Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Holy Threat Intelligence AMPman! We Need Endpoint Security!

1,699 views

Published on

Some men just want to watch the network burn.

With malware on the rise and hackers attacking government agencies from every angle, federal agencies face an uphill battle. In the Malware Universe, federal networks need a hero, one who wages a never-ending fight for truth, justice and American data.

Are you ready to be the hero your network deserves?

Published in: Technology
  • Be the first to comment

Holy Threat Intelligence AMPman! We Need Endpoint Security!

  1. 1. SO OUR TECHNOLOGY DEFENSES GREW TOO… …LEADING TO THE INVENTION OF AND .
  2. 2. OH NO! WE’VE BEEN . HOW COULD THIS HAPPEN???
  3. 3. IT’S HAPPENING .
  4. 4. RANSOMWARE ATTACKS DAILY IN THE U.S. OF USERS CLICK UNKNOWN LINKS DESPITE THE RISK BREACHES IN 2015 WITH CONFIRMED DATA LOSS THE NUMBERS ARE .
  5. 5. OF IT PROS SEE PHISHING AND SOCIAL ENGINEERING AS TOP THREATS OF VICTIMS WERE NOTIFIED BY AN EXTERNAL ENTITY MEDIAN DAYS BEFORE DETECTION
  6. 6. THE HACKERS BEHIND THE 2015 BREACH OF THE OFFICE OF PERSONNEL MANAGEMENT USED AVENGERS-THEMED NICKNAMES TO HIDE THEIR TRACKS.THE FIRST EVIDENCE OF A BREACH WAS DISCOVERED IN 2014: MALWARE UPLOADED TO OPM SERVERS FROM AN UNAUTHORIZED DOMAIN REGISTERED TO STEVE ROGERS—THE ALTER-EGO OF
  7. 7. HACKERS’ METHODS ARE CHANGING— AND SO ARE THEIR MOTIVATIONS.
  8. 8. 0% 10% 20% 30% 40% 50% 2009 2010 2011 2012 2013 2014 2015 TODAY, THE MOST HEAVILY PURSUED ATTACK SURFACE IS THE ENDPOINT.
  9. 9. HACKERS’ MOTIVATIONS HAVE ALSO CHANGED… 0% 25% 50% 75% 100% 2009 2010 2011 2012 2013 2014 2015
  10. 10. NO MATTER WHAT THE MOTIVE, WITH RANSOMWARE STRIKING NEARLY EVERY 40 SECONDS, YOUR ORGANIZATION’S CHANCE OF BEING TARGETED CONTINUES TO GROW.
  11. 11. IS CRITICAL...
  12. 12. IT’S THE PROCESS OF PROTECTING YOUR NETWORK AS ACCESSED BY REMOTE DEVICES. THAT INCLUDES END-USER DEVICES: • MOBILE • LAPTOPS • DESKTOP PCS • SERVERS EACH OF THESE DEVICES CREATES A POTENTIAL ENTRY POINT FOR WOULD- BE ATTACKERS, AND THUS ARE POTENTIAL SECURITY THREATS.
  13. 13. THAT’S GREAT. BUT WE ALREADY HAVE ANTI-VIRUS. WE DON’T NEED ANYTHING ELSE.
  14. 14. INTRODUCING… BY
  15. 15. SO, WHAT EXACTLY IS
  16. 16. AMP Threat Intelligence Cloud AMP on Web and Email Security Appliances AMP on Cisco® ASA Firewall with Firepower Services AMP Private Cloud Virtual Appliance AMP on Firepower NGIPS Appliance (AMP for Networks) CWS/CTA AMP on Cloud Web Security and Hosted Email Threat Grid Malware Analysis + Threat Intelligence Engine AMP on ISR with Firepower Services AMP for Endpoints Remote Endpoints Windows OS Android Mobile Virtual MAC OS CentOS, Red Hat, Linux for servers & datacenters AMP for Endpoints AMP for Endpoints can be launched from AnyConnect INTEGRATED THREAT DEFENSE, EVERYWHERE ARCHITECTURE
  17. 17. THEY SAY IT’S BACKED BY ! BUT … WHAT DOES THAT ACTUALLY MEAN?
  18. 18. TAKES THAT KNOWLEDGE AND CORRELATES IT AGAINST FILES, TELEMETRY DATA AND FILE BEHAVIOR TO PROACTIVELY DEFEND AGAINST KNOWN AND EMERGING THREATS. EXPERTS ANALYZE MILLIONS OF MALWARE SAMPLES AND TERABYTES OF DATA PER DAY, CREATING A VAST KNOWLEDGE BASE OF INTELLIGENCE THAT IT THEN PUSHES TO AMP.
  19. 19. WHEN YOU CHOOSE , YOU CHOOSE A SOLUTION BACKED AND SUPPORTED BY THE INDUSTRY’S MOST EXTENSIVE COLLECTION OF CYBERSECURITY INTELLIGENCE.
  20. 20. WITH OF MALWARE PROVING UNIQUE TO A SPECIFIC ENDPOINT*, CAN YOU AFFORD NOT TO? *WEBROOT
  21. 21. LET AND HELP.

×