Transcript Document

Getting a Good Night Sleep
Protecting Your Endpoints
Going Beyond Anti-Virus
Steve Winfield, MCSE, CISSP, RCG
Regional Channel Manager
Agenda
Say, “Hello.”
Look good.
Explain some stuff.
Try not to say anything stupid.
Leave.
So why are we here talking about a commodity sale like anti-virus?
ENDPOINT SECURITY IS NOT JUST AV
3
So why are we here talking about a commodity sale like anti-virus?
AND ENDPOINT SECURITY IS WHERE IT IS AT
4
The Endpoint is the Frontline…
60%
•Attacks in 2011
targeting user devices
71%
•Attacks in 2012
targeting user devices
Verizon Data Breach Investigations Report 2013
MALWARE AND THREATS: SMARTER, FASTER, MORE
The 5 Weapons of the Enemy
•
•
•
•
•
Malware: Ever-increasing threats
Mobility: Your data is on the move
Mine!: Employee-owned devices
Mistakes: Vulnerabilities in applications
Messy: The complexity of the IT environment
So how do we fight back?
SIMPLIFY!!!
8
Think about it…
9
Home entertainment used to be simple…
However, home entertainment has changed…
Samsung Plasma TV
Apple TV
11
Panasonic
Blu Ray
Denon
Receiver
Comcast
Xfinity
Xbox 360
This Means Redundancy…and Increased Costs
12
4 Devices
4 Devices
4 Devices
4 Devices
4 Devices
3 Devices
3 Devices
2 Devices
This Means Complexity…and Lack of Integration
13
Increased costs, higher complexity,
and lack of integration at home?
Unhappy Spouse
14
Increased costs, higher complexity,
and lack of integration at work?
Unhappy End Users
Unhappy Boss
Unhappy Job
Increased Need for an Updated Resume
15
So what does this have to do with
Endpoint Security?
The Impact of Complexity on IT Security
Malware
Vulnerabilities in
Applications
17
Response:
Anti-malware
Firewall
Response:
Software inventory
Systems / patch management
Data is easy to
Move
Response:
Data encryption
Device control
Mobile / BYOD
Response:
Mobile Security
Mobile device management (MDM)
Browsing and
Installing
Response:
Application control
Web control
YOUR DATA
The Impact of Complexity on IT Security
Malware
Vulnerabilities in
Applications
Response:
Anti-malware
Firewall
Response:
Software inventory
Systems / patch management
This is complexity.
Response:
Data is easy to
Data
encryption
COMPLEXITY IS THE ENEMY
OF
IT SECURITY.
Move
18
Device control
Mobile / BYOD
Response:
Mobile Security
Mobile device management (MDM)
Browsing and
installing
Response:
Application control
Web control
YOUR DATA
The Impact of Complexity on IT Security
Malware
Vulnerabilities in
Applications
Response:
Anti-malware
Firewall
Response:
Software inventory
Systems / patch management
1
PLATFORM
MANAGEMENT CONSOLE
YOUR DATA
COST
Data is easy to
Move
Response:
Data encryption
Device control
Mobile / BYOD
Response:
Mobile Security
Mobile device management (MDM)
Browsing and
Installing
Response:
Application control
Web control
The Impact of Complexity on IT Security
Investment
Complexity
Risk
1
PLATFORM
MANAGEMENT CONSOLE
COST
Physical, Virtual, Mobile
Windows, Mac, Linux --- Android, iOS, Windows Phone, BlackBerry, Symbian
Kaspersky Endpoint Security for Business
Anti Malware + Firewall
PAGE 21 |
N of 1st places
TOP3 score results comparison
Eset
TOP 3 = 29%
51 tests
1st places - 2
30
20
10
Kaspersky
TOP 3 = 87%
Sophos
TOP 3 = 39%
28 tests
1st places - 1
10
McAfee
TOP 3 = 21%
N of tests - 55
1st places - 1
20
30
73 tests
1st places – (!) 31
Bitdefender
TOP 3 = 75%
53 tests
Symantec
places - 12
TOP 3 =1st58%
46 tests
1st places - 9
40
50
60
Trend Micro
TOP 3 = 21%
54 tests
1st places - 3
Tests participated
70
80
Kaspersky Endpoint Security for Business
Total
Mail
Web
License Mgmt
Network Access
SW Installation
Systems Management
(SMS)
Patch
Vulnerability
Image Mgmt
Mgmt
Scan
Data Protection (Encryption)
Select
Mobile Endpoint
Security
Mobile Device
Management (MDM)
File Server Security
Application
Control
Device Control
Anti Malware + Firewall
Cloud Enabled via the
Kaspersky Security Network (KSN)
PAGE 23 |
Web Control
Kaspersky Security Center
Advanced
Collaboration
Endpoint
Management
Security for Virtualization
Agentless Security with vShield and vCloud
SIMPLIFIED
MANAGEMENT
VIRTUAL ENDPOINT
PROTECTION
Under a “singlepane”
Immediate protection
Unified policy
management
Zero-day threat
protection (KSN)
Intuitive interface
Shared cache for
high performance
Robust
reporting
Maximized density
VIRTUAL NETWORK
PROTECTION
FLEXIBLE
LICENSING
Scans and protects
network traffic
‘Per core’
licensing
Intrusion prevention
(IPS)
‘Per machine’
licensing
Intrusion detection
(IDS)
Prevents AV storms
Questions to Ask Yourself
How do you currently handle patching?
Is your security simple to manage?
What % of malware attacks is it okay to let through?
How do you protect mobile users from malicious/improper sites?
Do you have smartphones and tablets in your environment?
Do you have any confidential customer/company information?
Does everyone need the same level of access and permissions?
Do you know what HW and SW you have in your environment?
Is your virtualization environment as secure as it should be?
 Are you REALLY happy with your current solution?
25
Down and Dirty ROI
How much total time would be saved each day?
If web surfing was faster from not having so many add-ons?
If the computer wasn’t so slow from all of the random applications installed?
If the default search was not some unknown search engine?
If there weren’t so many toolbars?
If users didn’t go to unsafe or inappropriate websites?
If the computer didn’t have to reboot in the middle of the day?
For just one minute each day for each employee...
$24,000 average (fully encumbered)
$2000/month for 12 months
$500/week for 4 weeks
$100/day for 5 days
$12.50/hour for 8 hours
$0.20/minute for 60 minutes
$0.20/minute saved per day
$1/week
$4/month
$48/year
In order to sleep peacefully at night…
27
SEE
CONTROL
Physical, virtual,
mobile
Identify
vulnerabilities
Inventory HW and
SW
Take action with
clear reporting
Configure and
deploy
Set and enforce IT
policies
Manage employeeowned devices
Prioritized patches
License Mgmt.
Network Access
Control
PROTECT
Evolve beyond just
anti-virus
Meet security
demands
Protect data and
devices anywhere
Rely on expertise of
trusted vendors
Thank You!
Kaspersky Lab
Steven Winfield, Regional Channel Manager
[email protected]