SlideShare uma empresa Scribd logo
1 de 28
Internet Security: Malware Update Jose Bodni Director, Latin America & Caribbean Jose.Bodni@M86Security.com
Change in Malware-hosted Sites Blended Threats 1.0 Blended Threats 2.0 Legitimate Sites Hacker-established Sites Legitimate Sites Hacker-Established Sites ,[object Object]
  Simpler Detection Through:
 Domain Restriction
 Reputation
  Some Change in Viruses
Up for Days
Legitimate Site Passes by Most 	Web Filters
Polymorphic Viruses Change Many 	Times Per Day
“New” Malware Never Used Again**Source: Virus Arms Race, The Register, August 2009
Anatomy of a Blended Threat Attack 2) 	Attacker sends emails with embedded links to malicious Web sites. 1) 	Attacker hacks legitimate Web sites and injects malware. 5) 	Traditional Web filters are bypassed as user is directed to legitimate Web site. 3) 	Email bypasses traditional spam and anti-virus systems. 6) 	User’s computer gets infected with drive-by download and becomes a bot. 4) 	User receives email and clicks on link to malware-infected site.
Customer Challenge for 2011: Web-based Threats Web-based Threats Web malware from legitimate sites* 92% 1000% 84% Increase in Web  malware over 2010 Of new threats come from the Web *Source: Websense
Customer Challenge for 2011: Web-based Threats Web 2.0 Landscape 40-50% Current AV catch rates* Collaboration Tools Social Networking Enterprise SaaS WEB 2.0 Social Media Media Sharing Client Applications Interactive Sharing Mass Comms 52% 10 billion Malware dead within 24 hours** World-wide blended threat emails per day *Source: M86 SecurityLabs **Source: Panda Labs
Why Real-time Detection is so Important M86 Security Labs Report Test: >30,000 live malware URLs Traditional Security: Stool Strategy URL Filtering 3.8% effective Three Major AV Vendors Combined 39% effective Real-time Code Analysis Six-in-10 threats require real-time code analysis to be blocked Leg 3 Leg 2 Leg 1 Anti-virus Signatures 100% effective Real-time Detection (Code Analysis) URL Filtering
M86 SWG: Multi-tiered Threat Protection MALWARE DETECTED Where it comes from?Previously discovered malware websites URL FILTERING 3.8% Effective 39% Effective* SIGNATURE-BASED ANTI-VIRUS What it looks like?Identified malware signatures What is its intentions? Dynamically analyzes unknown codes for malware-related behaviors 100% Effective in detecting known threats and unknown obfuscated malware codes REAL-TIME CODE ANALYSIS Source: M86 Security Labs Report (test based on >30,000 live malware URLs *Three major AV vendors combined
M86 SWG: Multi-tiered Threat Protection What is its intentions? What it looks like? Dynamically analyzes unknown codes for malware-related behaviors Where is it? Identified malware signatures Previously discovered malware websites Block /Allow /Repair Block / Allow Block / Allow Suspect webpage Repaired/Re-constructed web page
M86 Product Overview
Appliances Compliance Strong FoundationCurrent M86 Security Products Products Deployment Options Web Security Messaging Security Reporting Compliance Anti-virus Malware Detection Application Control Anti-virus Malware Detection Outbound Security Encryption Data Loss Prevention Archiving Granular Reporting Real-time Monitoring Software Cloud Service (SaaS)
M86 Secure Web Gateway Unified Web Security  Award-winning, best-in-breed, multi-layered, on-site and cloud-based Web security. Patented, active real-time code analysis of inbound and outbound communication, keeping malware out of networks and laptops, while retaining sensitive/confidential data.
M86 Secure Web Gateway Unified Web Security  Key Features: ,[object Object]
Real-time Code Analysis
Anti-virus
Anti-spyware
SSL Inspection
Dynamic Web Repair
Data Leakage Prevention
Productivity & Web 2.0 Control
URL Filtering

Mais conteúdo relacionado

Mais procurados

Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudMicrosoft
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controlsxKinAnx
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionMicrosoft
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security CenterMicrosoft
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCloudLock
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityCloudLock
 
Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-engSWASCAN
 

Mais procurados (20)

Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Microsoft Cloud App Security
Microsoft Cloud App SecurityMicrosoft Cloud App Security
Microsoft Cloud App Security
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controls
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
Azure Security Center
Azure Security CenterAzure Security Center
Azure Security Center
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-eng
 

Semelhante a Internet Security Update

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Benelux
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protectionSoHo Dragon
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Sophos Benelux
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsPaul Hobbs
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-softwareDivyanisetia
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 

Semelhante a Internet Security Update (20)

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protection
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands Discover Synchronized Security - Sophos Day Netherlands
Discover Synchronized Security - Sophos Day Netherlands
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 

Mais de INSPIRIT BRASIL

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT BRASIL
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011INSPIRIT BRASIL
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesINSPIRIT BRASIL
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT ManagersINSPIRIT BRASIL
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)INSPIRIT BRASIL
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)INSPIRIT BRASIL
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360INSPIRIT BRASIL
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITINSPIRIT BRASIL
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)INSPIRIT BRASIL
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngineINSPIRIT BRASIL
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngineINSPIRIT BRASIL
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave CommunityINSPIRIT BRASIL
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDINSPIRIT BRASIL
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster RecoveryINSPIRIT BRASIL
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoINSPIRIT BRASIL
 

Mais de INSPIRIT BRASIL (20)

Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
INSPIRIT nova institucional
INSPIRIT nova institucionalINSPIRIT nova institucional
INSPIRIT nova institucional
 
Projeto Zoo INSPIRIT
Projeto Zoo INSPIRITProjeto Zoo INSPIRIT
Projeto Zoo INSPIRIT
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011Resultados da pesquisa INSPIRIT realizada no CNASI 2011
Resultados da pesquisa INSPIRIT realizada no CNASI 2011
 
IT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simplesIT360 - Muito além do HelpDesk simples
IT360 - Muito além do HelpDesk simples
 
New-Desktop Central para IT Managers
New-Desktop Central para IT ManagersNew-Desktop Central para IT Managers
New-Desktop Central para IT Managers
 
New institucional inspirit (esp)
New institucional inspirit (esp)New institucional inspirit (esp)
New institucional inspirit (esp)
 
New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)New institucional INSPIRIT (ing)
New institucional INSPIRIT (ing)
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
Trustwave - Segurança 360
Trustwave - Segurança 360Trustwave - Segurança 360
Trustwave - Segurança 360
 
NOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRITNOVA - Apresentação Institucional INSPIRIT
NOVA - Apresentação Institucional INSPIRIT
 
Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)Case Studies M86 Security - Ernst & Young (Web Security)
Case Studies M86 Security - Ernst & Young (Web Security)
 
Overview -IT360 ManageEngine
Overview -IT360 ManageEngineOverview -IT360 ManageEngine
Overview -IT360 ManageEngine
 
Estudo Gartner - IT360 ManageEngine
Estudo Gartner -  IT360 ManageEngineEstudo Gartner -  IT360 ManageEngine
Estudo Gartner - IT360 ManageEngine
 
Forrester - Wave Community
Forrester  - Wave CommunityForrester  - Wave Community
Forrester - Wave Community
 
Coletânea de Cases - RIVERBED
Coletânea de Cases - RIVERBEDColetânea de Cases - RIVERBED
Coletânea de Cases - RIVERBED
 
INSPIRIT- Riverbed- Data protection and Disaster Recovery
INSPIRIT-  Riverbed- Data protection and Disaster RecoveryINSPIRIT-  Riverbed- Data protection and Disaster Recovery
INSPIRIT- Riverbed- Data protection and Disaster Recovery
 
TrustWave - Visão Geral da Solução
TrustWave - Visão Geral da SoluçãoTrustWave - Visão Geral da Solução
TrustWave - Visão Geral da Solução
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Internet Security Update

  • 1. Internet Security: Malware Update Jose Bodni Director, Latin America & Caribbean Jose.Bodni@M86Security.com
  • 2.
  • 3. Simpler Detection Through:
  • 6. Some Change in Viruses
  • 8. Legitimate Site Passes by Most Web Filters
  • 9. Polymorphic Viruses Change Many Times Per Day
  • 10. “New” Malware Never Used Again**Source: Virus Arms Race, The Register, August 2009
  • 11. Anatomy of a Blended Threat Attack 2) Attacker sends emails with embedded links to malicious Web sites. 1) Attacker hacks legitimate Web sites and injects malware. 5) Traditional Web filters are bypassed as user is directed to legitimate Web site. 3) Email bypasses traditional spam and anti-virus systems. 6) User’s computer gets infected with drive-by download and becomes a bot. 4) User receives email and clicks on link to malware-infected site.
  • 12. Customer Challenge for 2011: Web-based Threats Web-based Threats Web malware from legitimate sites* 92% 1000% 84% Increase in Web malware over 2010 Of new threats come from the Web *Source: Websense
  • 13. Customer Challenge for 2011: Web-based Threats Web 2.0 Landscape 40-50% Current AV catch rates* Collaboration Tools Social Networking Enterprise SaaS WEB 2.0 Social Media Media Sharing Client Applications Interactive Sharing Mass Comms 52% 10 billion Malware dead within 24 hours** World-wide blended threat emails per day *Source: M86 SecurityLabs **Source: Panda Labs
  • 14. Why Real-time Detection is so Important M86 Security Labs Report Test: >30,000 live malware URLs Traditional Security: Stool Strategy URL Filtering 3.8% effective Three Major AV Vendors Combined 39% effective Real-time Code Analysis Six-in-10 threats require real-time code analysis to be blocked Leg 3 Leg 2 Leg 1 Anti-virus Signatures 100% effective Real-time Detection (Code Analysis) URL Filtering
  • 15. M86 SWG: Multi-tiered Threat Protection MALWARE DETECTED Where it comes from?Previously discovered malware websites URL FILTERING 3.8% Effective 39% Effective* SIGNATURE-BASED ANTI-VIRUS What it looks like?Identified malware signatures What is its intentions? Dynamically analyzes unknown codes for malware-related behaviors 100% Effective in detecting known threats and unknown obfuscated malware codes REAL-TIME CODE ANALYSIS Source: M86 Security Labs Report (test based on >30,000 live malware URLs *Three major AV vendors combined
  • 16. M86 SWG: Multi-tiered Threat Protection What is its intentions? What it looks like? Dynamically analyzes unknown codes for malware-related behaviors Where is it? Identified malware signatures Previously discovered malware websites Block /Allow /Repair Block / Allow Block / Allow Suspect webpage Repaired/Re-constructed web page
  • 18. Appliances Compliance Strong FoundationCurrent M86 Security Products Products Deployment Options Web Security Messaging Security Reporting Compliance Anti-virus Malware Detection Application Control Anti-virus Malware Detection Outbound Security Encryption Data Loss Prevention Archiving Granular Reporting Real-time Monitoring Software Cloud Service (SaaS)
  • 19. M86 Secure Web Gateway Unified Web Security Award-winning, best-in-breed, multi-layered, on-site and cloud-based Web security. Patented, active real-time code analysis of inbound and outbound communication, keeping malware out of networks and laptops, while retaining sensitive/confidential data.
  • 20.
  • 27. Productivity & Web 2.0 Control
  • 31. Web CachingTotal cost of ownership is reduced by powerful central management with global reach that includes intuitive task-based policy management and drill-down reporting. Integration with existing IT infrastructure is easy for all implementation options.
  • 32.
  • 33.
  • 34.
  • 35. Manage Cloud Scanners from Corporation Net Policy Server
  • 36. No Hardware in Branch OfficesMobile users are protected no matter where they are Branch Offices Main Data Center No hardware in branch offices
  • 37. M86 WebMarshal Software Secure Web Gateway Software-based Secure Web Gateway solution deployed between an organization and the Internet which provides easy-to-use, scalable and cost- effective real-time content inspection of all incoming and outgoing Web traffic.
  • 38.
  • 41.
  • 42. Controls Access and Acceptable Use Policy
  • 44. Web Proxy Caching & Scheduled Quotas
  • 46. Exceeds Compliance NeedsA robust multi-server array with a low total cost of ownership. The flexible and intuitive policy enforcement provides customizable protection from Web threats while allowing detailed control of user Web browsing behaviors.
  • 47. M86 Email Security and Management M86 MailMarshal Exchange Internal email security for Microsoft Exchange M86 MailMarshal Secure Email Server Email Gateway Encryption M86 MailMarshalSendSecure Business-to-consumer Email Encryption M86 Secure Messaging Service Cloud-based Email Security M86 MailMarshal SMTPEmail Gateway Security M86 MailMarshal Service Provider Edition Managed Email Security Service
  • 48. M86 MailMarshal SMTP Email Gateway Security and Control A versatile, powerful and scalable email security system that is compatible with any network environment. Integrating email threat protection, anti-spam, content analysis, compliance enforcement, DLP and reporting into a single, flexible, easy-to-manage solution.
  • 49.
  • 63. EncryptionComplete control over inbound and outbound email in any environment, resulting in reduced exposure to risk and full email content management. An easy-to-use console, flexible policy framework and reporting tools ensure a high return on investment.
  • 64. M86 MailMarshal Secure Email Server Email Encryption Gateway Policy-based secure email solution that provides encryption, digital signing and deep content inspection of inbound and outbound email messages.
  • 65.
  • 66.
  • 68. Standalone Installation Operates With Any Email Gateway
  • 69. Certificate Synchronization via LDAPCentralized control of encrypted communication between your company and your business partners. Consistent application of policies ensure that sensitive emails never insecurely leave your organization. Automatic harvesting and synchronization of certificates make the product extremely easy to use and maintain.
  • 70. M86 MailMarshal Exchange Internal Email Filtering Manages, monitors and controls office email content that travels within a company to ensure a safe, productive working environment and compliance with Acceptable Use Policies.
  • 71. M86 Security Overview Jose Bodni Director, Latin America & Caribbean
  • 72.
  • 73. Over 24,000 global customers with more than 17 million users
  • 76. M86 Secure Web Service Hybrid, the industry’sfirst hybrid Web security service
  • 77. M86 Web Filter and Reporting Suite
  • 78. M86 MailMarshal for SMTP, Exchange and Secure Messaging Service
  • 80. More than 400 employees worldwideReal-time Security for the Borderless Network
  • 81. M86: Recent Milestones Only company with real-time malware detection for both Web and email World’s largest provider of Web Security Appliances* Gartner Visionary in both Web and email Security Magic Quadrants First to market with solution for blended threat attacks First to market with hybrid Web Security Service *IDC Aug 209
  • 82. Worldwide Customers Professional Services Government Education Healthcare Manufacturing Banking/Insurance Other
  • 83. Awards and Product Reviews Secure Web Gateway Visionary- M86 Secure Web Gateway Email Visionary- M86 MailMarshal SMTP Technology Audit: SWG Everything Channel Five-Star Rating for Channel Partner Program Gold Winner MailMarshal SMTP 10 Most Interesting Product at RSA Vital Web Security Suite Secure Web Gateway Product Innovations Web Security Winner SWG Editor’s Choice Vital Security =Vital Protection Excellence in Web Security Anti-Malware Gateways Vital Web Security Suite

Notas do Editor

  1. Malware landscape continues shift to Web-based attacks.Web security now an organizational imperative.Finjan is a recognized leader in SWG and malware defense.The Finjan technology, combined with M86 Email and Web security products, presents a effective solution for both known and unknown threats
  2. Malware landscape continues shift to Web-based attacks.Web security now an organizational imperative.Finjan is a recognized leader in SWG and malware defense.The Finjan technology, combined with M86 Email and Web security products, presents a effective solution for both known and unknown threats.
  3. Recent data from M86 Security Labs shows the importanceWe usually talk about using the three-legged stool for complete protection: URL filtering Anti-virus (AV)Real-time code analysisWe know that URL filtering and AV signatures have become less effective: it’s all over the newsBut few people really test on live malware. Why? Because it’s their own product.We ran a test on 30,000 live malware URLs in February 2010 and we were astonished by the results Leg 1: we passed 15,000 samples through URL filter: only 3.8% effective; just as bad, about 40% of the sites were shown as good and 60% as unclassified Leg 2: we passed 15,000 samples through three AV applications: the three combined only caught 39% of the malware Leg 3: our real-time code analysis caught 100%What’s the difference? There are two main reasons:These are mostly on legitimate Web sites now, so URL filtering doesn’t helpDynamic code is being used to get around signature-based AV.We have a report up on our Web site
  4. Total cost of ownership is reduced by powerful central management with global reach that includes intuitive task-based policy management and drill-down reporting. Integration with existing IT infrastructure is easy for all implementation options.
  5. A robust multi-server array with a low total cost of ownership. The flexible and intuitive policy enforcement provides customizable protection from Web threats while allowing detailed control of user Web browsing behaviors.
  6. M86 MailMarshal SMTPEmail Gateway Security Provides:Blended threats protection Data leakage prevention/deep content scanning using lexical analysisBest rated anti-spam solution using M86 Defense-in-Depth anti-spam engineTLS email encryptionM86 Secure Messaging Service Cloud-based Email SecurityM86 MailMarshal ExchangeInternal email security for Microsoft ExchangeFilters and Manages Internal, Inbox-to-Inbox EmailM86 MailMarshal Secure Email ServerEmail Gateway Encryption Provides: Encryption Digital signatureOperates With Any Email Gateway that Recognizes S/MIME-encrypted Email
  7. Complete control over inbound and outbound email in any environment, resulting in reduced exposure to risk and full email content management. An easy-to-use console, flexible policy framework and reporting tools ensure a high return on investment.
  8. Centralized control of encrypted communication between your company and your business partners. Consistent application of policies ensure that sensitive emails never insecurely leave your organization. Automatic harvesting and synchronization of certificates make the product extremely easy to use and maintain.
  9. Leader in real-time threat protectionIDC noted we are largest provider of web security appliancesOnly company that’s visionary in SWG and EmailComplete suite of products: Appliance, Cloud, and Software