Transcript Document
Getting a Good Night Sleep Protecting Your Endpoints Going Beyond Anti-Virus Steve Winfield, MCSE, CISSP, RCG Regional Channel Manager Agenda Say, “Hello.” Look good. Explain some stuff. Try not to say anything stupid. Leave. So why are we here talking about a commodity sale like anti-virus? ENDPOINT SECURITY IS NOT JUST AV 3 So why are we here talking about a commodity sale like anti-virus? AND ENDPOINT SECURITY IS WHERE IT IS AT 4 The Endpoint is the Frontline… 60% •Attacks in 2011 targeting user devices 71% •Attacks in 2012 targeting user devices Verizon Data Breach Investigations Report 2013 MALWARE AND THREATS: SMARTER, FASTER, MORE The 5 Weapons of the Enemy • • • • • Malware: Ever-increasing threats Mobility: Your data is on the move Mine!: Employee-owned devices Mistakes: Vulnerabilities in applications Messy: The complexity of the IT environment So how do we fight back? SIMPLIFY!!! 8 Think about it… 9 Home entertainment used to be simple… However, home entertainment has changed… Samsung Plasma TV Apple TV 11 Panasonic Blu Ray Denon Receiver Comcast Xfinity Xbox 360 This Means Redundancy…and Increased Costs 12 4 Devices 4 Devices 4 Devices 4 Devices 4 Devices 3 Devices 3 Devices 2 Devices This Means Complexity…and Lack of Integration 13 Increased costs, higher complexity, and lack of integration at home? Unhappy Spouse 14 Increased costs, higher complexity, and lack of integration at work? Unhappy End Users Unhappy Boss Unhappy Job Increased Need for an Updated Resume 15 So what does this have to do with Endpoint Security? The Impact of Complexity on IT Security Malware Vulnerabilities in Applications 17 Response: Anti-malware Firewall Response: Software inventory Systems / patch management Data is easy to Move Response: Data encryption Device control Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and Installing Response: Application control Web control YOUR DATA The Impact of Complexity on IT Security Malware Vulnerabilities in Applications Response: Anti-malware Firewall Response: Software inventory Systems / patch management This is complexity. Response: Data is easy to Data encryption COMPLEXITY IS THE ENEMY OF IT SECURITY. Move 18 Device control Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and installing Response: Application control Web control YOUR DATA The Impact of Complexity on IT Security Malware Vulnerabilities in Applications Response: Anti-malware Firewall Response: Software inventory Systems / patch management 1 PLATFORM MANAGEMENT CONSOLE YOUR DATA COST Data is easy to Move Response: Data encryption Device control Mobile / BYOD Response: Mobile Security Mobile device management (MDM) Browsing and Installing Response: Application control Web control The Impact of Complexity on IT Security Investment Complexity Risk 1 PLATFORM MANAGEMENT CONSOLE COST Physical, Virtual, Mobile Windows, Mac, Linux --- Android, iOS, Windows Phone, BlackBerry, Symbian Kaspersky Endpoint Security for Business Anti Malware + Firewall PAGE 21 | N of 1st places TOP3 score results comparison Eset TOP 3 = 29% 51 tests 1st places - 2 30 20 10 Kaspersky TOP 3 = 87% Sophos TOP 3 = 39% 28 tests 1st places - 1 10 McAfee TOP 3 = 21% N of tests - 55 1st places - 1 20 30 73 tests 1st places – (!) 31 Bitdefender TOP 3 = 75% 53 tests Symantec places - 12 TOP 3 =1st58% 46 tests 1st places - 9 40 50 60 Trend Micro TOP 3 = 21% 54 tests 1st places - 3 Tests participated 70 80 Kaspersky Endpoint Security for Business Total Mail Web License Mgmt Network Access SW Installation Systems Management (SMS) Patch Vulnerability Image Mgmt Mgmt Scan Data Protection (Encryption) Select Mobile Endpoint Security Mobile Device Management (MDM) File Server Security Application Control Device Control Anti Malware + Firewall Cloud Enabled via the Kaspersky Security Network (KSN) PAGE 23 | Web Control Kaspersky Security Center Advanced Collaboration Endpoint Management Security for Virtualization Agentless Security with vShield and vCloud SIMPLIFIED MANAGEMENT VIRTUAL ENDPOINT PROTECTION Under a “singlepane” Immediate protection Unified policy management Zero-day threat protection (KSN) Intuitive interface Shared cache for high performance Robust reporting Maximized density VIRTUAL NETWORK PROTECTION FLEXIBLE LICENSING Scans and protects network traffic ‘Per core’ licensing Intrusion prevention (IPS) ‘Per machine’ licensing Intrusion detection (IDS) Prevents AV storms Questions to Ask Yourself How do you currently handle patching? Is your security simple to manage? What % of malware attacks is it okay to let through? How do you protect mobile users from malicious/improper sites? Do you have smartphones and tablets in your environment? Do you have any confidential customer/company information? Does everyone need the same level of access and permissions? Do you know what HW and SW you have in your environment? Is your virtualization environment as secure as it should be? Are you REALLY happy with your current solution? 25 Down and Dirty ROI How much total time would be saved each day? If web surfing was faster from not having so many add-ons? If the computer wasn’t so slow from all of the random applications installed? If the default search was not some unknown search engine? If there weren’t so many toolbars? If users didn’t go to unsafe or inappropriate websites? If the computer didn’t have to reboot in the middle of the day? For just one minute each day for each employee... $24,000 average (fully encumbered) $2000/month for 12 months $500/week for 4 weeks $100/day for 5 days $12.50/hour for 8 hours $0.20/minute for 60 minutes $0.20/minute saved per day $1/week $4/month $48/year In order to sleep peacefully at night… 27 SEE CONTROL Physical, virtual, mobile Identify vulnerabilities Inventory HW and SW Take action with clear reporting Configure and deploy Set and enforce IT policies Manage employeeowned devices Prioritized patches License Mgmt. Network Access Control PROTECT Evolve beyond just anti-virus Meet security demands Protect data and devices anywhere Rely on expertise of trusted vendors Thank You! Kaspersky Lab Steven Winfield, Regional Channel Manager [email protected]