Protect Yourself Against Today's Cybercriminals and Hackers
-
Upload
kaseya -
Category
Technology
-
view
799 -
download
0
description
Transcript of Protect Yourself Against Today's Cybercriminals and Hackers
![Page 1: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/1.jpg)
Protect Yourself Against Today's Cybercriminals and Hackers
Sept 14, 2011
![Page 2: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/2.jpg)
Speakers
Jeff KeyesProduct Marketing
Scott BrackettProduct Manager
![Page 3: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/3.jpg)
What We SeeThe Impact of Endpoint Attacks
04/12/2023
3 Copyright 2010. All Rights Reserved.
![Page 4: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/4.jpg)
Losing the Battle Against Cybercrime
04/12/2023
4 Copyright 2010. All Rights Reserved.
– Bill Brenner, Senior Editor, CIO Magazine
Even those companies making sizable efforts to keep their data secure
admit it's almost impossible to outpace the
bad guys.
![Page 5: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/5.jpg)
Losing the Battle Against Cybercrime
04/12/2023
5 Copyright 2010. All Rights Reserved.
– SANS.ORG, “The Top Cyber Security Risks”
The number of attacks is now so large and the criminals
sophistication is so great that many organizations are having trouble determining which new threats and vulnerabilities pose
the greatest risk and how resources should be allocated to ensure that the most probable
and damaging attacks are dealt with first.
![Page 6: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/6.jpg)
Your Business is a Target
Cyber criminals have stolen at least
from small to mid-sized companies across America in a sophisticated but increasingly common
form of online banking fraud…
— Brian Krebs, Washington Post, 26 October 2009
$100 million
![Page 7: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/7.jpg)
Malware Categories*WikiPedia
04/12/2023
Copyright 2010. All Rights Reserved.7
![Page 8: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/8.jpg)
Viruses
• Programs that attach / embed to other applications (and then attempt to hide).
• Distribution– File sharing– Email– Instant Messenger– Hosted Email
• Polymorphic /Metamorphic
04/12/2023
Copyright 2010. All Rights Reserved.8
![Page 9: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/9.jpg)
Worms (i.e. Conficker)
04/12/2023
Copyright 2010. All Rights Reserved.9
![Page 10: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/10.jpg)
Trojans
04/12/2023
Copyright 2010. All Rights Reserved.10
![Page 11: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/11.jpg)
Rootkits
04/12/2023
Copyright 2010. All Rights Reserved.11
![Page 12: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/12.jpg)
Malware For Profit
• Spyware– Search revenue, Pop up ads
• Key logger– Information pushed to bad guys
• Botnet– General purpose network– DoS, SPAM, Brute Force Attacks
1204/12/2023
Copyright 2010. All Rights Reserved.
![Page 13: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/13.jpg)
Phishing
![Page 14: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/14.jpg)
Losing the Battle Against Cybercrime
04/12/2023
14 Copyright 2010. All Rights Reserved.
– Uri Rivner, RSA
88% of Fortune 500 companies has
compromised PC’s running Trojan’s in their
environments.
![Page 15: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/15.jpg)
"Endpoint . . . solutions are now a PRIMARY line of defense . . .”
— Charles KolodgyResearch Director,
IDC Security Products Program
The Endpoint Is The TargetMalware On The Desktop Is The Goal
04/12/2023
15 Copyright 2010. All Rights Reserved.
![Page 16: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/16.jpg)
"Endpoint . . . solutions are now a PRIMARY line of defense . . .”
— Charles KolodgySearch Director,
IDC Security Products Program
Why The Endpoint Is The TargetMalware On The Desktop Is The Goal
04/12/2023
16 Copyright 2010. All Rights Reserved.
Decentralized Data
Keys To The Kingdom
Complete Control
![Page 17: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/17.jpg)
Why The Endpoint Is The TargetThe Endpoint is An Easy Target
04/12/2023
17 Copyright 2010. All Rights Reserved.
Easy Access
Mobile Data
Multiple Vectors
![Page 18: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/18.jpg)
Scareware
![Page 19: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/19.jpg)
The Web Under Permanent SiegeTargeted Attacks
2008 2009 2010 (Jan/Feb)
Adobe Reader MS Word MS Excel MS PowerPoint
28.61%
49.50%
61.20%
34.55%38.50%
24.30%19.97%
6.90%7.10%
16.87%
5.10%7.40%
![Page 20: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/20.jpg)
Losing the Battle Against Cybercrime
04/12/2023
20 Copyright 2010. All Rights Reserved.
– Uri Rivner, RSA
“Once infected, malware, typically Trojans, will start
recording all Internet related traffic, perform keylogging, grab emails, browser-stored passwords, and a long list of
additional items.
![Page 21: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/21.jpg)
Key Protection Elements
04/12/2023
Copyright 2010. All Rights Reserved.21
Internet / WANFirewall - Router /
Unified Threat Management
SPAM / Virus Filtered Email
Wireless Access
Phishing / Web Filtering
![Page 22: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/22.jpg)
Kaseya’s Solution
04/12/2023
Copyright 2010. All Rights Reserved.22
Blended Protection / Unified Platform / Remediation / Partners
Patching
Operating SystemMS Office
3rd Party *
Antivirus
Kaseya Antivirus
Kaseya Endpoint Security
AntiMalware
Kaseya AntiMalw
are
Remediation
Agent Procedures
Monitoring
Service Desk & PSA
Scheduling & Management
![Page 23: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/23.jpg)
Why Is Kaspersky Different?
• A Pioneer in Fighting IT Threats for 25 Years
• Security Technology of Choice
04/12/2023
Copyright 2010. All Rights Reserved.23
![Page 24: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/24.jpg)
The Most Immediate ProtectionSmall Updates for the Best Protection and User Experience
Microsoft
Symantec
Trend Micro
CA
McAfee
Updates per Month
0 100 200 300 400 500 600 700
24
28
32
33
138
664
04/12/2023
24 Copyright 2010. All Rights Reserved.
Kaseya Antivirus
![Page 25: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/25.jpg)
Fastest Response Time to New Threats
Eset
Sophos
Symantec
McAfee
Hours0 2 4 6 8
4 to 8 hours
4 to 6 hours
2 to 4 hours
2 to 4 hours
< 2 hours
04/12/2023
25 Copyright 2010. All Rights Reserved.
Kaseya Antivirus
![Page 26: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/26.jpg)
AV Competition: General Overview
Criteria Kaspersky Lab
Symantec McAfee Sophos Panda BitDefender Avast!
AV-Comparatives: Approved 2010 Corporate Product
Yes No Yes Yes No Yes No
AV-Comparatives: Dec’ 09 Performance Test Score
193 188 174 193 Not incl. 154 188
AV-Comparatives: May’10 Proactive Test Advanced+Few false alarms
AdvancedFew false alarms
StandardMany false alarms
AdvancedFew false alarms
AdvancedMany false alarms
Advanced+V. few false alarms
AdvancedFew false alarms
AV-Comparatives: 2010 Overall Whole Product Dynamic Test
Advanced+ Advanced+ Not incl. Not incl. Advanced Advanced Not incl.
AV-Comparatives: Oct’ 09 Removal Test Advanced+ Advanced+ Advanced Advanced Not incl. Advanced+ Advanced
VB100: Aug’10 Reactive and Proactive Protection (RAP) Score
90.66% 66.06% 69.52% 78.87% Not incl. 86.95%(failed test)
86.06%
VB100: Aug’10 On-Demand Trojan Protection
93.79% 77.40% 87.19% 88.59% Not incl. 81.35%(failed test)
94.54%
VB100: Successful Results In Total 63 56 48 57 1 26 41
AV-test.org Q4-2010, Protection/Repair score
5.5 / 6.0 5.0 / 5.5 3.5 / 3.5 4.0 / 3.0 5.5 / 5.0 5.5 / 5.5 3.5 / 4.0
Worldwide System Infrastructure Software Revenue, 2009 Growth
42.0% -4.8% 1.8% 25.9% -6.2% Not in Top50 Not in Top50
![Page 27: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/27.jpg)
International awards
| April 12, 2023
Kaspersky Lab Technology Alliances Business DivisionPAGE 27 |
The largest number of industry awards from IT publications and malware testing organizations globally
![Page 28: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/28.jpg)
Why Anti-Malware?Best in the industry• 100+Million Downloads • 5+ Billion Threats Removed
What does it add?• Layered Protection • Lightweight Add-on to Antivirus• Focuses MAINLY on
– Working WITH Antivirus Engines– Zero Day– Pulled from Web– Antivirus Weaknesses
• Remediation & Cleaning
04/12/2023
Copyright 2010. All Rights Reserved.28
![Page 29: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/29.jpg)
Cleanup
• Best in the industry for cleanup • Completely automated cleaning• Cleaning all aspects
– Processes– Browser Helper Objects– Toolbars– Registry– Files– Orphaned Folders– Rootkits
04/12/2023
Copyright 2010. All Rights Reserved.29
![Page 30: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/30.jpg)
UI Conventions
![Page 31: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/31.jpg)
Typical Workflow
• Consider location-specific settings
• Deploy Software
• Monitor & Remediate
![Page 32: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/32.jpg)
Roadmap
Aggressive feature-set enhancements:
• Server Support (KAV)• LAN Share Support• Alert Integration• Improved Reporting• Enhanced logging and forensics• Integration with newest releases• UI Refinement and standardization• Much more…
![Page 34: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/34.jpg)
Industry Buzz
Kaseya's products have a reputation for being easy to install and use, compared with many competitive products.
Gartner, 2011 (#G00209766)
“”
Kaseya’s IT Automation Framework can help many types of IT management organizations. Quickly. Affordably.
EMA, 2008 (#1429091307)
“
”
Service automation is vital to IT success. Kaseya is purpose-built for this next era of computing.
OVUM, 2010 (#TA001974ITM)
“”
Kaseya’s strength lies in the ease of implementation, support for their customers, and comprehensive service level management.
IDC, 2009 (#219336)
“
”
![Page 35: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/35.jpg)
Industry Awards
![Page 36: Protect Yourself Against Today's Cybercriminals and Hackers](https://reader035.fdocuments.us/reader035/viewer/2022062704/5557b507d8b42a4a5d8b527e/html5/thumbnails/36.jpg)
Resources
Learn More About Kaseya http://www.kaseya.com/industries/service-providers.aspx
Free Trialhttp://www.kaseya.com/forms/free-trial.aspx
Price Quotehttp://www.kaseya.com/forms/price_ent.aspx
Contact [email protected], or toll free +1 415-694-5700