like anti-virus? And endpoint security is where it is at

  5. The Endpoint is the Frontline… Verizon Data Breach Investigations Report 2013

  6. MALWARE and Threats: smarter, faster, more New threats per day Network attacks blocked per month 316,000+ 4,000,000 160,000,000+ Web-borne infections prevented per day 3,500,000 Advanced endpoint protection is required!!! 3,000,000 4,659,920 2,500,000 Mobile Malware in 2013 104,427 2,000,000 1,500,000 2013 1,000,000 500,000 0 1999 2003 2005 2007 2009 2011 2001

  7. The 5 Weapons of the Enemy • Malware: Ever-increasing threats • Mobility: Your data is on the move • Mine!: Employee-owned devices • Mistakes: Vulnerabilities in applications • Messy: The complexity of the IT environment

  8. So how do we fight back? Simplify!!!

  9. Think about it…

  10. Home entertainment used to be simple…

  11. However, home entertainment has changed… Samsung Plasma TV Apple TV Panasonic Blu Ray Denon Receiver Comcast Xfinity Xbox 360

  12. This Means Redundancy…and Increased Costs

  13. This Means Complexity…and Lack of Integration

  14. Increased costs, higher complexity, and lack of integration at home? Unhappy Spouse

  15. Increased costs, higher complexity, and lack of integration at work? Unhappy End Users Unhappy Boss Unhappy Job Increased Need for an Updated Resume

  16. So what does this have to do with Endpoint Security?

  17. The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management Data is easy to Move Response: Data encryption Device control Your data Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and Installing Response: Application control Web control

  18. The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management This is complexity. COMPLEXITY IS THE ENEMY OF IT SECURITY. Data is easy to Move Response: Data encryption Device control Your data Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and installing Response: Application control Web control

  19. The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management 1 Data is easy to Move platform management console cost Response: Data encryption Device control Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Your data Browsing and Installing Response: Application control Web control

  20. The Impact of Complexity on IT Security Investment Complexity Risk 1 platform management console cost Physical, Virtual, Mobile Windows, Mac, Linux --- Android, iOS, Windows Phone, BlackBerry, Symbian

  21. Kaspersky Endpoint Security for Business Anti Malware + Firewall

  22. KasperskyTOP 3 = 87% 73 tests1st places – (!) 31 TOP3 score results comparison EsetTOP 3 = 29% 51 tests1stplaces - 2 30 N of 1st places BitdefenderTOP 3 = 75% 53 tests1stplaces - 12 McAfeeTOP 3 = 21% N of tests - 551stplaces - 1 20 Trend MicroTOP 3 = 21% 54 tests1stplaces - 3 SophosTOP 3 = 39% 28 tests1stplaces - 1 SymantecTOP 3 = 58% 46 tests1stplaces - 9 10 Tests participated 10 20 30 40 50 60 70 80

  23. Kaspersky Endpoint Security for Business Collaboration Mail Web Total License Mgmt Network Access SW Installation Systems Management (SMS) Advanced Image Mgmt Patch Mgmt Vulnerability Scan Data Protection (Encryption) Kaspersky Security Center Mobile Device Management (MDM) Mobile Endpoint Security Select File Server Security Application Control Device Control Web Control Anti Malware + Firewall Cloud Enabled via the Kaspersky Security Network (KSN) Endpoint Management

  24. Security for Virtualization Agentless Security with vShield and vCloud SIMPLIFIED MANAGEMENT VIRTUAL ENDPOINT PROTECTION VIRTUAL NETWORK PROTECTION FLEXIBLE LICENSING Under a “single-pane” Unified policy management Intuitive interface Robust reporting Immediate protection Zero-day threat protection (KSN) Shared cache for high performance Maximized density Scans and protects network traffic Intrusion prevention(IPS) Intrusion detection (IDS) Prevents AV storms ‘Per core’ licensing ‘Per machine’ licensing

  25. Questions to Ask Yourself • How do you currently handle patching? • Is your security simple to manage? • What % of malware attacks is it okay to let through? • How do you protect mobile users from malicious/improper sites? • Do you have smartphones and tablets in your environment? • Do you have any confidential customer/company information? • Does everyone need the same level of access and permissions? • Do you know what HW and SW you have in your environment? • Is your virtualization environment as secure as it should be? • Are you REALLY happy with your current solution?

  26. Down and Dirty ROI • How much total time would be saved each day? If web surfing was faster from not having so many add-ons? If the computer wasn’t so slow from all of the random applications installed? If the default search was not some unknown search engine? If there weren’t so many toolbars? If users didn’t go to unsafe or inappropriate websites? If the computer didn’t have to reboot in the middle of the day? For just one minute each day for each employee... • $24,000 average (fully encumbered) • $2000/month for 12 months • $500/week for 4 weeks • $100/day for 5 days • $12.50/hour for 8 hours • $0.20/minute for 60 minutes • $0.20/minute saved per day • $1/week • $4/month • $48/year

  27. In order to sleep peacefully at night… CONTROL SEE PROTECT • Physical, virtual, mobile • Identify vulnerabilities • Inventory HW and SW • Take action with clear reporting • Configure and deploy • Set and enforce IT policies • Manage employee-owned devices • Prioritized patches • License Mgmt. • Network Access Control • Evolve beyond just anti-virus • Meet security demands • Protect data and devices anywhere • Rely on expertise of trusted vendors

  28. Thank You! Kaspersky Lab Steven Winfield, Regional Channel Manager Steven.Winfield@Kaspersky.com

More Related