Today’s Threat Landscape Ryan Archer - Sales Engineer 1 ~8 new Internet users every second 2 30,000 new infected websites every day >80% small businesses 3 Where are these infections coming from? 4 5 Pavel Vrublevsky 6 Affiliate marketing, Russian style 7 How do we get infected? >10 billion ad impressions infected with malware last year 8 Please install my malware kit 9 10 Opportunistic threats Digital smash and grab 11 Why? Image: krebsonsecurity.com 12 Because… Image: krebsonsecurity.com 13 Drive-by downloads 14 Do you patch? 15 Old or new it must be patched CVE-2014-4822 CVE-2014-3201 CVE-2014-6492 CVE-2014-0322 CVE-2014-0500 CVE-2014-0319 CVE-2014-8068 CVE-2012-0158 16 17 Phishing 45 % of the time it works every time 18 Search Engine Optimization 19 Phishing – Enumeration made easy 20 Phishing – your site or mine? 21 Phishing – Campaigning 22 How about a quick example? 23 Ransomware 24 Ransomware 25 Cryptolocker 26 Cryptolocker file list 27 Advanced Threats 28 Another Popular Term(APT)? • Specific individuals • Specific well-defined goals • Nation-state sponsored • Espionage • Watering hole • Dragnet by vertical 29 Research 30 Exploit 31 Gain persistence 32 Explore 33 Act on objective 34 Clean up 35 In the news 36 What it means for businesses 37 Increasing attacks, increasing sophistication Attack surface exponentially larger Threats more sophisticated Laptops/Desktops Phones/Tablets Virtual servers/desktops Attacks are more coordinated than defenses 38 Today’s security approach is falling behind INCOMPLETE Always one more thing to deploy and manage COMPLICATED Too hard to configure, too much to monitor INEFFECTIVE Not keeping up with advanced threats 39 What we believe Security must be comprehensive The capabilities required to fully satisfy customer needs Security can be made simple Platform, deployment, licensing, user experience Security is more effective as a system New possibilities through technology cooperation 40 Project Galileo Technology integration that enables complete, simple-to-manage security that works effectively as a system. Next-Gen Network Security Next-Gen Server Protection Next-Gen Enduser Protection Sophos Confidential 41 Next-Gen Enduser Protection 42 The Endpoint Has Changed Corporate Perimeter Corporate Perimeter VPN Cloud Services 43 Endpoint Security Needs to Change Data Prevent Malware “Prevention is ideal, but detection is a must.” Prevent Malware Detect Compromises Remediate Threats Encrypt Data 44 Summary – Security Made Simple Reputation Data • Active Protection AT HOME AND ON THE MOVE SophosLabs Correlated intelligence • Content Classification REMOTE OFFICE Secure VPN RED Endpoint Security SafeGuard Encryption Mobile Control Secure Wi-Fi Endpoint Security SafeGuard Encryption Mobile Control Secure VPN Client HEADQUARTERS SOPHOS CLOUD Network Storage Antivirus Server Security Administration Web Application Firewall Mobile Control Secure Wi-Fi Endpoint Security SafeGuard Encryption Secure Web Gateway UTM NextGen Firewall Secure Web Gateway Secure Email Gateway Web Application Firewall Secure Email Gateway Guest Wi-Fi 45 And one more… Because we LOVE users…. 46 © Sophos Ltd. All rights reserved. 47
© Copyright 2024