340 likes | 640 Views
Arnie De Almeida Sophos arnie@sophos.com. Understanding the NEW Threat Landscape. Personally identifiable information. Customer data. Intellectual property. Changing security landscape. Digital generation set loose. Information theft – not graffiti. Firewall. $.
E N D
Arnie De Almeida Sophos arnie@sophos.com Understanding the NEW Threat Landscape
Personally identifiable information Customer data Intellectual property Changing security landscape Digital generation set loose Information theft – not graffiti Firewall $ Complex threats.... Corporate data Mobile workers Fast changing Web-based, Invisible Targeted ...targeting commercial data Contractors, outsourcing Partners, customers Web 2.0 – social media Regulatory disclosure and reputation damage PCI-DSS HIPAA GLBA 95/46/EC CSB 1386
Malware is on the Rise • 150,000 new unique malicious malware samples every day during 2011 • One every 0.5 seconds, 60% increase over 2010 • 30,000 new malicious URLs every day – every 2.9 seconds • 40% increase over mid year report • 80% on legitimate websites • 85% of all malware (including viruses, worms, spyware, adware and Trojans) comes from the web
Communication Shift Significant shift in the last 6-8 months. 59% decrease in email use among 12-17 year olds.
The web: where the malware threat is A threat network • The number one source of infection • Legitimate sites are regularly infected • Productivity filtering isn’t enough • Many applications accessing the web How people do web protection today • Large scale deployments that focus on the gateway • Backhauling traffic to appliances • None or limited protection for users not connecting to the gateway
Fake AV Today’s top malware problem Unprecedented growth • We’ve now seen >500,000 variants • Over 10,000 new variants a day • Google estimates >15% of web malwareis FakeAV Highly effective – infection is easy • Social engineering or black-hat SEO • Hijacked legitimate sites • Too many variants & changing quickly • Traditional defences ineffective • Millions of dollars at stake for • Distributors, Authors, Affiliates
Malware hits OS X MacDefender, MacSecurity and more
Social Engineering Social engineering is a primary method of attack • Cybercriminals know what motivates people (money, sex, gossip, etc) and exploit these themes to infect computers and steal information • We can upgrade operating systems and vulnerable apps all we like – it’s much harder to patch the human brain
Social networking attacks • Social networking accounts are valuable to hackers • 600,000 facebook accounts are compromised each day (Oct. 2011) • They can use them to send spam, spread malware, steal identities.. • .. just like a compromised botnet PC
Malicious email spam • Email remains a significant vector for threats • Spammers using html attachments more than .exe to deliver malware • Spearphishing attacks – Lockheed Martin • Sees 1 million probes per day against it’s network • Takes advantage of holes in Office and Adobe products to launch malicious code within innocent-looking documents
RustockBotnet Knockout • March 2011 • Coordinated efforts • Microsoft, University of WA, FireEye, U.S. Federal Agents • Rustock knocked offline • High volume botnet • 30 billion spam messages a day – Pharmacy Express/Viagra • Resulted in an immediate drop of about 30% in global spam volumes
Consequences of data loss 500M records1 compromised since ‘05 • Costs: $214/record2$7.2m/incident2 Fines: $1.5m/yr3, 5k/violation/record4, unlimited5 • Disclosures: Bad press, Reputation damage • Net: Loss of business • 1) www.privcyrights.org • 2) Annual Cost of a Data Breach ‘10, Ponemon Institute • 3) HITECH Act (US) – healthcare 4) Mass. Data security regulation 201 CMR 17 5) Data Protection Act (UK)
Encrypt and Stay Safe Full disk encryption on laptops/desktops File share encryption for network share drives Removable media encryption for USB drives, CD/DVD’s Cloud file encryption when using cloud storage
Mobile Malware Android leads the malicious charge
Passcodes NOT to use on your iPhone 15% of all iPhone owners use one of just ten passwords on their lock screen
A look at Q3 & Q4 2012 • Growth in malware spread by social media & the web • Not just Windows anymore • Mobile platforms evolve – so do the threats • New technologies = new threat vectors • More consumerized devices holding corporate data • Increase in Hactivism and targeted attacks • The basics will still go wrong – patches, password mgmt • Cloud services – how do you protect that data?
IT security is hard • More to protect – data, devices, mobile workers • Still getting infected • Too many complicated solutions to manage • Too expensive, takes too much time • California SB1386
We think there’s a better way Our vision: Complete Security, without complexity • Better protection: the "security layer" for corporate IT: • Better together • Increased visibility • Full security lifecycle • Active Protection • Better value: it’s less complex, It’s supported by experts, and it fits your security budget 23
We’re a recognized leader Protecting businesses for over 25 years, with unrivalled reputation for reliability and service • Experts in Threat and Data Protection • Global business with a local presence • Protect over 100 million users • Reputation for highest quality • Fastest growing of the three largest endpoint security companies Leaderin the Gartner Magic Quadrant for Endpoint Protection Leaderin the Gartner Magic Quadrant for Mobile Data Protection
Sophos: Trusted globally to protect 100K+ small and medium global enterprises 6M+ teachers and students, 2M+ government users Powering branded security solutions, wide range of technology partners & global enterprises Endorsed by analysts
Complete security Covering the entire security lifecycle • Complete security keeps you protected around the clock • Best in-class security solutions and SophosLabs protection • Consolidates your security budget so you get more value for your dollar
Two paths to Complete Security Mid – Large Endpoint/DP/mobile driven Small – Mid UTM driven
Note: We recommend you choose either this slide or slide 8 to talk about the detail behind the products . Using both likely to be too much. This slide animates so the text on the right is obscured when not in show mode - separate slides are included at the end of the deck. Complete Security Everything you need to stay protected Network Unified Data Endpoint Mobile Email Web Prevent web threats and make web access safe and productive -everywhere. Fast, effective antivirus and complete security for your users – wherever they are. • Mobile • Allows remote lock or wipe in case of lost or theft • Controls which devices can access company email • Manages, deploys, removes installed apps • Simple to use self-service portal • Web • Provides malware protection, URL filtering, and content control • Detects anonymizing proxies • Filters encrypted HTTPS traffic • Includes remote “heartbeat” monitoring • Endpoint • Protects Windows, Mac, Linux, UNIX andvirtualplatforms • Controls applications, devicesandnetworkaccess • Integrates web protection, data controlandencryption • Includes FREE home use foryouremployees • Data • Secures Windows and Mac with full-disk encryption • Protects USB sticks and DVDs with removable media encryption • Manages Microsoft Bitlocker • Enables secure data sharing with key management • Email • Stops spam, phishing, malware and dataloss • Protects Exchange, UNIX, and Notes servers • Eliminatesorautomatesmaintenancetasks • Unified • Unified protection for your business with one central management interface • Comprehensive enterprise-class security applications including firewall, VPN, IPS, antivirus, antispam, email encryption, web filter, application control, web application firewall, secure wireless connections and endpoint security • Scalable solution that grows with your needs and allows you to shape the level of protection that is right for your business • Network • Protect your infrastructure with Firewall and Intrusion Prevention Systems • Secure your communication with branch offices and remote workers through encrypted VPN • Extend protection capabilities easily into wireless LANs Keep your network infrastructure safe andsecurely connect branch offices, remote workers and wireless LANs. Secure your email to prevent spam, malware and data loss Encryption options to help you comply, and let your users securely access, share and recover data. Secure, monitor and control iPhone, iPad, Android and Windows Mobile devices. Eliminate the complexity of multiple point solutions with one integrated solution. It gives you complete security to protect endpoint computers as well as network, web, and email.
The Sophos Difference Sophos Secure Protection Suites Endpoint Web Protection Patch • Encryption
The Sophos Difference Better Protection and Reducing IT Costs • The Sophos Protection Suite • School District IT Director saves $35k • “THANK YOU for looking out for us … Currently we have a deficit of about $3 million due to the fact that the state keeps cutting us… So thanks to you, • you saved a job…. Because of this bundle, we now will be able to reduce our expenditures about 35K”
Two paths to complete security Mid – Large Endpoint/DP/mobile driven Small – Mid UTM driven
Sophos UTM Sophos Complete Security within a single Appliance Network Protection Firewall, Intrusion Prevention, VPN & Wireless Protection at the perimeter Web and Email Protection Optional features for flexible UTM protection at the perimeter Endpoint Protection and Mobile Control Protect communication and data directly at the endpoint
Better Protection Working better together Today: • Web protection everywhere • Data protection everywhere • Desktops & Laptops everywhere • Stopping Advanced Persistent Threats (APT’s) • Network security everywhere: across central office, remote offices, wireless, VPN • Managing personal smartphones/tablets – BYOD Even better soon … Protection Suites for: • Government • Higher Ed • K-12 • Enterprise
Staying ahead of the curve http://nakedsecurity.sophos.com http://www.youtube.com/SophosLabs @chetwisniewski on Twitter