Internet Security: Malware UpdateJose BodniDirector, Latin America & CaribbeanJose.Bodni@M86Security.com
Change in Malware-hosted SitesBlended Threats 1.0Blended Threats 2.0Legitimate SitesHacker-established SitesLegitimate SitesHacker-Established Sites  Up for Days
  Simpler Detection Through:
 Domain Restriction
 Reputation
  Some Change in Viruses
Up for Days
Legitimate Site Passes by Most 	Web Filters
Polymorphic Viruses Change Many 	Times Per Day
“New” Malware Never Used Again**Source: Virus Arms Race, The Register, August 2009
Anatomy of a Blended Threat Attack2) 	Attacker sends emails with embedded links to malicious Web sites.1) 	Attacker hacks legitimate Web sites and injects malware.5) 	Traditional Web filters are bypassed as user is directed to legitimate Web site.3) 	Email bypasses traditional spam and anti-virus systems.6) 	User’s computer gets infected with drive-by download and becomes a bot.4) 	User receives email and clicks on link to malware-infected site.
Customer Challenge for 2011: Web-based ThreatsWeb-based ThreatsWeb malware from legitimate sites*92%1000%84%Increase in Web malware over 2010Of new threats come from the Web*Source: Websense
Customer Challenge for 2011: Web-based ThreatsWeb 2.0 Landscape40-50%Current AV catch rates*CollaborationToolsSocialNetworkingEnterpriseSaaSWEB 2.0SocialMediaMediaSharingClientApplicationsInteractiveSharingMassComms52%10 billionMalware dead within 24 hours**World-wide blended threat emails per day*Source: M86 SecurityLabs**Source: Panda Labs
Why Real-time Detection is so ImportantM86 Security Labs ReportTest: >30,000 live malware URLsTraditional Security:Stool StrategyURL Filtering3.8%effectiveThree Major AV Vendors Combined39%effectiveReal-time Code AnalysisSix-in-10 threats require real-time code analysis to be blockedLeg 3Leg 2Leg 1Anti-virusSignatures100%effectiveReal-time Detection(Code Analysis)URL Filtering
M86 SWG: Multi-tiered Threat ProtectionMALWARE DETECTEDWhere it comes from?Previously discovered malwarewebsitesURL FILTERING3.8% Effective39% Effective*SIGNATURE-BASEDANTI-VIRUSWhat it looks like?Identified malware signaturesWhat is its intentions?Dynamically analyzes unknown codes for malware-related behaviors100% Effectivein detecting known threats and unknown obfuscated malware codesREAL-TIME CODEANALYSISSource: M86 Security Labs Report (test based on >30,000 live malware URLs*Three major AV vendors combined
M86 SWG: Multi-tiered Threat ProtectionWhat is its intentions?What it looks like?Dynamically analyzes unknown codes for malware-related behaviorsWhere is it?Identified malware signaturesPreviously discovered malware websitesBlock /Allow /RepairBlock / AllowBlock / AllowSuspect webpageRepaired/Re-constructed web page
M86 Product Overview
AppliancesComplianceStrong FoundationCurrent M86 Security ProductsProductsDeployment OptionsWeb SecurityMessaging SecurityReportingComplianceAnti-virusMalware DetectionApplication ControlAnti-virusMalware DetectionOutbound SecurityEncryptionData Loss PreventionArchivingGranular ReportingReal-time MonitoringSoftwareCloud Service (SaaS)
M86 Secure Web GatewayUnified Web Security Award-winning, best-in-breed, multi-layered, on-site and cloud-based Web security. Patented, active real-time code analysis of inbound and outbound communication, keeping malware out of networks and laptops, while retaining sensitive/confidential data.
M86 Secure Web GatewayUnified Web Security Key Features:Web Security
Real-time Code Analysis
Anti-virus
Anti-spyware
SSL Inspection
Dynamic Web Repair
Data Leakage Prevention
Productivity & Web 2.0 Control
URL Filtering

M86 Security apresenta Secure Web Gateway

  • 1.
    Internet Security: MalwareUpdateJose BodniDirector, Latin America & CaribbeanJose.Bodni@M86Security.com
  • 2.
    Change in Malware-hostedSitesBlended Threats 1.0Blended Threats 2.0Legitimate SitesHacker-established SitesLegitimate SitesHacker-Established Sites Up for Days
  • 3.
    SimplerDetection Through:
  • 4.
  • 5.
  • 6.
    SomeChange in Viruses
  • 7.
  • 8.
    Legitimate Site Passesby Most Web Filters
  • 9.
    Polymorphic Viruses ChangeMany Times Per Day
  • 10.
    “New” Malware NeverUsed Again**Source: Virus Arms Race, The Register, August 2009
  • 11.
    Anatomy of aBlended Threat Attack2) Attacker sends emails with embedded links to malicious Web sites.1) Attacker hacks legitimate Web sites and injects malware.5) Traditional Web filters are bypassed as user is directed to legitimate Web site.3) Email bypasses traditional spam and anti-virus systems.6) User’s computer gets infected with drive-by download and becomes a bot.4) User receives email and clicks on link to malware-infected site.
  • 12.
    Customer Challenge for2011: Web-based ThreatsWeb-based ThreatsWeb malware from legitimate sites*92%1000%84%Increase in Web malware over 2010Of new threats come from the Web*Source: Websense
  • 13.
    Customer Challenge for2011: Web-based ThreatsWeb 2.0 Landscape40-50%Current AV catch rates*CollaborationToolsSocialNetworkingEnterpriseSaaSWEB 2.0SocialMediaMediaSharingClientApplicationsInteractiveSharingMassComms52%10 billionMalware dead within 24 hours**World-wide blended threat emails per day*Source: M86 SecurityLabs**Source: Panda Labs
  • 14.
    Why Real-time Detectionis so ImportantM86 Security Labs ReportTest: >30,000 live malware URLsTraditional Security:Stool StrategyURL Filtering3.8%effectiveThree Major AV Vendors Combined39%effectiveReal-time Code AnalysisSix-in-10 threats require real-time code analysis to be blockedLeg 3Leg 2Leg 1Anti-virusSignatures100%effectiveReal-time Detection(Code Analysis)URL Filtering
  • 15.
    M86 SWG: Multi-tieredThreat ProtectionMALWARE DETECTEDWhere it comes from?Previously discovered malwarewebsitesURL FILTERING3.8% Effective39% Effective*SIGNATURE-BASEDANTI-VIRUSWhat it looks like?Identified malware signaturesWhat is its intentions?Dynamically analyzes unknown codes for malware-related behaviors100% Effectivein detecting known threats and unknown obfuscated malware codesREAL-TIME CODEANALYSISSource: M86 Security Labs Report (test based on >30,000 live malware URLs*Three major AV vendors combined
  • 16.
    M86 SWG: Multi-tieredThreat ProtectionWhat is its intentions?What it looks like?Dynamically analyzes unknown codes for malware-related behaviorsWhere is it?Identified malware signaturesPreviously discovered malware websitesBlock /Allow /RepairBlock / AllowBlock / AllowSuspect webpageRepaired/Re-constructed web page
  • 17.
  • 18.
    AppliancesComplianceStrong FoundationCurrent M86Security ProductsProductsDeployment OptionsWeb SecurityMessaging SecurityReportingComplianceAnti-virusMalware DetectionApplication ControlAnti-virusMalware DetectionOutbound SecurityEncryptionData Loss PreventionArchivingGranular ReportingReal-time MonitoringSoftwareCloud Service (SaaS)
  • 19.
    M86 Secure WebGatewayUnified Web Security Award-winning, best-in-breed, multi-layered, on-site and cloud-based Web security. Patented, active real-time code analysis of inbound and outbound communication, keeping malware out of networks and laptops, while retaining sensitive/confidential data.
  • 20.
    M86 Secure WebGatewayUnified Web Security Key Features:Web Security
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Editor's Notes

  • #5 Malware landscape continues shift to Web-based attacks.Web security now an organizational imperative.Finjan is a recognized leader in SWG and malware defense.The Finjan technology, combined with M86 Email and Web security products, presents a effective solution for both known and unknown threats
  • #6 Malware landscape continues shift to Web-based attacks.Web security now an organizational imperative.Finjan is a recognized leader in SWG and malware defense.The Finjan technology, combined with M86 Email and Web security products, presents a effective solution for both known and unknown threats.
  • #7 Recent data from M86 Security Labs shows the importanceWe usually talk about using the three-legged stool for complete protection: URL filtering Anti-virus (AV)Real-time code analysisWe know that URL filtering and AV signatures have become less effective: it’s all over the newsBut few people really test on live malware. Why? Because it’s their own product.We ran a test on 30,000 live malware URLs in February 2010 and we were astonished by the results Leg 1: we passed 15,000 samples through URL filter: only 3.8% effective; just as bad, about 40% of the sites were shown as good and 60% as unclassified Leg 2: we passed 15,000 samples through three AV applications: the three combined only caught 39% of the malware Leg 3: our real-time code analysis caught 100%What’s the difference? There are two main reasons:These are mostly on legitimate Web sites now, so URL filtering doesn’t helpDynamic code is being used to get around signature-based AV.We have a report up on our Web site
  • #13 Total cost of ownership is reduced by powerful central management with global reach that includes intuitive task-based policy management and drill-down reporting. Integration with existing IT infrastructure is easy for all implementation options.
  • #17 A robust multi-server array with a low total cost of ownership. The flexible and intuitive policy enforcement provides customizable protection from Web threats while allowing detailed control of user Web browsing behaviors.
  • #18 M86 MailMarshal SMTPEmail Gateway Security Provides:Blended threats protection Data leakage prevention/deep content scanning using lexical analysisBest rated anti-spam solution using M86 Defense-in-Depth anti-spam engineTLS email encryptionM86 Secure Messaging Service Cloud-based Email SecurityM86 MailMarshal ExchangeInternal email security for Microsoft ExchangeFilters and Manages Internal, Inbox-to-Inbox EmailM86 MailMarshal Secure Email ServerEmail Gateway Encryption Provides: Encryption Digital signatureOperates With Any Email Gateway that Recognizes S/MIME-encrypted Email
  • #20 Complete control over inbound and outbound email in any environment, resulting in reduced exposure to risk and full email content management. An easy-to-use console, flexible policy framework and reporting tools ensure a high return on investment.
  • #22 Centralized control of encrypted communication between your company and your business partners. Consistent application of policies ensure that sensitive emails never insecurely leave your organization. Automatic harvesting and synchronization of certificates make the product extremely easy to use and maintain.
  • #25 Leader in real-time threat protectionIDC noted we are largest provider of web security appliancesOnly company that’s visionary in SWG and EmailComplete suite of products: Appliance, Cloud, and Software