1 / 12

John Prisco

John Prisco. President and CEO Triumfant, Inc. Customer Information Security Concerns. Our defenses are designed to defeat threats we have seen before. We have very little protection against new types of threats.

hadar
Download Presentation

John Prisco

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. John Prisco President and CEO Triumfant, Inc.

  2. Customer Information Security Concerns • Our defenses are designed to defeat threats we have seen before. We have very little protection against new types of threats. • The time it takes for us to learn about and defend against a new threat is measured in days or weeks. • We are largely unaware of the changes occurring within our computing environment on a day-to-day basis.

  3. Defenses are unable to adequately protect computers The Static Defense Shield Problem

  4. What We Need: An Active, Adaptable Defense Sense Understand Inform Act • Dramatically increase the volume and flow of sensory input • Use machine intelligence to convert sensory input into knowledge • Provide flexible and powerful interfaces optimized for data navigation • Provide the ability to synthesize responses to address new threats on-the-fly

  5. Sense DeepScan Don’t assume, collect everything • Continuously scans over 200,000 attributes • Registry keys - Files • Processes - Services • Open ports - Event Logs • - Performance counters - Security settings • Hardware attributes - Memory tables • 500 sensitive attributes scanned every 10 seconds

  6. Understand Understand Data must be converted into knowledge • The Adaptive Reference Model • A detailed baseline model of what is normal • at a particular point in time • Compares subsequent snapshots and determines if changes have malicious intent. • Based on patented data mining algorithms Powerful Analytics ? • Known Good • Normal • Known Bad

  7. Inform: Actionable View Into Your Environment Inform: An Actionable View Into Your Environment

  8. Act Awareness Enables Precise Action • Automatically derives a custom-built remediation response on-the-fly • Surgically precise and unobtrusive • Removes malware and corrects collateral damage • All remediations are reversible Point Remediation

  9. Triumfant Active Defense: On the Endpoint Patented algorithms that remove malware in minutes • Finds and removes malware that other defenses miss • Does not require signatures or any prior knowledge • Continuous monitoring of the detailed state of the computer provides situational awareness of the entire enterprise • Effective against APTs, polymorphics and sophisticated targeted attacks from determined adversaries

  10. Parting Thought In the time it took me to deliver this speechmore than 4000 new malware threats were detected.

More Related