28
What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Embed Size (px)

Citation preview

Page 1: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

What’s new in SEP 12.1.5

Presenter’s Name HerePresenter’s Title Here

Page 2: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Major Attacks in 2014…

• Dragonfly

• CryptoLocker

• Gameover ZeuS

• Retail data breach

Page 3: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Increase in Targeted Attacks

Increase in targeted attack campaigns

+91% 2012

2013ISTR 2014

Page 4: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Targeted Attack Campaigns

2011 2012 2013

Email per Campaign

Recipient/Campaign

78

122

29

61

111

23

Campaigns

Duration of Campaign

165

408

779

4 days 3 days 8.3 days

ISTR 2014

Page 5: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Zero-Day Vulnerabilities

2006 2007 2008 2009 2010 2011 2012 20130

5

10

15

20

25

30

1315

912

14

8

14

23

Zero-Day Vulnerabilities, Annual Total,2006 - 2013Source: Symantec

23 zero-day vulnerabilities discovered in 2013

Increase from 14 in 2012

More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking

More zero-days in 2013 than in past two years combined

Page 6: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Targeted Industries

Public Administration (Gov.)

Services – Professional

Services – Non-Traditional

Manufacturing

Finance, Insurance & Real Estate

Transportation, Gas, Communications, Electric

Wholesale

Retail

Mining

Construction

16%15

141313

65

211

Top 10 Industries Targetedin Spear-Phishing Attacks, 2013Source: Symantec

ISTR 2014

Page 7: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Size of Targeted Organization

Targeted attacks are moving downstream

Page 8: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Move beyond Antivirus with Intelligent Security

Page 9: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Symantec IS Security Intelligence

Monitors Threats in 157+ countries

550 Threat Researchers

14 Data Centers World Wide

7 Billion

1 Billion+

2.5 Trillion

File, URL & IP Classifications

Devices Protected

Rows of Security Telemetry

Capturing previously unseen threats and attack methods

Putting “big data” analytics to work for every end user

More visibility across devices creates better context and deeper insight

2B+ events logged daily Over 100,000 security alerts generated annually

200,000 daily code submissions

Page 10: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Intelligent Endpoint ProtectionLayered protection to stop mass, targeted and advanced threats

Network Threat

ProtectionBlocks malware

before it spreads to your machine

and controls traffic

Advanced Scanning

Blocks suspicious files – even those

with no fingerprint – before they

can run and steal your data

InsightReputationSafety ratings for

every single software file on the planet, and

uses this to block targeted attacks

SONARBehavior Blocking

Blocks software with suspicious

behaviors to stop advanced threats

SymantecPower Eraser

Aggressive SMR technology roots out entrenched

infections and kills them in seconds

Intelligent security technologies

Page 11: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Big Data Analytics

Analytics

Warehouse

AnalystsAttack

Quarantine System

Endpoints

Gateways

3rd Party Affiliates

Global SensorNetwork

Global Intelligence Network

Global Data Collection

Honeypots

INSIGHT: Reputation Monitoring for SEP Contextual intelligence for dynamic analysis

Bad Safety RatingFile is blocked

Good Safety RatingFile is whitelisted

No Safety Rating YetCan be blocked

Page 12: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Monitors 1390 file behaviors to answer:

SONAR: Behavior Monitoring in SEP

Human-authoredBehavioral Signatures

Artificial Intelligence Based Classification Engine

Behavioral PolicyLockdown

Who is it related to?

What did it contain?

Where did it come from?

What has it done?

Provides Zero-Day Protection Against Unknown Threats

Page 13: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

So… what’s new?

Page 14: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

What’s New in 12.1.5Performance Enhancements Management Enhancements

• Better client performance

• Reduced network load with

bandwidth throttling

• Reduced network storage space

• Integrated repair tool for better

control

• Linux client management support

• Integrated Host Integrity tool

• Remote MAC deployment

• Enhanced competitive uninstaller

Page 15: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Performance Enhancements

Page 16: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Client performance

• Improve boot time by more than 10%

Page 17: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Bandwidth throttling

• Better control of bandwidth to SEPM

• Can control connections based on:

– File location

– Bandwidth

– Subnet

– File size

– File type

Page 18: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Content deltas

• Reduces disk space on SEPM by 85-95%• Store older content revisions as delta files

• Allows customers to cache more revisions

– Reduces the # of full definitions delivered over the network

Page 19: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Management Enhancements

Page 20: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Power Eraser Integration

• New option to run Power Eraser command from SEPM

• Reduce time to clean infected systems

• Mitigate False Positives

Power eraser

Repair

Page 21: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Linux client management

• Fully managed by SEPM

• Antivirus policy management

• Reporting, monitoring and logging

• Single client package

Page 22: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Host Integrity checking and policy enforcement

• Previously SNAC-only features now added to SEP– Host Integrity policies: pre-built and custom– Peer-to-Peer enforcement– Quarantine location

Page 23: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Remote deployment for Mac

• Remotely install Mac clients from the Symantec Endpoint Protection Manager (SEPM)

Page 25: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

• 70 % Less scan overhead

• Smarter updates• Optimized for higher

VM densities

• Intelligent Security• Insight & SONAR• Advanced extended

protection

• Scalable, flexible control• Remote management• Granular policies and

reporting

Unrivaled Security Smarter Management

Blazing Performance

Compared to traditional scanning methods.

Symantec Endpoint Protection 12.1.5

Page 26: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

3rd Party tests confirm Unrivaled Security & Blazing Performance

• Dennis Technology Labs (2014)• The only product to receive AAA ratings for

protection for the past FIVE quarters

• PASSMARK Report (2014)• Received the highest overall score and

dominated other products in terms of product performance

• AV-Test Org (2013)• Detects and removes more threats than any

other solution in its class

Page 28: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Presenter’s NamePresenter’s emailPresenter’s phone