26
. McAfee Confidential Wim van Campen Regional VP, Northern & Eastern Europe Optimale Endpoint Protection - en beste bescherming tegen Ransomware

Presentatie McAfee: Optimale Endpoint Protection 26062015

Embed Size (px)

Citation preview

Page 1: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Wim van CampenRegional VP, Northern & Eastern Europe

Optimale Endpoint Protection - en beste bescherming tegen Ransomware

Page 2: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Four Phases of an Attack

2

Example: Fake AV

How the attacker first crosses path with target.

First Contact

Malicious Website

Network Access

Physical Access

Unsolicited Message

How the attacker gets code running first time on target machine.

Local Execution

Configuration Error

Exploit

Social Engineering

How the attacker persists code on the system, to survive reboot, stay hidden, hide from user and security software.

Establish Presence

Persist on System

Self-Preservation

Download Malware

Escalate Privilege

The business logic, what the attacker wants to accomplish, steal passwords, bank fraud, purchase Fake AV.

Malicious Activity

Adware & Scareware

Identity &Financial Fraud

Propagation

Bot Activities

Tampering

Malicious Website

Exploit

Persist on System

Adware & Scareware

Page 3: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

LOCAL EXECUTION ESTABLISH PRESENCE MALICIOUS ACTIVITYFIRST CONTACT

4 Phase Protection Methods

McAfee® SiteAdvisor®

Website Filtering

McAfee Enterprise Mobility Management

Mobile Device Management

McAfee Device Control

Physical File Transfer

McAfee Desktop Firewall

McAfee Desktop Firewall

McAfee Web Gateway and McAfee Email Gateway

Web Filtering Email Filtering

McAfee VirusScan® Enterprise

On-Access Scanning File Scanning Write Blocking

McAfee Database Activity Monitor

Database Vulnerability Blocking

McAfee VirusScan® Enterprise

Rootkit Detection

McAfee Host Intrusion Prevention

Buffer Overflow Prevention Behavioral Prevention

McAfee Application Control for Servers or Desktops

Install and Execution Prevention Change Protection

3

Page 4: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Intel Security - A Proven Leader in Endpoint Security

4

Gartner Magic Quadrant Leader for 7 straight years!

Placed furthest on Completeness of Vision axis

Superior Manageability with ePO

Next Generation Endpoint Platform

Security Connected Vision attainable for customers

Advancing Protection Rankings

Comprehensive Solution

Strength of Intel / McAfee Together

Gartner DisclaimerThis graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/technology/reprints.do?id=1-26F1285&ct=141223&st=sb. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Page 5: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Portfolio voor SLB

5

EPACDE-AA MFE Endpoint Protection   CEECDE-AA MFE Complete EP Protection   ACDCKE-AA MFE Application Control for PC   ACSCKE-AB MFE Application Control for Servers   MOVCDE-AA MFE MOVE AV for Virtual Desktop   MOVCKE-AT MFE MOVE AV for Virtual Servers   TSBECE-AA MFE SaaS Endpoint Protection  CDBCDE-AA MFE Complete Data Protection   

Page 6: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Uitgelicht

6

McAfee Endpoint Protection - gebruik tot 1.000 nodes

Speciaal Umbrella License Pack voorziet in gebruik voor Instituut, geregistreerde medewerkers en geregistreerde studenten mbt :

PRODUCT CONTENT: VirusScan Enterprise, VirusScan Command Line, VirusScan Enterprise for Linux, SiteAdvisor Enterprise with Web Filtering, Endpoint Protection for MAC, Device Control, Desktop Firewall, McAfee Security for Email Servers with AntiSpam. Management system included: ePolicy Orchestrator.

McAfee Endpoint Protection - Advanced Suite Pack – gebruik tot 10.000 nodes

Speciaal Umbrella License Pack voorziet in gebruik voor School, geregistreerde medewerkers en geregistreerde studenten mbt

PRODUCT CONTENT: VirusScan Enterprise, VirusScan Command Line, VirusScan Enterprise for Linux, Endpoint Protection for MAC, Host Intrusion Prevention for Desktops, Desktop Firewall,  Device Control, SiteAdvisor Enterprise with Web Filtering, McAfee Security for Email Servers with AntiSpam, Policy Auditor for Desktop. Management system: ePolicy Orchestrator.

Page 7: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential7

Endpoint Security Product Suites 2015

Endpoint Protection

EPS

Endpoint Advanced

EPA

CompleteEnterprise

CEE

MOVE for VDI License per OS

Instance

McAfee ePolicy Orchestrator (ePO - Security Management Platform)

Anti-Virus / Antispyware (Windows for Desktop and Server)

Anti-Virus Multiplatform (MAC / Linux / Unix for Desktop and Server)

SiteAdvisor Enterprise incl. Web Filter Endpoint

Desktop Firewall (Desktop and Server)

Security for Email Servers (Microsoft Exchange and Lotus Domino)

Device Control (Desktop)

ePO Deep Command Discovery

Host IPS (Desktop)

Policy Auditor (Desktop)

EMM Enterprise Mobility Management & Secure Container (Android) & VirusScan Mobile (Android)

Application Control (Desktop)

MOVE AV for Virtual Desktops (VDI)

VSE & VSEL for the Scan Server

VSE for Offline Virtual Images

Datacenter Connector for VMware and vSphere

Page 8: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Voorkom schade door Ransomware 2015 nu al het jaar van de Ransomware

8

Page 9: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential9

Agenda

1. Ransomware in het nieuws

• 2015 het jaar van de Ransomware

2. Ransomware (korte) opfrisser

• Bezorgen

• Verspreiding

• Schade

3. Ransomware groeit enorm

• Waarom?

4. Voorkomen (is beter dan genezen)

• Intel Security benadering

Page 10: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential10

Ransomware in het nieuws

Page 11: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential11

Waar?

Page 12: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential12

Ransomware korte opfrisser

• Wat is Ransomware/Cryptoware

• Schade

• Bezorgen

• Verspreiding

Page 13: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential13

New technologies have been adapted over the years to make ransomware more powerful

Ransomware returns: new families emerge with a vengeance

Source: McAfee Labs

Page 14: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Ransomware returns Beginning in Q3 2014, the number of new ransomware samples began to grow again after a four-quarter decline.

In Q4 2014, the number of new samples leaped 155%, we counted more than two million samples.

3 months later, in Q1 2015, this family of malware has exploded with a further 165% increase and driving towards an incredible 3 million samples!

Page 15: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

I need a solution to this problem

It takes an Advanced System that is easy to implement,

operate and maintain

Source: McAfee Labs

Page 16: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Employing an advanced system moves detection

from 63% to 99.96%*

*Source: McAfee Labs and Avtest Org

Page 17: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Endpoint ModuleEndpoint ModuleManagement

Console

Intel SecurityATD

YES NO

Global ThreatIntelligence

3rd PartyFeeds

Data Exchange Layer

Threat Intelligence Exchange Server

File age hidden

Signed with a revoked certificate

Created by an untrusted process

Ransomware Prevention ModelAdapt and Immunize — From Encounter to Containment in Milliseconds

Page 18: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

SIEM Endpoint ModuleEndpoint ModuleManagement

Console

Intel SecurityATD

Web Gateway Email GatewayNGFW IPS

Instant Ransomware Protection

Data Exchange Layer

Global ThreatIntelligence

3rd PartyFeeds

Gateways block access based on endpoint convictions

Security components

operate as one to immediately share

relevant data between endpoint, gateway, and other security products

Proactively and efficiently protect your organization

as soon as a threat is revealed

Threat Intelligence Exchange Server

Page 19: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

SIEM Endpoint ModuleEndpoint ModuleManagement

Console

Intel SecurityATD

Web Gateway Email GatewayNGFW IPS

Instant Ransomware ProtectionAdapt and Immunize — From Encounter to Containment in Milliseconds

Data Exchange Layer

NOYES

Global ThreatIntelligence

3rd PartyFeeds

Endpoints are protected based on gateway convictions

Threat Intelligence Exchange Server

Page 20: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Instant Ransomware Protection ExampleAdapt and Immunize — From Encounter to Containment in Milliseconds

Page 21: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Employing an advanced system moves detection

from 63% to 99.96%*

*Source: McAfee Labs and Avtest Org

Page 22: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

In theory everything sounds great, how about in real life?

Page 23: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Nieuw in SLB contract

23

Advanced Threat Defense (ATD)

De huidige malware is gemaakt met het doel om zo lang mogelijk niet ondekt te worden. De traditionele virusscanner kan de geavanceerde malware lang niet allemaal tegen houden. Zeker niet als het Malware is die nog nooit is gezien in de wereld. Deze Malware (zero day attacks) detecteren vergt andere technieken. Advanced Threat Defense pakt deze files (PDF, Excel, Word etc.) uit in een beveiligde omgeving alvorens zij op de endpoint terecht komen. In deze veilige omgeving doet de ATD appliance een serie van testen om te kijken wat deze file wilt doen met uw endpoint. Wanneer een file kwaadwaardig is, dan zal de ATD de nodige maatregelen nemen op de betreffende endpoint én alle andere endpoints om deze malware te verwijderen dan wel preventief te blokkeren. Dit zorgt voor een maximale preventie en maakt het bijna onmogelijk om een groot network te infecteren.

Page 24: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential

Uitgelicht

24

McAfee ATD/TIE Starter Kit - 2500 nodesDe 2500 ATD/TIE Starter Kit bevat: 1 ATD 3000 Appliance met 1jr Hardware Support + Gold Software Support. Perpetual Licenses met Gold Software Support voor 2500 Nodes van McAfee Threat Intelligence Exchange Software.

McAfee ATD/TIE Starter Kit – 10.000 nodesDe 2500 ATD/TIE Starter Kit bevat: 1 ATD 6000 Appliance met 1jr Hardware Support + Gold Software Support. Perpetual Licenses met Gold Software Support voor 10.000 Nodes van McAfee Threat Intelligence Exchange Software.

Page 25: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential25

Bescherming in 99,96% van de gevallenSamenvattend – Instant Ransomware Protection

Ja, ransomware is in opkomst en kan leiden tot imago-schade en financiële schade.

Ja, ransomware vindt ook in Nederland plaats, bij thuisgebruikers, MKB en grote bedrijven.

Ja, het is mogelijk om uzelf te beschermen tegen ransomware met behulp van onze Instant Ransomware Protection.

Page 26: Presentatie McAfee: Optimale Endpoint Protection 26062015

.

McAfee Confidential26