29
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015

KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

Embed Size (px)

Citation preview

Page 1: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY ENDPOINT SECURITYFOR BUSINESS

2015

Page 2: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

Cyber Incidents Investigati

on

2

Threat reportsTargeted

attacks and malware

campaigns

Continued Exploitation of

Vulnerabilities in 3rd party software

325,000New Endpoint Threats per

day

Increased Threats to Mac

machines

Exponential growth of mobile

malware

WHAT WE SEE TODAY

Page 3: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

3

WHAT IS NEEDED TO SECURE YOUR BUSINESS?

Security Intelligence

A comprehensive security platform that leverages all

three

Multi-layered protection against know, unknown and advanced threats

Innovative Technology

Page 4: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

5

GLOBAL RESEARCH AND ANALYSIS TEAMWORLD’S LEADING THREAT RESEARCH

EXPERTS

THREAT DISCOVERY CULTURE

ACCUMULATED KNOWLEDGE

AUTOMATEDSYSTEMS

Page 5: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

HIPS and Personal Firewall

System watcher

Automatic Exploit Prevention

Cloud-based protection

Heuristic scanning

4

MULTI-LAYERED PROTECTIONThe best security foundation possible – Kaspersky Lab’s industry-leading protection against known, unknown and advanced threats

Signature-based protection

Powerful multi-layered protection from all forms of cyber-threatKNOWN

UNKNOWN

ADVANCED

Page 6: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY LAB MULTI-LAYERED SECURITYK

now n

Th

rea ts

File Download File StartFile Execution

29%70% 1%

Proactive Technologies

Reactive Technologies

An

ti-

Ph

ish

ing

(e

mail

tr

affi

c)

HIP

S &

Fir

ew

all

(netw

ork

tr

affi

c)

UR

L

Fil

teri

ng

(web

tr

affi

c)

An

ti-S

pam

(em

ail

tr

affi

c)

Bla

ckli

sti

ng

Un

kn

ow

nTh

reats

Heu

risti

c s

Wh

iteli

sti

ng

Ap

p

Con

trol

Ad

van

ced

Th

reatsBSS

AE P

Syste

m sW

atc

he r

Kaspersky Security Network

Vulnerability Assessment & Patch Management

6

Page 7: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

5

POWERED BY GLOBAL INTELLIGENCE NETWORKKASPERSKY SECURITY NETWORK

Continuously feeds new data to protection

components

Global security intelligence

Global cloud network -threat related information

from 60 million+ users

KASPERSKY GLOBAL USERS

KASPERSKY SECURITYNETWOR

K

Page 8: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

9

KASPERSKY LAB PROVIDES BEST IN THE INDUSTRY PROTECTION*

9

20 40 60 80 100

0%

20%

40%

60%

80%

100%

N of independent tests/reviews

Sco

re o

f TO

P 3

pla

ces

Bitdefender

Sophos

G DATA

Symantec

F-Secure

Intel Security (McAfee)

Trend Micro

Avira

Avast

BullGuard

AVG

ESET

AhnLab

Microsoft

Panda Security

In 2014 Kaspersky Lab products participated in 93 independent tests and reviews. Our products were awarded 51 firsts and received 66 top-three finishes.

* Notes:• According to summary results of

independent tests in 2014 for corporate, consumer and mobile products.

• Summary includes tests conducted by the following independent test labs and magazines: Test labs: AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin

• The size of the bubble reflects the number of 1st places achieved.ThreatTrack (VIPRE)

Qihoo 360

Kingsoft

Tencent

Kaspersky Lab1st places – 51

Participation in 93 tests/reviewsTOP 3 = 71%

Page 9: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY ENDPOINT SECURITYFOR BUSINESS

Introducing…

Page 10: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

11

Powerful multi-layered protection against known, unknown and advanced threats, designed and built by the industry’s leading security experts. Kaspersky Endpoint Security for Business, backed by world-renowned threat intelligence, provides unequalled IT security and control

Page 11: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

12

IN DETAIL

Internet GatewayCollaboration MailTOTALVulnerability

Assessment & Patch

Management

Inventories & License Control

Software Distribution OS deployment SIEM integration

Data Encryption

ADVANCED

Mobile Application Management

MobileDevice Management

DeviceControl

ApplicationControl

WebControl

File Server Security

MobileSecurity

SELECT

Anti-Malware + Firewall

Kaspersky SecurityCenter

CORE

Cloud-enabled via theKaspersky Security Network

(KSN)

Endpoint ManagementInfrastructur

e

Page 12: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

13

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

ANTI-MALWAREprotection against known, unknown and advanced threats

SYSTEMS MANAGEMENT Vulnerability detection & patch

management plus extended client management capabilities

NEW FEATURES

DATA ENCRYPTIONfully integrated data protection

NEW FEATURES ENDPOINT CONTROL TOOLS

application, device And web controls

NEW FEATURES

MOBILE SECURITYsmartphone and tablet security and

management

NEW FEATURES

KASPERSKYSECURITY CENTER

NEW FEATURES

Endpoint security technologies built into this single platform include:All managed through a single management console: Kaspersky Security Center

• Including SIEM support

• Including 2-stage authentification

• Including self-service portal and web console

• Including Default Deny test environment

• Including RBAC

Page 13: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

14

KASPERSKY SECURITY CENTER – ENTERPRISE MODEOptional Role-Based Access Control (RBAC) for larger IT Departments with distributed management responsibilities

KasperskySecurity Centre

Single IT Administrator

Kaspersky Endpoint Security for Business. All tiers

Kaspersky Endpoint Security for Business. Advanced tier

Kaspersky Endpoint Securityfor Business. Advanced Business tier

Data ProtectionManagement

Patch Management

Mobile EndpointManagement

Workstation Securityand Control

Page 14: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY ENDPOINT SECURITYFOR BUSINESS - SELECT

Also includes:• Application, Web and Device

controls • Kaspersky security for mobile

Page 15: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

16

ENDPOINT CONTROL

DEVICE CONTROL

WEB CONTROL

APPLICATION CONTROLWITH DYNAMIC WHITELISTING

Page 16: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

17

MORE ABOUT APPLICATION CONTROL AND WHITELISTINGApplications Lifecycle Control – Protection from Known and Unknown threats

Application Startup Control

Application Privilege Control

Vulnerability Monitor

Behavioral Analysis

CLOUD Whitelisting

Local Whitelisting

Page 17: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

18

KASPERSKY SECURITY FOR MOBILEProactive security, management and control for mobile endpoints

Mobile Security• Multilayered

anti-malware• Web Protection• Rooting/Jailbreak

detection

Mobile DeviceManagement• Exchange

ActiveSync• iOS MDM • Samsung

KNOX

Mobile Application

Management• App Wrapping• App Control• Selective Wipe

Anti-Theft• Lock/Wipe• Locate/Alarm/

Mugshot• SIM Watch

NEW!Self-Service Portal

• BYOD enablement

• Certificate delivery

• Anti-Theft

Centralized Management• All major mobile

platforms• Other IT security

areas• Web

Console NEW

!

Page 18: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

19

A FULLY INTEGRATED MOBILITY SOLUTIONSecurity for Mobile, Desktop and Virtual Endpoints are managed together through a single console

Mobile Device

Management

Mobile Application

Management

Mobile Security

Kasp

ers

ky S

ecu

rity

Cen

ter Endpoint protection

Server protection

Control tools

Encryption

Systems

Management

Virtual infrastructure

Self

-Serv

ice

Port

al

Page 19: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY ENDPOINT SECURITYFOR BUSINESS - ADVANCED

Also includes:• Data encryption• Kaspersky systems management

Page 20: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

21

DATA ENCRYPTIONSimple Administration – Complex Capabilities

• File/folder (FLE)

• Full disk (FDE)

POWERFUL DATAENCRYPTION

• Application controls

• Device controls

RICH UNPARALLELEDINTEGRATION WITHCONTROL TOOLS

• Transparent/single sign-on

• Minimized footprint

OPTIMIZED FOR MINIMAL END-USER IMPACT

• Easy password recovery

• Remote management

STREAMLINEDADMINISTRATION• Pre-boot authentication

• Non-qwerty keyboards• 2-factor authentication

via tokens or smart cards

NEW!AUTHENTICATION

FLEXIBLE

Page 21: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

22

KASPERSKY SYSTEMS MANAGEMENTEnhance security and manage complexity

• Hardware & software inventories

• License management & compliance

• Guest device policies

INVENTORIES &LICENSE CONTROL • Multicast technology

supported• Policies for automatic

distribution• Optional after-hours

deployment

SOFTWAREDISTRIBUTION

• Easy image creation & deployment

• Wake-on-LAN support• Post-installation editing

support

OPERATING SYSTEMSDEPLOYMENT • HP ArcSight & IBM

QRadar• Enterprise-level

reporting • Improved IT security

NEW!INTEGRATION

SIEM

• Vulnerability detection & prioritization

• Distribution of patches & updates

• Patch delivery status reports

VULNERABILITY ASSESSMENT AND PATCH MANAGEMENT

NEW!

• Remote troubleshooting• Role-Based Access

Control• Control of all IT security areas

across the corporate network

CENTRALIZEDMANAGEMENTNEW

!

Page 22: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

23

ENDPOINT SOFTWARE LIFECYCLE MANAGEMENT

INVENTORIESREPORTING

PATCH/UPDATEDISTRIBUTION

APPLICATIONVULNERABILITY

DETECTION

OS DEPLOYMENTPATCH/UPDATEINSTALLATION

GOLDEN IMAGES

VULNERABILITYPRIORITIZATION

Page 23: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY TOTAL SECURITYFOR BUSINESS

Also includes:• Security for mail servers• Security for web gateways• Security for collaboration servers

Page 24: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

25

KASPERSKY TOTAL SECURITY FOR BUSINESS Comprehensive infrastructure protection beyond the endpoint

Security for Mail Server• Kaspersky Security for

Linux Mail Server• Kaspersky Security for

Microsoft Exchange Servers• Kaspersky Anti-Virus

for Lotus Notes/Domino

Security for Internet Gateway• Kaspersky Anti-Virus

for Proxy Server• Kaspersky Anti-Virus

for Microsoft ISA Server and Forefront TMG

Security for Collaboration• Kaspersky Security

for Microsoft SharePoint Server

Page 25: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

26

KASPERSKY ENDPOINT SECURITY FOR BUSINESSProgressive, feature-rich tiers

Kaspersky Endpoint Security For Business.

TOTAL

Kaspersky Endpoint Security For Business.

ADVANCED

Kaspersky Endpoint Security For Business.

SELECT

Kaspersky Endpoint Security For Business.

CORE

ANTI-MALWAREAPP, DEVICE,

WEB CONTROLMOBILE

SECURITYDATA

ENCRYPTIONSYSTEMS

MANAGEMENTMAIL, WEB ANDCOLLABORATION

Page 26: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKYTARGETED SOLUTIONS

Including Virtualization And Storage Security Solutions

Page 27: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

28

TARGETED SOLUTIONS

File Servers Systems Management

Mobile Mail Servers

Virtualization Collaboration Storage Internet Gateways

Page 28: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

29

SECURITY INTELLIGENCE IS IN OUR DNA

Independent recognition of our leadership in tests

Leading global threatintelligence. GREAT team

Expertise from the TOP down

Respected among TOP security organizations

Technology driven. Strong R&D

Leading discovery of the most complicated threats

See and predict security incidents

with Kaspersky Security Network

Page 29: KASPERSKY ENDPOINT SECURITY FOR BUSINESS 2015. Cyber Incidents Investigatio n 2 Threat reports Targeted attacks and malware campaigns Continued Exploitation

KASPERSKY ENDPOINT SECURITYFOR BUSINESS

www.kaspersky.com/business