SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Symantec Endpoint Protection 12

February 2011


                                  1
Jan, 2007 - 250,000 viruses
Dec, 2009 – over 240 million




                               2
Malware authors have switched tactics


                                            75% of malware infect less than
                                                    50 machines



From:                                 To:
 A mass distribution of a              A micro distribution model e.g.
 relatively few threats e.g.
                                         The average Vundo variant is
  Storm made its way onto millions       distributed to 18 Symantec users!
   of machines across the globe          The average Harakit variant is
                                          distributed to 1.6 Symantec users!




                                                                               3
A Security Catastrophe… the growth in AV signatures
10,000,000



 8,000,000



 6,000,000
                  Signature based scanning
 4,000,000
                       won’t keep up

 2,000,000



        0
Introducing Symantec Endpoint Protection 12

              Malware
             Protection                What’s New

  Access                  Personal     - Unrivaled Security
  Control                 Firewall      Insight
            Symantec                    SONAR
             Endpoint
                                       - Blazing Performance
            Protection                  Faster Scans
   App                     Intrusion
  Control                 Prevention
                                       - Built for Virtual Environments
                                        Identify and Manage Virtual
              Device                      Clients
              Control                   Reduced Scan Overheads



                                                                          5
Powered by
                             Insight
Proactive protection against new, mutating threats
• puts files in context, using their age, frequency, location and
  more to expose threats otherwise missed
• using community-based security ratings
• derived from Symantec's more than 175 million endpoints



                                                                    6
How Insight Works                                               Check the DB
                                                           4
                                                                    during scans
                             2   Rate nearly
                                 2.5 billion
                                 every file on
                                 the files
                                      internet


1      Build a
          175
     collection
        million
      network
          PCs


          Is it new?
       Bad reputation?
                                                                         Prevalence
                                                                            Age
                                                                          Source
                               Provide           3     Look for
                       5                             associations         Behavior
                           actionable data                               Associations
Unrivaled Security

Hackers mutate threats to evade fingerprints




Mutated threats stick out like a sore thumb

It’s a catch-22 for the virus writers
  – Mutate too much =Insight finds it
  – Mutate too little = Easy to discover & fingerprint



                                                         8
SONAR – Completes the Protection Stack


                                         SONAR
             Network IPS &
               Browser
                                • Monitors processes and
                Protect           threads as they execute
                                • Rates behaviors
                Insight         • Feeds Insight
                Lookup


                File Based
              Protection –
             Sigs/Heuristics   Only hybrid behavioral-
                               reputation engine on the planet
               Real time       Monitors 400 different
               behavioral      application behaviors
               SONAR           Selective sandbox (ex Adobe)


                                                            9
Proven Most Effective in Real World Test
               100%                                                                      100%
                        3.8%
                                 13.5%
               90%                                                                       90%
                                                        26.9%
                                  3.8%     32.7%
               80%                                                   40.4%               80%
                                                                                44.2%

               70%                                                                       70%
% of samples




                                            3.8%        15.4%




                                                                                                % False Positives
               60%                                                                       60%
                                                                      5.8%
                                                                                 3.8%
               50%                                                                       50%
                       96.2%

               40%               82.7%                                                   40%


               30%
                                           63.5%                                         30%
                                                        57.7%
                                                                     53.8%      51.9%
               20%                                                                       20%
                                                                                                             Infected

               10%                                                                       10%                 Partial
                                                                                                             Blocked
                                  4%                                                                         FP
                0%                                                                       0%
                      Symantec   Sophos   Kaspersky   Trend Micro   Microsoft   McAfee

                                                                                                                    10
Most Effective Remediation
                                         120                                                                                     30



                                                110
                                         100                104                                                                  25




                                                                                                                                                          Number of False Positives
                                                                         94         93
Remediation Score




                                          80                                                                                     20

                                                                                               75
                    (higher is better)




                                                                                                                                      (lower is better)
                                                                                                           69
                                          60                                                                                     15




                                          40                                                                                     10




                                          20                                                                          24         5




                                                             1
                                           0                                                                                     0
                                               Symantec   Kaspersky   Microsoft   Sophos   Malwarebytes   McAfee   Trend Micro


                                                                                                                                                  11
Insight: Faster than Traditional Scanning




                               Insight - Optimized Scanning
     Traditional Scanning       Skips any file we are sure is good,
      Has to scan every file    leading to much faster scan times
                                On a typical system, 70% of active
                                   applications can be skipped!
                                                                      12
Tests Prove SEP 12 Outperforms Competition

 Symantec Endpoint Protection 12 Scans:
  3.5X faster than McAfee
  2X faster than Microsoft


 Ranked 1st in overall Performance!

        160
        140
        120
        100
         80
         60
         40
         20
          0
              Symantec   Kaspersky   Trend Micro   Microsoft   Sophos   McAfee   Average

                                                                                           13
Lowest Memory Use
                              180.0

                              160.0

                              140.0

                              120.0

                              100.0

                               80.0

                               60.0

                               40.0

                               20.0

                                0.0
                                      Symantec   Kaspersky   Trend   McAfee   Sophos   Microsoft   Average
    Memory Usage                                             Micro


                                      Symantec Endpoint Protection 12 uses:
                                       66% less memory than McAfee
                                       76% less memory than Microsoft

PassMark™ Software, Feb., 2011 - http://www.passmark.com/AVReport                                            14
Built for Virtual Environments



 Virtual Client   Virtual Image   Shared Insight    Resource
    Tagging         Exception         Cache         Leveling




             Together – up to 90% reduction in disk IO



                                                               15
Symantec Endpoint Protection
Small Business Edition 12.1


       Fastest                •Powered by Symantec
                               Insight and SONAR
                              •Support for Macintosh
        Most Effective
                              •Faster Installs and
                               Upgrades
        Simple
                              •Smart Scanning


                                                     16
Solutions Tailored for Business of All Sizes




                                                                                         Servers, Desktops
                                                                                             & Laptops




                                                                    Servers, Desktops    Servers, Desktops
                                                                        & Laptops            & Laptops




                                             Servers, Desktops &    Servers, Desktops    Servers, Desktops
                                                  Laptops               & Laptops            & Laptops



  Servers, Desktops &   Desktops & Laptops   Desktops & Laptops    Desktops & Laptops   Desktops & Laptops
       Laptops

                                                                                                             17
What’s Right For Your Business?
                                              Endpoint
                                                               Endpoint
                  Feature                  Protection Small
                                                              Protection
                                           Business Edition
 Seats                                        5-99 seats      100+ seats
 Antivirus/Antispyware                            •               •
 Desktop Firewall                                 •               •
 Intrusion Detection/Prevention                   •               •
 Generic Exploit Blocking                         •               •
 Protection for Mac OS X and Windows              •               •
 Protection for Linux                                             •
 Device and Application Control                                   •
 Network Access Control Self-Enforcement                          •
 Flexible, granular policy management                             •
 Enhanced Virtualization Features                                 •

                                                                           18
Thank you!




SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
Copyright © 2010 Symantec Corporation. All rights reserved.


                                                              19
Disclaimer



“Any forward-looking indication of plans for products is
  preliminary and all future release dates are tentative and are
  subject to change. Any future release of the product or planned
  modifications to product capability, functionality, or feature are
  subject to ongoing evaluation by Symantec, and may or may not
  be implemented and should not be considered firm
  commitments by Symantec and should not be relied upon in
  making purchasing decisions.”




                                                                   20

Mais conteúdo relacionado

Mais procurados

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONGS CHO
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 

Mais procurados (20)

UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 

Semelhante a Symantec Endpoint Protection 12

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandTyler Shields
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016rajeshnikam
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attackspoofyroot
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 
Security and the Cloud- Symantec
Security and the Cloud- SymantecSecurity and the Cloud- Symantec
Security and the Cloud- Symantecitnewsafrica
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...Andris Soroka
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 

Semelhante a Symantec Endpoint Protection 12 (20)

McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
The New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP IrelandThe New Mobile Landscape - OWASP Ireland
The New Mobile Landscape - OWASP Ireland
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Anatomy of an Attack
Anatomy of an AttackAnatomy of an Attack
Anatomy of an Attack
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
Security and the Cloud- Symantec
Security and the Cloud- SymantecSecurity and the Cloud- Symantec
Security and the Cloud- Symantec
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
2012 ab is-your-browser-putting-you-at-risk
2012 ab is-your-browser-putting-you-at-risk2012 ab is-your-browser-putting-you-at-risk
2012 ab is-your-browser-putting-you-at-risk
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Symantec Endpoint Protection 12

  • 1. Symantec Endpoint Protection 12 February 2011 1
  • 2. Jan, 2007 - 250,000 viruses Dec, 2009 – over 240 million 2
  • 3. Malware authors have switched tactics 75% of malware infect less than 50 machines From: To: A mass distribution of a A micro distribution model e.g. relatively few threats e.g.  The average Vundo variant is  Storm made its way onto millions distributed to 18 Symantec users! of machines across the globe  The average Harakit variant is distributed to 1.6 Symantec users! 3
  • 4. A Security Catastrophe… the growth in AV signatures 10,000,000 8,000,000 6,000,000 Signature based scanning 4,000,000 won’t keep up 2,000,000 0
  • 5. Introducing Symantec Endpoint Protection 12 Malware Protection What’s New Access Personal - Unrivaled Security Control Firewall  Insight Symantec  SONAR Endpoint - Blazing Performance Protection  Faster Scans App Intrusion Control Prevention - Built for Virtual Environments  Identify and Manage Virtual Device Clients Control  Reduced Scan Overheads 5
  • 6. Powered by Insight Proactive protection against new, mutating threats • puts files in context, using their age, frequency, location and more to expose threats otherwise missed • using community-based security ratings • derived from Symantec's more than 175 million endpoints 6
  • 7. How Insight Works Check the DB 4 during scans 2 Rate nearly 2.5 billion every file on the files internet 1 Build a 175 collection million network PCs Is it new? Bad reputation? Prevalence Age Source Provide 3 Look for 5 associations Behavior actionable data Associations
  • 8. Unrivaled Security Hackers mutate threats to evade fingerprints Mutated threats stick out like a sore thumb It’s a catch-22 for the virus writers – Mutate too much =Insight finds it – Mutate too little = Easy to discover & fingerprint 8
  • 9. SONAR – Completes the Protection Stack SONAR Network IPS & Browser • Monitors processes and Protect threads as they execute • Rates behaviors Insight • Feeds Insight Lookup File Based Protection – Sigs/Heuristics Only hybrid behavioral- reputation engine on the planet Real time Monitors 400 different behavioral application behaviors SONAR Selective sandbox (ex Adobe) 9
  • 10. Proven Most Effective in Real World Test 100% 100% 3.8% 13.5% 90% 90% 26.9% 3.8% 32.7% 80% 40.4% 80% 44.2% 70% 70% % of samples 3.8% 15.4% % False Positives 60% 60% 5.8% 3.8% 50% 50% 96.2% 40% 82.7% 40% 30% 63.5% 30% 57.7% 53.8% 51.9% 20% 20% Infected 10% 10% Partial Blocked 4% FP 0% 0% Symantec Sophos Kaspersky Trend Micro Microsoft McAfee 10
  • 11. Most Effective Remediation 120 30 110 100 104 25 Number of False Positives 94 93 Remediation Score 80 20 75 (higher is better) (lower is better) 69 60 15 40 10 20 24 5 1 0 0 Symantec Kaspersky Microsoft Sophos Malwarebytes McAfee Trend Micro 11
  • 12. Insight: Faster than Traditional Scanning Insight - Optimized Scanning Traditional Scanning Skips any file we are sure is good, Has to scan every file leading to much faster scan times On a typical system, 70% of active applications can be skipped! 12
  • 13. Tests Prove SEP 12 Outperforms Competition Symantec Endpoint Protection 12 Scans:  3.5X faster than McAfee  2X faster than Microsoft Ranked 1st in overall Performance! 160 140 120 100 80 60 40 20 0 Symantec Kaspersky Trend Micro Microsoft Sophos McAfee Average 13
  • 14. Lowest Memory Use 180.0 160.0 140.0 120.0 100.0 80.0 60.0 40.0 20.0 0.0 Symantec Kaspersky Trend McAfee Sophos Microsoft Average Memory Usage Micro Symantec Endpoint Protection 12 uses:  66% less memory than McAfee  76% less memory than Microsoft PassMark™ Software, Feb., 2011 - http://www.passmark.com/AVReport 14
  • 15. Built for Virtual Environments Virtual Client Virtual Image Shared Insight Resource Tagging Exception Cache Leveling Together – up to 90% reduction in disk IO 15
  • 16. Symantec Endpoint Protection Small Business Edition 12.1 Fastest •Powered by Symantec Insight and SONAR •Support for Macintosh Most Effective •Faster Installs and Upgrades Simple •Smart Scanning 16
  • 17. Solutions Tailored for Business of All Sizes Servers, Desktops & Laptops Servers, Desktops Servers, Desktops & Laptops & Laptops Servers, Desktops & Servers, Desktops Servers, Desktops Laptops & Laptops & Laptops Servers, Desktops & Desktops & Laptops Desktops & Laptops Desktops & Laptops Desktops & Laptops Laptops 17
  • 18. What’s Right For Your Business? Endpoint Endpoint Feature Protection Small Protection Business Edition Seats 5-99 seats 100+ seats Antivirus/Antispyware • • Desktop Firewall • • Intrusion Detection/Prevention • • Generic Exploit Blocking • • Protection for Mac OS X and Windows • • Protection for Linux • Device and Application Control • Network Access Control Self-Enforcement • Flexible, granular policy management • Enhanced Virtualization Features • 18
  • 19. Thank you! SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2010 Symantec Corporation. All rights reserved. 19
  • 20. Disclaimer “Any forward-looking indication of plans for products is preliminary and all future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality, or feature are subject to ongoing evaluation by Symantec, and may or may not be implemented and should not be considered firm commitments by Symantec and should not be relied upon in making purchasing decisions.” 20