280 likes | 480 Vues
Going Beyond Anti-Virus. Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager. Getting a Good Night Sleep. Protecting Your Endpoints. Agenda. So why are we here talking about a commodity sale like anti-virus?. Endpoint Security is not just AV.
E N D
Going Beyond Anti-Virus Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager Getting a Good Night Sleep Protecting Your Endpoints
So why are we here talking about a commodity sale like anti-virus? Endpoint Security is not just AV
So why are we here talking about a commodity sale like anti-virus? And endpoint security is where it is at
The Endpoint is the Frontline… Verizon Data Breach Investigations Report 2013
MALWARE and Threats: smarter, faster, more New threats per day Network attacks blocked per month 316,000+ 4,000,000 160,000,000+ Web-borne infections prevented per day 3,500,000 Advanced endpoint protection is required!!! 3,000,000 4,659,920 2,500,000 Mobile Malware in 2013 104,427 2,000,000 1,500,000 2013 1,000,000 500,000 0 1999 2003 2005 2007 2009 2011 2001
The 5 Weapons of the Enemy • Malware: Ever-increasing threats • Mobility: Your data is on the move • Mine!: Employee-owned devices • Mistakes: Vulnerabilities in applications • Messy: The complexity of the IT environment
So how do we fight back? Simplify!!!
However, home entertainment has changed… Samsung Plasma TV Apple TV Panasonic Blu Ray Denon Receiver Comcast Xfinity Xbox 360
Increased costs, higher complexity, and lack of integration at home? Unhappy Spouse
Increased costs, higher complexity, and lack of integration at work? Unhappy End Users Unhappy Boss Unhappy Job Increased Need for an Updated Resume
The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management Data is easy to Move Response: Data encryption Device control Your data Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and Installing Response: Application control Web control
The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management This is complexity. COMPLEXITY IS THE ENEMY OF IT SECURITY. Data is easy to Move Response: Data encryption Device control Your data Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and installing Response: Application control Web control
The Impact of Complexity on IT Security Malware Response: Anti-malware Firewall Vulnerabilities in Applications Response: Software inventory Systems / patch management 1 Data is easy to Move platform management console cost Response: Data encryption Device control Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Your data Browsing and Installing Response: Application control Web control
The Impact of Complexity on IT Security Investment Complexity Risk 1 platform management console cost Physical, Virtual, Mobile Windows, Mac, Linux --- Android, iOS, Windows Phone, BlackBerry, Symbian
Kaspersky Endpoint Security for Business Anti Malware + Firewall
KasperskyTOP 3 = 87% 73 tests1st places – (!) 31 TOP3 score results comparison EsetTOP 3 = 29% 51 tests1stplaces - 2 30 N of 1st places BitdefenderTOP 3 = 75% 53 tests1stplaces - 12 McAfeeTOP 3 = 21% N of tests - 551stplaces - 1 20 Trend MicroTOP 3 = 21% 54 tests1stplaces - 3 SophosTOP 3 = 39% 28 tests1stplaces - 1 SymantecTOP 3 = 58% 46 tests1stplaces - 9 10 Tests participated 10 20 30 40 50 60 70 80
Kaspersky Endpoint Security for Business Collaboration Mail Web Total License Mgmt Network Access SW Installation Systems Management (SMS) Advanced Image Mgmt Patch Mgmt Vulnerability Scan Data Protection (Encryption) Kaspersky Security Center Mobile Device Management (MDM) Mobile Endpoint Security Select File Server Security Application Control Device Control Web Control Anti Malware + Firewall Cloud Enabled via the Kaspersky Security Network (KSN) Endpoint Management
Security for Virtualization Agentless Security with vShield and vCloud SIMPLIFIED MANAGEMENT VIRTUAL ENDPOINT PROTECTION VIRTUAL NETWORK PROTECTION FLEXIBLE LICENSING Under a “single-pane” Unified policy management Intuitive interface Robust reporting Immediate protection Zero-day threat protection (KSN) Shared cache for high performance Maximized density Scans and protects network traffic Intrusion prevention(IPS) Intrusion detection (IDS) Prevents AV storms ‘Per core’ licensing ‘Per machine’ licensing
Questions to Ask Yourself • How do you currently handle patching? • Is your security simple to manage? • What % of malware attacks is it okay to let through? • How do you protect mobile users from malicious/improper sites? • Do you have smartphones and tablets in your environment? • Do you have any confidential customer/company information? • Does everyone need the same level of access and permissions? • Do you know what HW and SW you have in your environment? • Is your virtualization environment as secure as it should be? • Are you REALLY happy with your current solution?
Down and Dirty ROI • How much total time would be saved each day? If web surfing was faster from not having so many add-ons? If the computer wasn’t so slow from all of the random applications installed? If the default search was not some unknown search engine? If there weren’t so many toolbars? If users didn’t go to unsafe or inappropriate websites? If the computer didn’t have to reboot in the middle of the day? For just one minute each day for each employee... • $24,000 average (fully encumbered) • $2000/month for 12 months • $500/week for 4 weeks • $100/day for 5 days • $12.50/hour for 8 hours • $0.20/minute for 60 minutes • $0.20/minute saved per day • $1/week • $4/month • $48/year
In order to sleep peacefully at night… CONTROL SEE PROTECT • Physical, virtual, mobile • Identify vulnerabilities • Inventory HW and SW • Take action with clear reporting • Configure and deploy • Set and enforce IT policies • Manage employee-owned devices • Prioritized patches • License Mgmt. • Network Access Control • Evolve beyond just anti-virus • Meet security demands • Protect data and devices anywhere • Rely on expertise of trusted vendors
Thank You! Kaspersky Lab Steven Winfield, Regional Channel Manager Steven.Winfield@Kaspersky.com