SlideShare une entreprise Scribd logo
1  sur  24
Kaseya and Kaspersky Lab
Cybercrime Threats in 2012: What You
Need to Know


Cynthia James,
Director Business Development, CISSP

September 2012
Agenda


           Kaspersky Lab
           Today’s Threatscape & Top Threats
           10 Internet Safety Tips
           Sources




PAGE 2 |        Kaspersky Lab Presentation   | September 26, 2012
About Kaspersky Lab
     Founded in 1997; largest private anti-malware company – 100%
     focused on anti-malware
     Over $600M annual revenues
     Presence in 19 countries: CEO is Russian; incorporated in the UK;
     new to US market in 2005
     #1 vendor in Germany, France, Spain, Eastern Europe
     America’s distribution: 12,000 outlets; top two vendors (revenue
     & units shipping)
     Top supplier to OEMs/ISVs of anti-malware worldwide
        Aggressively protecting businesses




PAGE 3 |        Kaspersky Lab Presentation   | September 26, 2012
Cybercrime threatscape: malware growth
     Recent years have seen exponential growth in malware.
     200k unique malware samples were identified in 2006; 2M in
     2007, over 15 million by 2009…50 million this past year.




     Now it is the quality of malware that improves annually.


PAGE 4 |       Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats of 2012: backdrop
           Cybercriminals earn over $100 billion annually!

           Cybercrime markets are now very organized and
           sophisticated  everything has a price, most data
           has some value
              Affiliate programs pay hackers to distribute malware

           “Rented” botnets & malware kits for sale

      Code re-use: there’s no such thing
    as “old news” in cybercrime
              Trickle down effect (of tactics)


PAGE 5 |          Kaspersky Lab Presentation   | September 26, 2012
The power of botnets
Kido (aka Conficker) botnet in May 2009 (peak)


    GFLOPS




   When the Kido botnet reached its peak in May 2009 it contained about
   6 mln. zombie machines
   Botnet = an on-line army for rent

PAGE 6 |       Kaspersky Lab Presentation   | September 26, 2012
How infection occurs
      Infection vectors
           Delivered via email spam
           •   Malware link: evil website masquerading as legit
           Legit website that’s been infected
      “Exploit” – the entry mechanism
      Trojans – the tool
      bot + bot + bot = botnet
      Botherder C&C (command & control)


PAGE 7 |        Kaspersky Lab Presentation   | September 26, 2012
On-line bank robberies
           Clampi Trojan
           $100M in 2010 from SMB, SLED
            Goal: steal login and password
             for on-line bank accounts
            Database of over 4500 different
             financially related sites
            Learn about users’ on-line banking activity (times, dates)
            Wait for a break in bank contact
            Recruit money mules
            Transfer money out in sums of under $10K
            Money mule transfers out of the country



PAGE 8 |          Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats 2012
     Named viruses:
       Stuxnet, Flame, APTs
        – Enterprises
       Clampi – SMB
     Hacktivism – good or bad?
     Accelerated discovery of multi-year operations
     (Mac botnet, Flame, etc.)
    What companies or individuals are infected today
    who will only know about it years from now?


PAGE 9 |    Kaspersky Lab Presentation   | September 26, 2012
Biggest Issue in Security 2012 (as always)

            Human beings!
            (impatient, proud, busy, curious…) – RSA’s $71M
            man
             For consumers: save yourself from yourself…
            The blurry boundaries between
            work, home, school – BYOD
             Who else are you jeopardizing?
             Who else is jeopardizing you?


    Best solution: forced patching & AV
PAGE 10 |        Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Better Internet Safety
            1. Your AV is your friend – be patient
            2. Use the best AV possible (not the free
            stuff!)
            3. Always patch when prompted
            4. Never click a link offered by any email
            without checking where it goes (you are
            looking for …marriott.com/ )
            5. Try to get everyone you work or play
            with to follow the same rules!

PAGE 11 |         Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Internet Safety
            6. On-line banking:
              Take the extra security!
              Log on after your AV updates and before
              going to any other websites
            7. Write down passwords (be complex)
            8. Make sure your Macs are protected
            too
            9. Let strange mail get “stale”
            10. Check suspicious email or links via
            phone (or not at all)

PAGE 12 |        Kaspersky Lab Presentation   | September 26, 2012
What Kaspersky Delivers!


            Fastest response to threats
            Cracks more archives and file types
            Consistently rated “the best” by independent
            test organizations
             www.av-test.org
             www.av-comparatives.org
             www.virusbtn.com


PAGE 13 |        Kaspersky Lab Presentation   | September 26, 2012
Fast Response Ensures the Shortest ‘Window of Opportunity’




PAGE 14 |   Kaspersky Lab Presentation   | September 26, 2012
Useful security links!

       KLAB Digest - a proactive security news push:
       KLAB Digest – email me to subscribe: security
       news highlights monthly
       cynthia.james@kaspersky.com
       www.securelist.com
       The more technical version
       www.threatpost.com
       Generic security information - “the first stop for
       security on the web”


  Email me for a free copy of Kaspersky PURE!




PAGE 15 |        Kaspersky Lab Presentation   | September 26, 2012
Thank You

 Kaseya & Kaspersky Lab
 What You Need to Know about Cyber Security in 2012



Cynthia James, Director Business Development, CISSP, Kaspersky Lab
Global Business Development
September 2012
Speakers




      Jeff Keyes        Scott Brackett
  Product Marketing   Product Manager
Kaseya’s Security Solution
• Blended Protection / Unified Platform / Remediation / Partners


                                     Anti-          Partners /
  Patching        Anti-Virus
                                    Malware        Remediation

                                                        Partners
   Operating
    System            Kaseya
                     Antivirus                          Agent
   MS Office                                          Procedures

                                      Kaseya         Monitoring &
                                    AntiMalware        Mobile
                      Kaseya                         Service Desk &
   3rd Party *
                     Endpoint                          Reporting
   Software          Security
  Deployment                                         Scheduling &
                                                     Management

                                                                   18
Show Me How Easy it is to Manage
All My Patches
KAV 1.4 - New Features
• Kaseya Anti-Virus 1.4 additions:
  1.   Manageability
  2.   Manageability
  3.   Manageability
  4.   File Share for updates / installs of endpoints
       dependent upon VSA 6.3

• Requires VSA 6.2 or higher
• Kaspersky 6.0.4 server & workstation
  – can continue managing existing AV 2010
KAV 1.4 Key Points
•   LAN Cache Support – for installs and updates; 6.3 required
•   Detections – filter and add to quarantine
•   Column Sets - definitions out of date/ reboot required/profile compliance issue
•   New Status Flags – 5 from “have active threats” to “reboot required”
•   Advanced Installation Options
     –   Select server and workstation
     –   Remove competing product
     –   Reboot if needed
     –   Prompt user for approval
     –   Skip if offline
     –   Endpoint password for uninstall and change options
•   Profile Visibility
•   Profile Configuration – BIGGEST addition The biggest/most requested change
•   License Management-
     –   Separate pools workstation & server
     –   Licensed from point of time install; not purchase
•   Reporting
•   Alerts
Show Me How Easy it is to Manage
Kaspersky AntiVirus
Resources

•   KAV 1.4 Help Doc
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm

•   KAV 1.4 Release Notes:
     – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm

•   KAV 1.4 Users Guide:
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf

•   Patch Users Guide:
     – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62.
       pdf#view=Fit&navpanes=0



    scott.brackett@kaseya.com
    jeff.keyes@kaseya.com
Patch Management Valu Prop
• Schedule scans
• Manage the Patch status on all machines
  or groups of machines
• Apply policies to individual or groups of
  machines
  – Logical Segmentation
  – Operating System Type
• Test Patches on groups before applying to
  others
• Alert and patch status

Contenu connexe

Tendances

Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...David Etue
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_programShannon Lietz
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationTjylen Veselyj
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSAShannon Lietz
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 

Tendances (20)

Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 

Similaire à Cybercrime Threats in 2012 - What You Need to Know

Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutiaTenzin Thiley
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundRickMeasham
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsBlack Duck by Synopsys
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security TestingRay Lai
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 

Similaire à Cybercrime Threats in 2012 - What You Need to Know (20)

Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Plus de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Plus de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Cybercrime Threats in 2012 - What You Need to Know

  • 1. Kaseya and Kaspersky Lab Cybercrime Threats in 2012: What You Need to Know Cynthia James, Director Business Development, CISSP September 2012
  • 2. Agenda Kaspersky Lab Today’s Threatscape & Top Threats 10 Internet Safety Tips Sources PAGE 2 | Kaspersky Lab Presentation | September 26, 2012
  • 3. About Kaspersky Lab Founded in 1997; largest private anti-malware company – 100% focused on anti-malware Over $600M annual revenues Presence in 19 countries: CEO is Russian; incorporated in the UK; new to US market in 2005 #1 vendor in Germany, France, Spain, Eastern Europe America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) Top supplier to OEMs/ISVs of anti-malware worldwide  Aggressively protecting businesses PAGE 3 | Kaspersky Lab Presentation | September 26, 2012
  • 4. Cybercrime threatscape: malware growth Recent years have seen exponential growth in malware. 200k unique malware samples were identified in 2006; 2M in 2007, over 15 million by 2009…50 million this past year. Now it is the quality of malware that improves annually. PAGE 4 | Kaspersky Lab Presentation | September 26, 2012
  • 5. Top Security Threats of 2012: backdrop Cybercriminals earn over $100 billion annually! Cybercrime markets are now very organized and sophisticated  everything has a price, most data has some value  Affiliate programs pay hackers to distribute malware “Rented” botnets & malware kits for sale Code re-use: there’s no such thing as “old news” in cybercrime  Trickle down effect (of tactics) PAGE 5 | Kaspersky Lab Presentation | September 26, 2012
  • 6. The power of botnets Kido (aka Conficker) botnet in May 2009 (peak) GFLOPS When the Kido botnet reached its peak in May 2009 it contained about 6 mln. zombie machines Botnet = an on-line army for rent PAGE 6 | Kaspersky Lab Presentation | September 26, 2012
  • 7. How infection occurs Infection vectors Delivered via email spam • Malware link: evil website masquerading as legit Legit website that’s been infected “Exploit” – the entry mechanism Trojans – the tool bot + bot + bot = botnet Botherder C&C (command & control) PAGE 7 | Kaspersky Lab Presentation | September 26, 2012
  • 8. On-line bank robberies Clampi Trojan $100M in 2010 from SMB, SLED  Goal: steal login and password for on-line bank accounts  Database of over 4500 different financially related sites  Learn about users’ on-line banking activity (times, dates)  Wait for a break in bank contact  Recruit money mules  Transfer money out in sums of under $10K  Money mule transfers out of the country PAGE 8 | Kaspersky Lab Presentation | September 26, 2012
  • 9. Top Security Threats 2012 Named viruses:  Stuxnet, Flame, APTs – Enterprises  Clampi – SMB Hacktivism – good or bad? Accelerated discovery of multi-year operations (Mac botnet, Flame, etc.) What companies or individuals are infected today who will only know about it years from now? PAGE 9 | Kaspersky Lab Presentation | September 26, 2012
  • 10. Biggest Issue in Security 2012 (as always) Human beings! (impatient, proud, busy, curious…) – RSA’s $71M man  For consumers: save yourself from yourself… The blurry boundaries between work, home, school – BYOD  Who else are you jeopardizing?  Who else is jeopardizing you? Best solution: forced patching & AV PAGE 10 | Kaspersky Lab Presentation | September 26, 2012
  • 11. 10 Tips to Better Internet Safety 1. Your AV is your friend – be patient 2. Use the best AV possible (not the free stuff!) 3. Always patch when prompted 4. Never click a link offered by any email without checking where it goes (you are looking for …marriott.com/ ) 5. Try to get everyone you work or play with to follow the same rules! PAGE 11 | Kaspersky Lab Presentation | September 26, 2012
  • 12. 10 Tips to Internet Safety 6. On-line banking: Take the extra security! Log on after your AV updates and before going to any other websites 7. Write down passwords (be complex) 8. Make sure your Macs are protected too 9. Let strange mail get “stale” 10. Check suspicious email or links via phone (or not at all) PAGE 12 | Kaspersky Lab Presentation | September 26, 2012
  • 13. What Kaspersky Delivers! Fastest response to threats Cracks more archives and file types Consistently rated “the best” by independent test organizations  www.av-test.org  www.av-comparatives.org  www.virusbtn.com PAGE 13 | Kaspersky Lab Presentation | September 26, 2012
  • 14. Fast Response Ensures the Shortest ‘Window of Opportunity’ PAGE 14 | Kaspersky Lab Presentation | September 26, 2012
  • 15. Useful security links! KLAB Digest - a proactive security news push: KLAB Digest – email me to subscribe: security news highlights monthly cynthia.james@kaspersky.com www.securelist.com The more technical version www.threatpost.com Generic security information - “the first stop for security on the web” Email me for a free copy of Kaspersky PURE! PAGE 15 | Kaspersky Lab Presentation | September 26, 2012
  • 16. Thank You Kaseya & Kaspersky Lab What You Need to Know about Cyber Security in 2012 Cynthia James, Director Business Development, CISSP, Kaspersky Lab Global Business Development September 2012
  • 17. Speakers Jeff Keyes Scott Brackett Product Marketing Product Manager
  • 18. Kaseya’s Security Solution • Blended Protection / Unified Platform / Remediation / Partners Anti- Partners / Patching Anti-Virus Malware Remediation Partners Operating System Kaseya Antivirus Agent MS Office Procedures Kaseya Monitoring & AntiMalware Mobile Kaseya Service Desk & 3rd Party * Endpoint Reporting Software Security Deployment Scheduling & Management 18
  • 19. Show Me How Easy it is to Manage All My Patches
  • 20. KAV 1.4 - New Features • Kaseya Anti-Virus 1.4 additions: 1. Manageability 2. Manageability 3. Manageability 4. File Share for updates / installs of endpoints dependent upon VSA 6.3 • Requires VSA 6.2 or higher • Kaspersky 6.0.4 server & workstation – can continue managing existing AV 2010
  • 21. KAV 1.4 Key Points • LAN Cache Support – for installs and updates; 6.3 required • Detections – filter and add to quarantine • Column Sets - definitions out of date/ reboot required/profile compliance issue • New Status Flags – 5 from “have active threats” to “reboot required” • Advanced Installation Options – Select server and workstation – Remove competing product – Reboot if needed – Prompt user for approval – Skip if offline – Endpoint password for uninstall and change options • Profile Visibility • Profile Configuration – BIGGEST addition The biggest/most requested change • License Management- – Separate pools workstation & server – Licensed from point of time install; not purchase • Reporting • Alerts
  • 22. Show Me How Easy it is to Manage Kaspersky AntiVirus
  • 23. Resources • KAV 1.4 Help Doc – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm • KAV 1.4 Release Notes: – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm • KAV 1.4 Users Guide: – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf • Patch Users Guide: – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62. pdf#view=Fit&navpanes=0 scott.brackett@kaseya.com jeff.keyes@kaseya.com
  • 24. Patch Management Valu Prop • Schedule scans • Manage the Patch status on all machines or groups of machines • Apply policies to individual or groups of machines – Logical Segmentation – Operating System Type • Test Patches on groups before applying to others • Alert and patch status

Notes de l'éditeur

  1. Points to make here: Even when presenting in a more educational (product free) format, we should say – this a slide to make you feel comfortable with who Kaspersky is today and give you confidence in the fact that we have the expertise to educate you on cybercrime. It’s also a good primer on how to pick any AV company whose product you use. Most importantly they should have a worldwide focus and millions of end points, because most cybercriminals test and tune their malware before they mass distribute it. So if we can catch it when it first appears, you’ll be protected by the time it reaches you. You can see that Kaspersky has: Millions of end pointsWW presence (for sampling and solutions) And: Kaspersky began distributing in the US only since 2005, but that was after rising to the top of every other AV market in the world. We’ve progressed quickly. Many people haven’t kept up with our growth because it’s been so rapid. When I started 5 years ago we were in the $100 million revenue range; today we have over $600M in revenues. Revenues do matter because a significant amount of that money goes back into our R&D, and they help us hire our worldwide staff – right now that’s about 2500 employees and a huge number of those are actively engaged in creating solutions to malware. We’re proud to be the leaders in providing technology to OEMs and ISVs (define what OEM means if your audience is unlikely to know). Overwhelmingly we are selected by companies like (list any which are not competitive). These OEMs and ISVs have very stringent technical requirements and are able to choose among all vendors. In fact our first ever deal back in 1997 involved licensing the technology to a company who sold to other businesses. Of course we credit the fact we are selected most often to the superiority of our solution.
  2. This is a visual representation of what I’m talking about. Kaspersky has a unique genealogy in the anti-malware community because we started out doing technology licensing deals. (Describe OEM briefly.) We licensed our technology to a company who then used it to protect other companies. This matters because in those days – back in the late 1990’s – home users who even had internet connections were still forcing a connection. It wasn’t even close to being “always on”, and getting updates every 48 hours was fine. But businesses were on the leading edge – they came on-line fastest with websites and customer interactivity, etc. So the technical requirement for protecting them was much more stringent than it was for home users. Serving the very demanding segment of business users forced us to compress the vulnerability window as much as possible and become really efficient about delivering the smallest updates possible.