SlideShare a Scribd company logo
1 of 27
How to Detect & Resolve
Today’s High Profile
Threats
Ayehu
Guy Nadivi, Sr. Director of Business Development
Sharon Cohen, Professional Services Manager
OPSWAT
Taeil Goh, Chief Technology Officer
George Prichici, Product Manager
Guy Nadivi
Sr. Director,
Business Development
Sharon Cohen, CISM
IT & Security Professional Services
Manager
Taeil Goh
CTO
George Prichici
Product Manager
Today’s Webinar is Presented by:
SF & DC
USA
Veszprém
Hungary
Tokyo
Japan
Timisoara
Romania
London
UK
Ho Chi Minh City
Vietnam
Global Offices
Company highlights
OPSWAT named one of top 500
World’s Hottest Security Companies
• Founded in 2002
• Headquartered in San Francisco
• Offices in Hungary, Japan, Romania, UK, and Vietnam
• Global 24/7 support
• More than 1,000 customers worldwide
• 300 technical partners
• 3 patents
• 14 years of growth
• 140 FTE’s
• 90 engineers
Metadefender - Core Technology
OPSWAT Research
OPSWAT research
The value of individual antimalware engines
OPSWAT research
The value of Metadefender
antimalware package
https://www.metadefender.com/stats
OPSWAT research
The power of many overcome the power of few
After 11 days, 23 out of 43
engines detect the threat
17 out of 43 engines detect
the threat after 3 days
On the first scan,
only 4 engines
detect the threat
Metadefender exposure times:
Metadefender 4: 36 hours
Metadefender 8: 36 hours
Metadefender 12: 36 hours
Metadefender 16: zero-day
Metadefender 20: zero-day
Metadefender 30: zero-day
OPSWAT research
Faster outbreak detection – from days to hours
OPSWAT research
Outbreak Report
False Alarm
OPSWAT research
Outbreaks or False Positives?
Assumes all
files are bad
Removes embedded
scripts and macros
Rebuilds files, retaining
usability and formatting
Content Disarm & Reconstruction
Sanitize productivity documents
Enhanced Data Sanitization
FOUNDED:
2007
(bootstrapped)
FOUNDERS:
Gabby Nizri
Yaron Levy
FUNDING:
July 2015: $3M
Series A, BGV & KEC
(Palo Alto & NY)
CUSTOMERS:
150+
Mid-Large Ent.
(and growing)
OFFICES:
 Tel Aviv
 New York
 Bay Area
GROWTH:
Rapid!
(Consecutive
Record Years)
PRODUCT:
eyeShare™ v4.8
first GA 2009
About Ayehu
People don’t scale very well
Why are Security
Teams Falling
Behind?
"A report from Cisco puts the global figure at one million
cybersecurity job openings. Demand is expected to rise to
6 million globally by 2019, with a projected shortfall of 1.5
million."
- Michael Brown, CEO at Symantec, the world’s largest security software vendor
Why Not Just Hire More People?
Automation
can be a
Force
Multiplier
"The automation and coordination aspects of an integrated
threat defense help to reduce time to detection,
containment, and remediation. Reducing false positives
helps security teams focus on what matters most."
- Cisco 2016 Annual Security Report (page 63)
Cisco’s View on Security Automation
eyeShare
Self-Service Portal
Event
Scan
Results
Suggestions Remediating Actions
Remediating Actions (automatic)
Automating Threat Defense
Speed of
Response is
CRITICAL to
Defeating
Threats
No Programming Required !
Over 500
pre-built
activities
Over 150 pre-built
workflows /
playbooks
Easy-to-use
drag-and-
drop
interface
Building an Automated Security Playbook
Integrating with your Infrastructure
Demo Time
Questions?
Thank You!
Guy Nadivi
Sr. Director of Business Development
E guy@ayehu.com
Sharon Cohen
Professional Services Manager
E sharon@ayehu.com
O +1 (800) 652-5601
2000 University Ave., Ste. 600
E. Palo Alto, CA 94303
http://www.ayehu.com/
Taeil Goh
Chief Technology Officer
E taeil@opswat.com
George Prichici
Product Manager
E gprichici@opswat.com
O +1 (415) 590-7300
398 Kansas St.
San Francisco, CA 94103
www.opswat.com

More Related Content

What's hot

What's hot (17)

Setting up a Cloud Center of Excellence (CCoE) for Enterprise Customers
Setting up a Cloud Center of Excellence (CCoE) for Enterprise CustomersSetting up a Cloud Center of Excellence (CCoE) for Enterprise Customers
Setting up a Cloud Center of Excellence (CCoE) for Enterprise Customers
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
 
Know What You Don’t Know - ModusBox Presents the Metrics Dashboard
Know What You Don’t Know - ModusBox Presents the Metrics DashboardKnow What You Don’t Know - ModusBox Presents the Metrics Dashboard
Know What You Don’t Know - ModusBox Presents the Metrics Dashboard
 
AtlasCamp 2014: Atlassian Connect State of the Union
AtlasCamp 2014: Atlassian Connect State of the UnionAtlasCamp 2014: Atlassian Connect State of the Union
AtlasCamp 2014: Atlassian Connect State of the Union
 
(ISM308) 9 Best Practices to Avoid Stalled Cloud Transformation
(ISM308) 9 Best Practices to Avoid Stalled Cloud Transformation(ISM308) 9 Best Practices to Avoid Stalled Cloud Transformation
(ISM308) 9 Best Practices to Avoid Stalled Cloud Transformation
 
Heroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps TransformationsHeroes’ Journey: Learning from Successful DevOps Transformations
Heroes’ Journey: Learning from Successful DevOps Transformations
 
Deliver More Customer Value with Value Stream Management
Deliver More Customer Value with Value Stream ManagementDeliver More Customer Value with Value Stream Management
Deliver More Customer Value with Value Stream Management
 
2022 Google Academy
2022 Google Academy 2022 Google Academy
2022 Google Academy
 
Holistic approach to cloud adoption
Holistic approach to cloud adoptionHolistic approach to cloud adoption
Holistic approach to cloud adoption
 
CIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing GrowthCIS14: Double Trouble—Managing Growth
CIS14: Double Trouble—Managing Growth
 
Why DevOps and Agile Fails in Corporate Transformation
Why DevOps and Agile Fails in Corporate TransformationWhy DevOps and Agile Fails in Corporate Transformation
Why DevOps and Agile Fails in Corporate Transformation
 
AWS Financial Governance Practice
AWS Financial Governance Practice AWS Financial Governance Practice
AWS Financial Governance Practice
 
Case Studies: Harnessing Speed for Competitive Advantage
Case Studies: Harnessing Speed for Competitive AdvantageCase Studies: Harnessing Speed for Competitive Advantage
Case Studies: Harnessing Speed for Competitive Advantage
 
Agile Delivery- Elevating the role of the PM to Trusted Advisor
Agile Delivery- Elevating the role of the PM to Trusted AdvisorAgile Delivery- Elevating the role of the PM to Trusted Advisor
Agile Delivery- Elevating the role of the PM to Trusted Advisor
 
MetaASO J-WebFramework
MetaASO J-WebFrameworkMetaASO J-WebFramework
MetaASO J-WebFramework
 
Dops Seed Investment Pitch
Dops Seed Investment PitchDops Seed Investment Pitch
Dops Seed Investment Pitch
 
Visual Notes from ABA Techshow 2015
Visual Notes from ABA Techshow 2015Visual Notes from ABA Techshow 2015
Visual Notes from ABA Techshow 2015
 

Viewers also liked

Everbridge Decision Making During Disasters
Everbridge Decision Making During DisastersEverbridge Decision Making During Disasters
Everbridge Decision Making During Disasters
Everbridge, Inc.
 
Everbridge Notification World 2010
Everbridge Notification World 2010Everbridge Notification World 2010
Everbridge Notification World 2010
Russell Robinson
 
Effective Messaging and Message Mapping - New England
Effective Messaging and Message Mapping - New EnglandEffective Messaging and Message Mapping - New England
Effective Messaging and Message Mapping - New England
asalters
 
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
Everbridge, Inc.
 
Everbridge: Notification in a Heartbeat
Everbridge: Notification in a HeartbeatEverbridge: Notification in a Heartbeat
Everbridge: Notification in a Heartbeat
Everbridge, Inc.
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
Singlewire Software
 
ITSM Deep Dive: Prioritization, Escalation, and Alerting
ITSM Deep Dive: Prioritization, Escalation, and AlertingITSM Deep Dive: Prioritization, Escalation, and Alerting
ITSM Deep Dive: Prioritization, Escalation, and Alerting
Jesse Andrew
 

Viewers also liked (20)

Everbridge Decision Making During Disasters
Everbridge Decision Making During DisastersEverbridge Decision Making During Disasters
Everbridge Decision Making During Disasters
 
Everbridge Notification World 2010
Everbridge Notification World 2010Everbridge Notification World 2010
Everbridge Notification World 2010
 
Key considerations
Key considerationsKey considerations
Key considerations
 
Effective Messaging and Message Mapping - New England
Effective Messaging and Message Mapping - New EnglandEffective Messaging and Message Mapping - New England
Effective Messaging and Message Mapping - New England
 
How to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency IncidentsHow to Avoid Anxiety During Emergency Incidents
How to Avoid Anxiety During Emergency Incidents
 
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
Everbridge Webinar: Learn Marathon Petroleum’s Top Data Management Best Pract...
 
Everbridge Webinar - The New Corporate ISO 22301 BC Standard
Everbridge Webinar - The New Corporate ISO 22301 BC StandardEverbridge Webinar - The New Corporate ISO 22301 BC Standard
Everbridge Webinar - The New Corporate ISO 22301 BC Standard
 
Everbridge: Notification in a Heartbeat
Everbridge: Notification in a HeartbeatEverbridge: Notification in a Heartbeat
Everbridge: Notification in a Heartbeat
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
 
Everbridge: How to Plan for a Disaster
Everbridge: How to Plan for a DisasterEverbridge: How to Plan for a Disaster
Everbridge: How to Plan for a Disaster
 
IT Incident Communication Buyer's Guide: 10 Questions to ask an IT Alerting V...
IT Incident Communication Buyer's Guide: 10 Questions to ask an IT Alerting V...IT Incident Communication Buyer's Guide: 10 Questions to ask an IT Alerting V...
IT Incident Communication Buyer's Guide: 10 Questions to ask an IT Alerting V...
 
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
 
Tintricity on the Road: Unified Critical Communications
Tintricity on the Road: Unified Critical CommunicationsTintricity on the Road: Unified Critical Communications
Tintricity on the Road: Unified Critical Communications
 
ITPA
ITPAITPA
ITPA
 
今こそ、日本古来の「お国柄」を反映させた地域再生を ー民政自治の考え方ー
今こそ、日本古来の「お国柄」を反映させた地域再生を ー民政自治の考え方ー今こそ、日本古来の「お国柄」を反映させた地域再生を ー民政自治の考え方ー
今こそ、日本古来の「お国柄」を反映させた地域再生を ー民政自治の考え方ー
 
Beyond the ITIL Binder: Process Improvements Through Critical Communications
Beyond the ITIL Binder: Process Improvements Through Critical CommunicationsBeyond the ITIL Binder: Process Improvements Through Critical Communications
Beyond the ITIL Binder: Process Improvements Through Critical Communications
 
Applying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and RiskApplying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and Risk
 
Capital market ppt
Capital market pptCapital market ppt
Capital market ppt
 
ITSM Deep Dive: Prioritization, Escalation, and Alerting
ITSM Deep Dive: Prioritization, Escalation, and AlertingITSM Deep Dive: Prioritization, Escalation, and Alerting
ITSM Deep Dive: Prioritization, Escalation, and Alerting
 
Capital market ppt
Capital market pptCapital market ppt
Capital market ppt
 

Similar to How to Detect and Resolve Today's High-Profile Threats

[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
OWASP Russia
 

Similar to How to Detect and Resolve Today's High-Profile Threats (20)

DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just Security
 
The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional  The Emerging IT Landscape and the IT GRC and Security Professional
The Emerging IT Landscape and the IT GRC and Security Professional
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
 
Pol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and timePol Vanbiervliet, Cisco: remove the barriers between space and time
Pol Vanbiervliet, Cisco: remove the barriers between space and time
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Application Security by Ethical Hackers
Application Security by Ethical HackersApplication Security by Ethical Hackers
Application Security by Ethical Hackers
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Analyst Keynote: Continuous Delivery: Making DevOps Awesome
Analyst Keynote: Continuous Delivery: Making DevOps AwesomeAnalyst Keynote: Continuous Delivery: Making DevOps Awesome
Analyst Keynote: Continuous Delivery: Making DevOps Awesome
 
16231
1623116231
16231
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
 
Euromoney's integration journey: Selecting SnapLogic's self-service integrati...
Euromoney's integration journey: Selecting SnapLogic's self-service integrati...Euromoney's integration journey: Selecting SnapLogic's self-service integrati...
Euromoney's integration journey: Selecting SnapLogic's self-service integrati...
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 

More from Ayehu Software Technologies Ltd.

More from Ayehu Software Technologies Ltd. (8)

Automating Your Service Desk With ServiceNow and Slack in Less Than an Hour
Automating Your Service Desk With ServiceNow and Slack in Less Than an HourAutomating Your Service Desk With ServiceNow and Slack in Less Than an Hour
Automating Your Service Desk With ServiceNow and Slack in Less Than an Hour
 
How To Automate Labor-IntensiveServiceNow Tasks Without Programming
How To Automate Labor-IntensiveServiceNow Tasks Without ProgrammingHow To Automate Labor-IntensiveServiceNow Tasks Without Programming
How To Automate Labor-IntensiveServiceNow Tasks Without Programming
 
How to Keep Your CMDB up to-date With IT Automation
How to Keep Your CMDB up to-date With IT AutomationHow to Keep Your CMDB up to-date With IT Automation
How to Keep Your CMDB up to-date With IT Automation
 
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+AyehuDefeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
Defeat Ransomware and Ward off Extortionists with LightCyber+Ayehu
 
What's the value proposition in adding automation/orchestration on top of Ser...
What's the value proposition in adding automation/orchestration on top of Ser...What's the value proposition in adding automation/orchestration on top of Ser...
What's the value proposition in adding automation/orchestration on top of Ser...
 
How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
Ayehu eyeShare Overview
Ayehu eyeShare OverviewAyehu eyeShare Overview
Ayehu eyeShare Overview
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

How to Detect and Resolve Today's High-Profile Threats

  • 1. How to Detect & Resolve Today’s High Profile Threats Ayehu Guy Nadivi, Sr. Director of Business Development Sharon Cohen, Professional Services Manager OPSWAT Taeil Goh, Chief Technology Officer George Prichici, Product Manager
  • 2. Guy Nadivi Sr. Director, Business Development Sharon Cohen, CISM IT & Security Professional Services Manager Taeil Goh CTO George Prichici Product Manager Today’s Webinar is Presented by:
  • 3. SF & DC USA Veszprém Hungary Tokyo Japan Timisoara Romania London UK Ho Chi Minh City Vietnam Global Offices Company highlights OPSWAT named one of top 500 World’s Hottest Security Companies • Founded in 2002 • Headquartered in San Francisco • Offices in Hungary, Japan, Romania, UK, and Vietnam • Global 24/7 support • More than 1,000 customers worldwide • 300 technical partners • 3 patents • 14 years of growth • 140 FTE’s • 90 engineers
  • 4. Metadefender - Core Technology
  • 6. OPSWAT research The value of individual antimalware engines
  • 7. OPSWAT research The value of Metadefender antimalware package https://www.metadefender.com/stats
  • 8.
  • 9. OPSWAT research The power of many overcome the power of few
  • 10. After 11 days, 23 out of 43 engines detect the threat 17 out of 43 engines detect the threat after 3 days On the first scan, only 4 engines detect the threat Metadefender exposure times: Metadefender 4: 36 hours Metadefender 8: 36 hours Metadefender 12: 36 hours Metadefender 16: zero-day Metadefender 20: zero-day Metadefender 30: zero-day OPSWAT research Faster outbreak detection – from days to hours
  • 13. OPSWAT research Outbreaks or False Positives?
  • 14. Assumes all files are bad Removes embedded scripts and macros Rebuilds files, retaining usability and formatting Content Disarm & Reconstruction Sanitize productivity documents
  • 16. FOUNDED: 2007 (bootstrapped) FOUNDERS: Gabby Nizri Yaron Levy FUNDING: July 2015: $3M Series A, BGV & KEC (Palo Alto & NY) CUSTOMERS: 150+ Mid-Large Ent. (and growing) OFFICES:  Tel Aviv  New York  Bay Area GROWTH: Rapid! (Consecutive Record Years) PRODUCT: eyeShare™ v4.8 first GA 2009 About Ayehu
  • 17. People don’t scale very well Why are Security Teams Falling Behind?
  • 18. "A report from Cisco puts the global figure at one million cybersecurity job openings. Demand is expected to rise to 6 million globally by 2019, with a projected shortfall of 1.5 million." - Michael Brown, CEO at Symantec, the world’s largest security software vendor Why Not Just Hire More People?
  • 20. "The automation and coordination aspects of an integrated threat defense help to reduce time to detection, containment, and remediation. Reducing false positives helps security teams focus on what matters most." - Cisco 2016 Annual Security Report (page 63) Cisco’s View on Security Automation
  • 21. eyeShare Self-Service Portal Event Scan Results Suggestions Remediating Actions Remediating Actions (automatic) Automating Threat Defense
  • 22. Speed of Response is CRITICAL to Defeating Threats
  • 23. No Programming Required ! Over 500 pre-built activities Over 150 pre-built workflows / playbooks Easy-to-use drag-and- drop interface Building an Automated Security Playbook
  • 24. Integrating with your Infrastructure
  • 27. Thank You! Guy Nadivi Sr. Director of Business Development E guy@ayehu.com Sharon Cohen Professional Services Manager E sharon@ayehu.com O +1 (800) 652-5601 2000 University Ave., Ste. 600 E. Palo Alto, CA 94303 http://www.ayehu.com/ Taeil Goh Chief Technology Officer E taeil@opswat.com George Prichici Product Manager E gprichici@opswat.com O +1 (415) 590-7300 398 Kansas St. San Francisco, CA 94103 www.opswat.com