SlideShare a Scribd company logo
1 of 36
Protect Yourself Against Today's Cybercriminals and Hackers Sept 14, 2011
Speakers Jeff Keyes Product Marketing Scott Brackett Product Manager
What We See The Impact of Endpoint Attacks 9/20/2011 3 Copyright 2010. All Rights Reserved.
Losing the Battle Against Cybercrime 9/20/2011 4 Copyright 2010. All Rights Reserved. Even those companies making sizable efforts to keep their data secure admit it's almost impossible to outpace the bad guys. – Bill Brenner, Senior Editor, CIO Magazine
Losing the Battle Against Cybercrime 9/20/2011 5 Copyright 2010. All Rights Reserved. The number of attacks is now so large and the criminals sophistication is so great that many organizations are having trouble determining which new threats and vulnerabilities pose the greatest risk and how resources should be allocated to ensure that the most probable and damaging attacks are dealt with first. – SANS.ORG, “The Top Cyber Security Risks”
Your Business is a Target Cyber criminals have stolen at least		from small to mid-sized companies across America in a sophisticated but increasingly common form of online banking fraud… $100million — Brian Krebs, Washington Post, 26 October 2009
Malware Categories*WikiPedia 9/20/2011 Copyright 2010. All Rights Reserved. 7
Viruses Programs that attach / embed to other applications (and then attempt to hide). Distribution File sharing Email Instant Messenger Hosted Email Polymorphic /Metamorphic 9/20/2011 Copyright 2010. All Rights Reserved. 8
Worms (i.e. Conficker) 9/20/2011 Copyright 2010. All Rights Reserved. 9
Trojans 9/20/2011 Copyright 2010. All Rights Reserved. 10
Rootkits 9/20/2011 Copyright 2010. All Rights Reserved. 11
Malware For Profit Spyware Search revenue, Pop up ads Key logger Information pushed to bad guys Botnet General purpose network DoS, SPAM, Brute Force Attacks 12 9/20/2011 Copyright 2010. All Rights Reserved.
Phishing
Losing the Battle Against Cybercrime 9/20/2011 14 Copyright 2010. All Rights Reserved. 88% of Fortune 500 companies has compromised PC’s running Trojan’s in their environments.   – Uri Rivner, RSA
"Endpoint  . . . solutions are now a PRIMARY line of defense . . .” — Charles Kolodgy Research Director, IDC Security Products Program   The Endpoint Is The Target Malware On The Desktop Is The Goal 9/20/2011 15 Copyright 2010. All Rights Reserved.
"Endpoint  . . . solutions are now a PRIMARYline of defense . . .” — Charles Kolodgy Search Director, IDC Security Products Program   Why The Endpoint Is The Target Malware On The Desktop Is The Goal 9/20/2011 16 Copyright 2010. All Rights Reserved. Decentralized Data Keys To The Kingdom Complete Control
Why The Endpoint Is The Target The Endpoint is An Easy Target 9/20/2011 17 Copyright 2010. All Rights Reserved. Easy Access Mobile Data Multiple Vectors
Scareware
The Web Under Permanent Siege Targeted Attacks 2008 2009 2010 (Jan/Feb) 61.20% 49.50% 38.50% 34.55% 28.61% 24.30% 19.97% 16.87% 7.40% 7.10% 6.90% 5.10% Adobe Reader MS Word MS Excel MS PowerPoint
Losing the Battle Against Cybercrime 9/20/2011 20 Copyright 2010. All Rights Reserved. “Once infected, malware, typically Trojans, will start recording all Internet related traffic, perform keylogging, grab emails, browser-stored passwords, and a long list of additional items.  – Uri Rivner, RSA
Key Protection Elements 9/20/2011 Copyright 2010. All Rights Reserved. 21
Kaseya’s Solution 9/20/2011 Copyright 2010. All Rights Reserved. 22 Blended Protection / Unified Platform / Remediation / Partners
Why Is Kaspersky Different? A Pioneer in Fighting IT Threats for 25 Years Security Technology of Choice 9/20/2011 Copyright 2010. All Rights Reserved. 23
The Most Immediate Protection Small Updates for the Best Protection and User Experience Kaseya Antivirus 664 138 Microsoft 33 Symantec 32 Trend Micro 28 CA 24 McAfee 0 100 200 300 400 500 600 700 Updates per Month 9/20/2011 24 Copyright 2010. All Rights Reserved.
Fastest Response Time to New Threats Kaseya Antivirus < 2 hours 2 to 4 hours Eset 2 to 4 hours Sophos Symantec 4 to 6 hours McAfee 4 to 8 hours 0 2 4 6 8 Hours 9/20/2011 25 Copyright 2010. All Rights Reserved.
AV Competition: General Overview
International awards |  September 20, 2011 Kaspersky Lab Technology Alliances Business Division PAGE 27  | The largest number of industry awards from IT publications and malware testing  organizations globally
Why Anti-Malware? Best in the industry 100+Million Downloads  5+ Billion Threats Removed What does it add? Layered Protection  Lightweight Add-on to Antivirus Focuses MAINLY on  Working WITH Antivirus Engines Zero Day Pulled from Web Antivirus Weaknesses Remediation & Cleaning 9/20/2011 Copyright 2010. All Rights Reserved. 28
Cleanup Best in the industry for cleanup  Completely automated cleaning Cleaning all aspects Processes Browser Helper Objects Toolbars Registry Files Orphaned Folders Rootkits 9/20/2011 Copyright 2010. All Rights Reserved. 29
UI Conventions
Typical Workflow Consider location-specific settings Deploy Software Monitor & Remediate
Roadmap Aggressive feature-set enhancements: Server Support (KAV) LAN Share Support Alert Integration Improved Reporting Enhanced logging and forensics Integration with newest releases UI Refinement and standardization Much more…
Question & Answers Jeff Keyes Product Marketing 	Jeff.keyes@kaseya.com Scott Brackett Product Manager 	scott.brackett@kaseya.com
Industry Buzz “ “ Kaseya'sproducts have a reputation for being easy to install and use, compared with many competitive  products. Gartner, 2011 (#G00209766) Kaseya’s IT Automation Framework can help many types of IT management organizations.  Quickly.  Affordably. EMA, 2008 (#1429091307) ” ” “ “ Kaseya’s strength lies in the ease of implementation, support for their customers, and comprehensive service level management. IDC, 2009 (#219336) Service automation is vital to IT success.  Kaseya is purpose-built for this next era of computing. OVUM, 2010 (#TA001974ITM)   ” ”
Industry Awards
Resources Learn More About Kaseya http://www.kaseya.com/industries/service-providers.aspx Free Trialhttp://www.kaseya.com/forms/free-trial.aspx Price Quotehttp://www.kaseya.com/forms/price_ent.aspx Contact Us sales@kaseya.com,or toll free +1 415-694-5700

More Related Content

What's hot

Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Black Duck by Synopsys
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Symantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...Black Duck by Synopsys
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesBlack Duck by Synopsys
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - HomeworkLoïc Naga
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...Black Duck by Synopsys
 
Welcome & The State of Open Source Security
Welcome & The State of Open Source SecurityWelcome & The State of Open Source Security
Welcome & The State of Open Source SecurityJerika Phelps
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Jerika Phelps
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 

What's hot (20)

Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Symantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - Insights
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
 
Welcome & The State of Open Source Security
Welcome & The State of Open Source SecurityWelcome & The State of Open Source Security
Welcome & The State of Open Source Security
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 

Viewers also liked

Portfolio without contact details for people per hour
Portfolio without contact details for people per hourPortfolio without contact details for people per hour
Portfolio without contact details for people per hourEmily Browne
 
En contexto: cuatro nobles verdades de los productos informáticos exitosos
En contexto: cuatro nobles verdades de los productos informáticos exitososEn contexto: cuatro nobles verdades de los productos informáticos exitosos
En contexto: cuatro nobles verdades de los productos informáticos exitososJorge Arango
 
Commercio Elettrico Marzo 2014
Commercio Elettrico Marzo 2014Commercio Elettrico Marzo 2014
Commercio Elettrico Marzo 2014CommercioElettrico
 
Pediatria 1
Pediatria 1Pediatria 1
Pediatria 1andrecq
 
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...Hankerson_2012_Estimation of evapotranspiration from fields with and without ...
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...Brett Hankerson
 
Vakantievilla spanje - Zoek Spanje Villas - Vakantiehuizen Spanje
Vakantievilla spanje -  Zoek Spanje Villas  -  Vakantiehuizen SpanjeVakantievilla spanje -  Zoek Spanje Villas  -  Vakantiehuizen Spanje
Vakantievilla spanje - Zoek Spanje Villas - Vakantiehuizen Spanjevillamarnl
 
Balanç de dos anys de la taula Barcelona Creixement
Balanç de dos anys de la taula Barcelona CreixementBalanç de dos anys de la taula Barcelona Creixement
Balanç de dos anys de la taula Barcelona CreixementAjuntament de Barcelona
 
OpenAIRE presentation for italian events
OpenAIRE presentation for italian eventsOpenAIRE presentation for italian events
OpenAIRE presentation for italian eventsOpenAIRE
 
REENERGY by INMERCO
REENERGY by INMERCOREENERGY by INMERCO
REENERGY by INMERCOinmerco
 
Tus derechos en tu lengua.
Tus derechos en tu lengua.Tus derechos en tu lengua.
Tus derechos en tu lengua.maugenocioni
 

Viewers also liked (20)

Dor e controle motor
Dor e controle motorDor e controle motor
Dor e controle motor
 
Tema robot
Tema robotTema robot
Tema robot
 
Portfolio without contact details for people per hour
Portfolio without contact details for people per hourPortfolio without contact details for people per hour
Portfolio without contact details for people per hour
 
JORNAL DE BAIRRO - STANDARD
JORNAL DE BAIRRO - STANDARDJORNAL DE BAIRRO - STANDARD
JORNAL DE BAIRRO - STANDARD
 
En contexto: cuatro nobles verdades de los productos informáticos exitosos
En contexto: cuatro nobles verdades de los productos informáticos exitososEn contexto: cuatro nobles verdades de los productos informáticos exitosos
En contexto: cuatro nobles verdades de los productos informáticos exitosos
 
Commercio Elettrico Marzo 2014
Commercio Elettrico Marzo 2014Commercio Elettrico Marzo 2014
Commercio Elettrico Marzo 2014
 
Toulous'UP
Toulous'UPToulous'UP
Toulous'UP
 
Las drogas
Las drogasLas drogas
Las drogas
 
Derechos Humanos 07
Derechos Humanos 07Derechos Humanos 07
Derechos Humanos 07
 
Pediatria 1
Pediatria 1Pediatria 1
Pediatria 1
 
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...Hankerson_2012_Estimation of evapotranspiration from fields with and without ...
Hankerson_2012_Estimation of evapotranspiration from fields with and without ...
 
Mind surge pop
Mind surge  popMind surge  pop
Mind surge pop
 
Vakantievilla spanje - Zoek Spanje Villas - Vakantiehuizen Spanje
Vakantievilla spanje -  Zoek Spanje Villas  -  Vakantiehuizen SpanjeVakantievilla spanje -  Zoek Spanje Villas  -  Vakantiehuizen Spanje
Vakantievilla spanje - Zoek Spanje Villas - Vakantiehuizen Spanje
 
Balanç de dos anys de la taula Barcelona Creixement
Balanç de dos anys de la taula Barcelona CreixementBalanç de dos anys de la taula Barcelona Creixement
Balanç de dos anys de la taula Barcelona Creixement
 
áLex rovira promo
áLex rovira promoáLex rovira promo
áLex rovira promo
 
OpenAIRE presentation for italian events
OpenAIRE presentation for italian eventsOpenAIRE presentation for italian events
OpenAIRE presentation for italian events
 
REENERGY by INMERCO
REENERGY by INMERCOREENERGY by INMERCO
REENERGY by INMERCO
 
Slurry Seal Presentation for CalAPA LA Tech Meeting
Slurry Seal Presentation for CalAPA LA Tech MeetingSlurry Seal Presentation for CalAPA LA Tech Meeting
Slurry Seal Presentation for CalAPA LA Tech Meeting
 
Tus derechos en tu lengua.
Tus derechos en tu lengua.Tus derechos en tu lengua.
Tus derechos en tu lengua.
 
Composta bocashi
Composta bocashiComposta bocashi
Composta bocashi
 

Similar to Protect Yourself Against Today's Cybercriminals and Hackers

Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointLancope, Inc.
 

Similar to Protect Yourself Against Today's Cybercriminals and Hackers (20)

Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
Secureview 3
Secureview 3Secureview 3
Secureview 3
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 

More from Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

More from Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Protect Yourself Against Today's Cybercriminals and Hackers

  • 1. Protect Yourself Against Today's Cybercriminals and Hackers Sept 14, 2011
  • 2. Speakers Jeff Keyes Product Marketing Scott Brackett Product Manager
  • 3. What We See The Impact of Endpoint Attacks 9/20/2011 3 Copyright 2010. All Rights Reserved.
  • 4. Losing the Battle Against Cybercrime 9/20/2011 4 Copyright 2010. All Rights Reserved. Even those companies making sizable efforts to keep their data secure admit it's almost impossible to outpace the bad guys. – Bill Brenner, Senior Editor, CIO Magazine
  • 5. Losing the Battle Against Cybercrime 9/20/2011 5 Copyright 2010. All Rights Reserved. The number of attacks is now so large and the criminals sophistication is so great that many organizations are having trouble determining which new threats and vulnerabilities pose the greatest risk and how resources should be allocated to ensure that the most probable and damaging attacks are dealt with first. – SANS.ORG, “The Top Cyber Security Risks”
  • 6. Your Business is a Target Cyber criminals have stolen at least from small to mid-sized companies across America in a sophisticated but increasingly common form of online banking fraud… $100million — Brian Krebs, Washington Post, 26 October 2009
  • 7. Malware Categories*WikiPedia 9/20/2011 Copyright 2010. All Rights Reserved. 7
  • 8. Viruses Programs that attach / embed to other applications (and then attempt to hide). Distribution File sharing Email Instant Messenger Hosted Email Polymorphic /Metamorphic 9/20/2011 Copyright 2010. All Rights Reserved. 8
  • 9. Worms (i.e. Conficker) 9/20/2011 Copyright 2010. All Rights Reserved. 9
  • 10. Trojans 9/20/2011 Copyright 2010. All Rights Reserved. 10
  • 11. Rootkits 9/20/2011 Copyright 2010. All Rights Reserved. 11
  • 12. Malware For Profit Spyware Search revenue, Pop up ads Key logger Information pushed to bad guys Botnet General purpose network DoS, SPAM, Brute Force Attacks 12 9/20/2011 Copyright 2010. All Rights Reserved.
  • 14. Losing the Battle Against Cybercrime 9/20/2011 14 Copyright 2010. All Rights Reserved. 88% of Fortune 500 companies has compromised PC’s running Trojan’s in their environments. – Uri Rivner, RSA
  • 15. "Endpoint . . . solutions are now a PRIMARY line of defense . . .” — Charles Kolodgy Research Director, IDC Security Products Program The Endpoint Is The Target Malware On The Desktop Is The Goal 9/20/2011 15 Copyright 2010. All Rights Reserved.
  • 16. "Endpoint . . . solutions are now a PRIMARYline of defense . . .” — Charles Kolodgy Search Director, IDC Security Products Program Why The Endpoint Is The Target Malware On The Desktop Is The Goal 9/20/2011 16 Copyright 2010. All Rights Reserved. Decentralized Data Keys To The Kingdom Complete Control
  • 17. Why The Endpoint Is The Target The Endpoint is An Easy Target 9/20/2011 17 Copyright 2010. All Rights Reserved. Easy Access Mobile Data Multiple Vectors
  • 19. The Web Under Permanent Siege Targeted Attacks 2008 2009 2010 (Jan/Feb) 61.20% 49.50% 38.50% 34.55% 28.61% 24.30% 19.97% 16.87% 7.40% 7.10% 6.90% 5.10% Adobe Reader MS Word MS Excel MS PowerPoint
  • 20. Losing the Battle Against Cybercrime 9/20/2011 20 Copyright 2010. All Rights Reserved. “Once infected, malware, typically Trojans, will start recording all Internet related traffic, perform keylogging, grab emails, browser-stored passwords, and a long list of additional items. – Uri Rivner, RSA
  • 21. Key Protection Elements 9/20/2011 Copyright 2010. All Rights Reserved. 21
  • 22. Kaseya’s Solution 9/20/2011 Copyright 2010. All Rights Reserved. 22 Blended Protection / Unified Platform / Remediation / Partners
  • 23. Why Is Kaspersky Different? A Pioneer in Fighting IT Threats for 25 Years Security Technology of Choice 9/20/2011 Copyright 2010. All Rights Reserved. 23
  • 24. The Most Immediate Protection Small Updates for the Best Protection and User Experience Kaseya Antivirus 664 138 Microsoft 33 Symantec 32 Trend Micro 28 CA 24 McAfee 0 100 200 300 400 500 600 700 Updates per Month 9/20/2011 24 Copyright 2010. All Rights Reserved.
  • 25. Fastest Response Time to New Threats Kaseya Antivirus < 2 hours 2 to 4 hours Eset 2 to 4 hours Sophos Symantec 4 to 6 hours McAfee 4 to 8 hours 0 2 4 6 8 Hours 9/20/2011 25 Copyright 2010. All Rights Reserved.
  • 27. International awards | September 20, 2011 Kaspersky Lab Technology Alliances Business Division PAGE 27 | The largest number of industry awards from IT publications and malware testing organizations globally
  • 28. Why Anti-Malware? Best in the industry 100+Million Downloads 5+ Billion Threats Removed What does it add? Layered Protection Lightweight Add-on to Antivirus Focuses MAINLY on Working WITH Antivirus Engines Zero Day Pulled from Web Antivirus Weaknesses Remediation & Cleaning 9/20/2011 Copyright 2010. All Rights Reserved. 28
  • 29. Cleanup Best in the industry for cleanup Completely automated cleaning Cleaning all aspects Processes Browser Helper Objects Toolbars Registry Files Orphaned Folders Rootkits 9/20/2011 Copyright 2010. All Rights Reserved. 29
  • 31. Typical Workflow Consider location-specific settings Deploy Software Monitor & Remediate
  • 32. Roadmap Aggressive feature-set enhancements: Server Support (KAV) LAN Share Support Alert Integration Improved Reporting Enhanced logging and forensics Integration with newest releases UI Refinement and standardization Much more…
  • 33. Question & Answers Jeff Keyes Product Marketing Jeff.keyes@kaseya.com Scott Brackett Product Manager scott.brackett@kaseya.com
  • 34. Industry Buzz “ “ Kaseya'sproducts have a reputation for being easy to install and use, compared with many competitive products. Gartner, 2011 (#G00209766) Kaseya’s IT Automation Framework can help many types of IT management organizations. Quickly. Affordably. EMA, 2008 (#1429091307) ” ” “ “ Kaseya’s strength lies in the ease of implementation, support for their customers, and comprehensive service level management. IDC, 2009 (#219336) Service automation is vital to IT success. Kaseya is purpose-built for this next era of computing. OVUM, 2010 (#TA001974ITM) ” ”
  • 36. Resources Learn More About Kaseya http://www.kaseya.com/industries/service-providers.aspx Free Trialhttp://www.kaseya.com/forms/free-trial.aspx Price Quotehttp://www.kaseya.com/forms/price_ent.aspx Contact Us sales@kaseya.com,or toll free +1 415-694-5700

Editor's Notes

  1. CLICK ONE: On November 8, 2009, cybercriminals acquired the banking credentials, username and password, for Hilliary Machinery, Inc., out of Plano Texas. With these stolen credentials, the perpetrators processed more than 47 separate transactions to more than 40 different payees. Over the course of just 3 days, Hilliary Machinery lost $801,495. While the company was able to recover some of the money, there is still over $250K that remains unaccounted for, in addition to attorney fees and court costs resulting from of the an ongoing lawsuit between Hilliary Machinery and its bank. According to Troy Owen, owner of Hillary Machinery, “while the loss did not cause us to go out of business, it certain put off business growth plans that we had.”The cybercriminal used ACH transactions, Automated Clearing House system for electronic payment processing. According to a copy of a Nov. 12 memo between two PlainsCapital employees that was given to Owen, the institution&apos;s commercial banking platform requires that each customer not only enter a user name and password, but also register their computer&apos;s Internet address by entering a secure access code sent to the e-mail address on file for the customer. On Nov. 8, according to the memo, secure access code e-mails were sent to a Hillary email address, but that the request came from a computer with an Internet address in Italy. The memo then says the actual wire transfer requests were made from IP addresses in Romania. Owen says when Hillary Machinery people saw this, &quot;We were all scratching our heads. Because we don&apos;t even do international business, let alone have anyone working in Italy or Romania.&quot; Owen says no one at Hillary received any of the secure access request emails. The cybercriminal was able to capture the username and password and, by spoofing the IP, capture the return authorization email. All of this happened inside of Hillary’s network, not the banks.CLICK TWO: Hillary was able to get $600K back but asked the bank for the remaining $200K. The bank then sued Hillary stating that it was not their fault – they had 2-factor authentication in place. CLICK THREE: Hillary has counter-sued hoping to recover all of their funds plus court costs.This is just one of many stories of companies that believed they were secure but suffered substantial losses as a result of cybercriminals gaining access to the endpoint.
  2. Open a newspaper any given day and you’ll read stories of companies being attacked by cybercriminals. Data breaches are rampant. Banker Trojans are stealing online-banking credentials resulting in massive financial losses. In the 2010 Cyber Security Watch Survey, conducted by CSO Magazine, Senior Editor Bill Brenner said, “Even those companies making sizable efforts to keep their data secure admit it’s almost impossible to outpace the bad guys.” It is a war out there, a war against cybercriminals who have one goal in mind – to make money! Today’s cybercriminals are constantly after data that can be easily converted into profit, or after credentials that will allow them to transfer money directly from company coffers.
  3. According to SANS.ORG in its report “The Top Cyber Security Risks:” “ the number of attacks is now so large and the criminals’ sophistication is so great that many organizations are having trouble determining which new threats and vulnerabilities pose the greatest risk and how resources should be allocated to ensure that the most probable and damaging attacks are dealt with first.” As IT Departments spend on security today, many are overlooking the real targeted attack vector of cybercriminals today – The Endpoint.
  4. In addition to more virulent attack methods that result in more money stolen per intrusion, cybercriminals no longer target only large-sized companies. Small businesses, State and Local Government and Education organizations are specifically being targeted by cybercriminals because they are often behind in security spend. Mid-sized companies in the US lost over $100 million dollars in 2009 to fraudulent bank transfers.
  5. RSA’s latest whitepaper on cybercrime reveals that 88% of Fortune 500 companies have compromised PC’s running Trojans in their environments. According to RSA’s Uri Rivner, “these Trojans are busy moving terabytes of corporate data to stealthy drop zones scattered around the ’Dark Cloud’ of the Cybercrime infrastructure.”
  6. The Endpoint – a user’s desktop, laptop, or even a smartphone, and even the servers that support them – has become a wide open target for cybercriminals today. Endpoint systems have become more mobile, both outside the office and across the Internet, making the traditional perimeter ineffective in providing the right level of protection for these valuable corporate assets. According to IDC, “Endpoint . . . solutions are now a PRIMARY line of defense…” because cybercriminals are targeting the endpoint for the theft of data and money.In this presentation we’ll discuss the growing malware threat, how cybercrimals are targeting the endpoint, and how you can protect your endpoints from cybercrime.
  7. As mentioned earlier, EPS are the primary line of defense.Why is the Endpoint a Target?The increasing malware threat is focused on one target today – The Endpoint. But why? Why are cybercriminals so interested in the endpoint today? There are several factors that make the endpoint interesting to cybercriminals:Decentralized Data. Data no longer resides on the mainframe. Sensitive and confidential corporate data now resides on the desktop, the laptop and the smartphone. Gaining access to these devices means gaining access to data with a monetary value.Keys to the Kingdom. Placing the right Trojan on an endpoint system gives a cybercriminal access to data and credentials to other corporate systems, including online banking systems. Millions of dollars are lost every day due to fraudulent transfers from corporate bank accounts through the use of login information captured by Banker Trojans.Complete Control. Gaining root access to the endpoint also gives cybercriminals access to any system or data the end-user can access. The cybercriminal also has the ability to make the endpoint part of a larger botnet, using the system to spread malware to other systems. In addition, endpoint access can give hackers the ability to watch email content, IM chats, web traffic, log keystrokes, etc., making the endpoint a wealth of opportunity.
  8. Computer hackers today are not yesterday’s script-kiddies looking for fame and glory. Today’s cybercriminal seeks to gain access to the endpoint and remain hidden so that they can steal data and money without the user’s knowledge. There are a number of factors that make the endpoint an easy target:Easy Access. As the network perimeter has become more porous, allowing end users access to all that the Internet has to offer, the endpoint has become the new perimeter and, in turn, the new target for cybercrime.Mobile Data. Corporate road warriors span the globe on a daily basis connecting to unsecured networks in airports, hotels, at home and on airplanes. These systems, which are outside the confines of the corporate perimeter, are a constant threat to corporate data and make the perimeter even more porous and accessible to cybercrime.Multiple Attack Vectors. End-users today are using the corporate Internet for both business and personal purposes, providing the cybercriminal multiple attack vectors into the endpoint. Valid business websites (77%) are distributing malware. Social media sites have become a playground for cybercriminals, as they prey upon individuals and companies alike that are trying to understand and embrace social media to keep track of friends, family, customers, prospects and partners. Personal web surfing, dating sites, music sites, video sites, etc., are also vectors for cybercriminals to spread malware to the endpoint. And, let’s not forget the ever-present threat via Email. It is no wonder, and not by mistake, that cybercriminals are targeting the endpoint. Without the right endpoint protection organizations are subject to attack through a multitude of endpoint targets!
  9. IT Departments rarely know what versions of these applications are running in their environment, let alone know what patch levels these applications have installed. According to Secunia PSI statics, only 2% of Windows computers are fully patched. It is through these vulnerabilities that cybercriminals are gaining access to the company endpoint and using malware to carry out their nefarious schemes.
  10. The ultimate goal of all of these attack techniques is to get malware on the endpoint. According to Uri Rivner of RSA:“Once infected,” “malware, typically Trojans, will start recording all Internet related traffic, perform keylogging, grab emails, browser-stored passwords, and a long list of additional items. The Trojan doesn’t stop at online banking credentials and credit card data: it steals your social network posts, your medical content, your private chats, your constituent letters, and all of your work related content: credentials for internal systems, emails you sent or received, corporate financial results, sensitive customer-related web forms you completed in CRM systems.” 
  11. Excellent firewalls / routers / UTM devices on the market todayBasic firewallContent filteringSpam filteringVirus filteringLock down wireless accessWEP / WPA have been cracked – use higher levelsUse guest networksSPAM / Virus filtered mailAvailable on the router, email server, and desktop itselfPhishingAvailable via the firewall and on the desktop. Use bothPatching OS, key MS apps, key 3rd party applicationsAntivirusFile AV – on access scannersWeb content, web siteMail checkingIMBehavioral engineAntiMalware / AntiSpywareLayered with AV. Backup as a last resort (for cleaning, etc.)Imaging solution for total system restores
  12. There is no “Mr. McAfee” or “Mr. Symantec.” But there is a “Mr. Kaspersky!” For over 25 years, Eugene Kaspersky has been developing technology that has set the standard for malware protection, resulting in more than 54 global technology patents, including those that are pending. Kaspersky “best of breed” heuristics engines span multiple operating systems, including Linux, Unix, Netware and Microsoft. Kaspersky’s iChecker and iSwift technologies ensure the best in performance.Kaspersky continues to have the best in detection rates for both known and unknown malware, including polymorphic and macro viruses as well as multi-level detection within archived files.Kaspersky also updates faster than any company today ensuring that our customers have the latest in malware protection.
  13. Update FrequencyAn AV solution is only as good as it’s last update. With 3500+ signatures being created a day, it is critical that updates are timely and do not impact the performance of the system.Kaspersky updates more than anyone in the industry, 664 times per month, almost one per hour, making sure that our customers have the latest in protection while minimizing the impact of updates on system performance.
  14. Response Time RankingAccording to AV-Test.org Kaspersky responses faster to new threats than anyone in the industry, dramatically reducing the window of vulnerability for our customers.