SlideShare a Scribd company logo
1 of 14
Security Solutions
Jeff Keyes
Jason Dettbarn
Meet the first virus
(Source: Engadget.com))




* Source - Gartner
Malware Is Here…
(Local Infections Worldwide March 2012 – SecureNet.com)




* Source - Gartner
…And It’s Not Leaving.
(Online Threats Worldwide March 2012 – SecureNet.com)




* Source - Gartner
Kaseya’s Security Solution
• Blended Protection / Unified Platform / Remediation / Partners


                                     Anti-          Partners /
  Patching        Anti-Virus
                                    Malware        Remediation

                                                        Partners
   Operating
    System            Kaseya
                     Antivirus                          Agent
   MS Office                                          Procedures

                                      Kaseya         Monitoring &
                                    AntiMalware        Mobile
                      Kaseya                         Service Desk &
   3rd Party *
                     Endpoint                          Reporting
   Software          Security
  Deployment                                         Scheduling &
                                                     Management

                                                                   5
Kaseya Anti-Malware
• KAM 1.1 Released
• KAM 1.2 Controlled Release ~June 2012
  – MalwareBytes 1.60.1
  – Manageability / Profile Options
     • Trusted Applications
     • Complete control
Kaseya Endpoint Security
• KES 2.2 Released
• KES 2.3 Controlled Release May 2012
  – AVG 2012
  – Revamped API / management
  – Update on license tracking
  – Profile Enhancements
• What is next?
Kaseya Antivirus
•   Real-time antivirus protection and on-demand scanning
•   Quick scanning of critical system areas
•   Prevention of malware epidemics
•   Automatic isolating infected computers
•   System recovery after infection
•   iSwift and iChecker technologies limit scanning to new
    and modified files only
•   Files shared on a file server are checked on the file server
    and not on the workstation increasing workstation
    performance
•   Selection of trusted processes
•   Load balancing and performance configuration
•   Compact updates
Kaseya Antivirus 1.3
• Device Control disabling and controlling external
  devices such as USB drives
• Anti-Spam
• Anti-Spyware features that block phishing attacks
• Kaspersky Enterprise Workstation 6.0.4.1424
• Upgrade Client Version
• Upgrade Ready Column Set
• Supports Anti-Spam Protection
• Supports Anti-Spy Protection
• Supports Access Control
• Enables Password Protection
Kaseya Antivirus 1.4
1.    LanCache update location (6.3 only)
2.    Threats page – ability to delete/restore quarantine items
3.    Threats page – ability to add exclusions to profile/all
4.    Threats page – ability to filter based on type of threat and time of threat (canned filtering buttons)
5.    Threats page – new button to expose the threat details feature
6.    Threats handling – check for threats handled manually by users
7.    New Monitoring/alerts page
8.    Profiles page – added # of machines and user created by columns
9.    Profiles Page – new button now has drop-down for Server/Workstation
10.   Profiles – added support for Quick Scan settings
11.   Profiles – Full and Quick Scan – added more scheduling options
12.   Profiles – Full and Quick Scan – added do not prompt for action options
13.   Profiles – Full and Quick Scan – added prompt options
14.   Profiles – Full and Quick Scan – added screensaver option
15.   Profiles – added interactive options
16.   Profiles – added options for File protection
17.   Profiles – added options for Mail protection
18.   Profiles – added options for Web protection
19.   Profiles – added options for proactive defense
20.   Profiles – added options for Anti-Spam
21.   Profiles – added options for Anti Spy
22.   Profiles – added options for Access Control
23.   Profiles – added update proxy options
24.   Profiles – added more scheduling options for update
25.   Profiles – added trusted URLs to exclusions
26.   Profiles – update options added the “run task if skipped” option
27.   Profile by admin/user. Will only show profile (on all pages) if you created it or it’s assigned to a machine that’s in scope for you
28.   Machines page – exposing Column Sets better
29.   3 new column sets for filtering flag issues (machines that have out of date db, machines that require reboot and machines that are not in compliance with profile)
30.   “Advanced” Install options – added uninstall password
31.   “Advanced” Install options – added skip if machine offline
32.   “Advanced” Install options – added polite install
33.   Do not show flags for offline machines
34.   New flag ( )for machine that has an expired license
35.   New flag ( ) for machine that is out of compliance with profile
36.   New flag ( )for machine that is currently running a scan
37.   Remove “New Window” action
38.   Added new “Expiring in 30/60/90” counts to license page
39.   Machine page - Remember sizing of columns
Kaseya Antivirus
• KAV 1.3 Released
• KAV 1.4 Manageability May 2012
  –   Local file source for updates / install
  –   Network scanning
  –   Actions on detections
  –   Explosion of control options
  –   Exchange?
• KAV 1.5 ~Q3
  – Endpoint Security V8
• KAV 1.6
  – Mac?
  – Integration of AVG
Licensing
• Non-expiring 1 year Subscription
  – License doesn’t start to expire until installed
  – 1 year from date of 1st install
  – Transferrable
  – Continue to expire regardless of install state
• Maximum flexibility
  – Breadth of machines
  – Depth of time
• Tiered pricing
  – Encourage bulk purchases
Common Questions
•   Does KAV support servers?
•   How do I upgrade from KES to KAV?
•   What is the system impact of KAV?
•   Do I need KAM and KAV / KES?
Next Steps
Kaseya Security Products:
www.kaseya.com/features.aspx




Kaseya Education
http://lms.kaseya.com/kedu/




Questions, comments, suggestions: jeff.keyes@kaseya.com

More Related Content

What's hot

Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
Tiffeny Price
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
Amit Gatenyo
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 

What's hot (20)

Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Co...
The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Co...The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Co...
The Oldest Club in English Football uses ManageEngine EventLog Analyzer to Co...
 
Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Swascan
Swascan Swascan
Swascan
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 

Viewers also liked

Viewers also liked (6)

Managed Services is not a product, it's a business model!
Managed Services is not a product, it's a business model!Managed Services is not a product, it's a business model!
Managed Services is not a product, it's a business model!
 
A Starter Guide to IT Managed Services
A Starter Guide to IT Managed ServicesA Starter Guide to IT Managed Services
A Starter Guide to IT Managed Services
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
ITS Managed Services Introduction
ITS Managed Services IntroductionITS Managed Services Introduction
ITS Managed Services Introduction
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Kaseya Connect 2012 - Kaseya Security Solutions Update

AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
aksit_services
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
tswong
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
David J Rosenthal
 

Similar to Kaseya Connect 2012 - Kaseya Security Solutions Update (20)

Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5James Jara Portfolio 2014 - InfoSec White Paper- Part 5
James Jara Portfolio 2014 - InfoSec White Paper- Part 5
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Advanced Security Automation Made Simple
Advanced Security Automation Made SimpleAdvanced Security Automation Made Simple
Advanced Security Automation Made Simple
 
MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 

More from Kaseya

More from Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Kaseya Connect 2012 - Kaseya Security Solutions Update

  • 2. Meet the first virus (Source: Engadget.com)) * Source - Gartner
  • 3. Malware Is Here… (Local Infections Worldwide March 2012 – SecureNet.com) * Source - Gartner
  • 4. …And It’s Not Leaving. (Online Threats Worldwide March 2012 – SecureNet.com) * Source - Gartner
  • 5. Kaseya’s Security Solution • Blended Protection / Unified Platform / Remediation / Partners Anti- Partners / Patching Anti-Virus Malware Remediation Partners Operating System Kaseya Antivirus Agent MS Office Procedures Kaseya Monitoring & AntiMalware Mobile Kaseya Service Desk & 3rd Party * Endpoint Reporting Software Security Deployment Scheduling & Management 5
  • 6. Kaseya Anti-Malware • KAM 1.1 Released • KAM 1.2 Controlled Release ~June 2012 – MalwareBytes 1.60.1 – Manageability / Profile Options • Trusted Applications • Complete control
  • 7. Kaseya Endpoint Security • KES 2.2 Released • KES 2.3 Controlled Release May 2012 – AVG 2012 – Revamped API / management – Update on license tracking – Profile Enhancements • What is next?
  • 8. Kaseya Antivirus • Real-time antivirus protection and on-demand scanning • Quick scanning of critical system areas • Prevention of malware epidemics • Automatic isolating infected computers • System recovery after infection • iSwift and iChecker technologies limit scanning to new and modified files only • Files shared on a file server are checked on the file server and not on the workstation increasing workstation performance • Selection of trusted processes • Load balancing and performance configuration • Compact updates
  • 9. Kaseya Antivirus 1.3 • Device Control disabling and controlling external devices such as USB drives • Anti-Spam • Anti-Spyware features that block phishing attacks • Kaspersky Enterprise Workstation 6.0.4.1424 • Upgrade Client Version • Upgrade Ready Column Set • Supports Anti-Spam Protection • Supports Anti-Spy Protection • Supports Access Control • Enables Password Protection
  • 10. Kaseya Antivirus 1.4 1. LanCache update location (6.3 only) 2. Threats page – ability to delete/restore quarantine items 3. Threats page – ability to add exclusions to profile/all 4. Threats page – ability to filter based on type of threat and time of threat (canned filtering buttons) 5. Threats page – new button to expose the threat details feature 6. Threats handling – check for threats handled manually by users 7. New Monitoring/alerts page 8. Profiles page – added # of machines and user created by columns 9. Profiles Page – new button now has drop-down for Server/Workstation 10. Profiles – added support for Quick Scan settings 11. Profiles – Full and Quick Scan – added more scheduling options 12. Profiles – Full and Quick Scan – added do not prompt for action options 13. Profiles – Full and Quick Scan – added prompt options 14. Profiles – Full and Quick Scan – added screensaver option 15. Profiles – added interactive options 16. Profiles – added options for File protection 17. Profiles – added options for Mail protection 18. Profiles – added options for Web protection 19. Profiles – added options for proactive defense 20. Profiles – added options for Anti-Spam 21. Profiles – added options for Anti Spy 22. Profiles – added options for Access Control 23. Profiles – added update proxy options 24. Profiles – added more scheduling options for update 25. Profiles – added trusted URLs to exclusions 26. Profiles – update options added the “run task if skipped” option 27. Profile by admin/user. Will only show profile (on all pages) if you created it or it’s assigned to a machine that’s in scope for you 28. Machines page – exposing Column Sets better 29. 3 new column sets for filtering flag issues (machines that have out of date db, machines that require reboot and machines that are not in compliance with profile) 30. “Advanced” Install options – added uninstall password 31. “Advanced” Install options – added skip if machine offline 32. “Advanced” Install options – added polite install 33. Do not show flags for offline machines 34. New flag ( )for machine that has an expired license 35. New flag ( ) for machine that is out of compliance with profile 36. New flag ( )for machine that is currently running a scan 37. Remove “New Window” action 38. Added new “Expiring in 30/60/90” counts to license page 39. Machine page - Remember sizing of columns
  • 11. Kaseya Antivirus • KAV 1.3 Released • KAV 1.4 Manageability May 2012 – Local file source for updates / install – Network scanning – Actions on detections – Explosion of control options – Exchange? • KAV 1.5 ~Q3 – Endpoint Security V8 • KAV 1.6 – Mac? – Integration of AVG
  • 12. Licensing • Non-expiring 1 year Subscription – License doesn’t start to expire until installed – 1 year from date of 1st install – Transferrable – Continue to expire regardless of install state • Maximum flexibility – Breadth of machines – Depth of time • Tiered pricing – Encourage bulk purchases
  • 13. Common Questions • Does KAV support servers? • How do I upgrade from KES to KAV? • What is the system impact of KAV? • Do I need KAM and KAV / KES?
  • 14. Next Steps Kaseya Security Products: www.kaseya.com/features.aspx Kaseya Education http://lms.kaseya.com/kedu/ Questions, comments, suggestions: jeff.keyes@kaseya.com