This document discusses endpoint security and the limitations of antivirus software. It notes that 60-70% of malware goes undetected by antiviruses and that attackers have sophisticated methods to avoid detection. 90% of attacks exploit vulnerabilities or misconfigurations in systems. The document then promotes an endpoint security product called saner that aims to prevent attacks by proactively fixing vulnerabilities and misconfigurations. It claims saner reduces the attack surface, ensures compliance, and lowers costs compared to traditional vulnerability assessment products.
3. Antiviruses are prone to let
malicious programs pass
through, however great a
program is.
• It takes time to know what is a bad
program.
• Even if it did, attackers are far more
sophisticated in devising methods to stay
undetected for your antivirus programs.
Why? 60-70% of malware
go undetected
Industry’s biggest
analysts report
4. 90% of viruses make
use of a weakness and
mis-configuration in the
system.
Making it easy for attackers to
launch their exploits from end
points.
5. exploitation
techniques
have advanced
attackers have
infrastructure to
test all AV products
to make sure the
malicious code is
undetected
Attacker’s Work, Summarized
67%
malware go
unnoticed
blacklisting method
is not working
detection is hardautomate malware creationantivirus is not enoughstate de affairs
6. widely exploited
applications
drop malicious code
through a combination of
social engineering and
vulnerabilities
malware stay in the
system, spread to other
systems
Modus
Operandi.
8. prevent.
instead of cure techniques.
get second line of defense from anti-malware products
Here.
proper
defense for
endpoint
security
fix the
vulnerabilities
or misconfigurations
fix
misconfigurationsStart
10. Keeps your endpoint systems compliant
Vulnerability mitigation software.
Prevents the attacks by proactively fixing vulnerabilities
saner Conform to every regulatory benchmark
11. Eliminate massive time
consumed in fixing loopholes
Get rid of the laborious
tasks of fixing
Always stay compliant
Get razor sharp details on
every loophole
Powerful
choice.
saner
16. Probes security
of the systems
Saner / defender*
ancor
agents run on
each endpoint
downloads the
relevant content
remediation
dataAssess and compares
system against
expected state
deviations
reported
Gives visibility through
dashboards in real-time
viser
vulnerability
data
reporting
interface for
the security
administrator
Applies remediation
measures in real-time
Heuristics*
* In our Roadmap
Software
reputation*
17. 1.With reduced attack surface
2.Stay compliant always
3.Reduced cost of owning the solution
4. Bundled with patch management
Rediscover
vulnerability solution
18. • Remediation is bundled, usually not the case
with other vulnerability assessment
products.
• Competing products only assess
(we manage vulnerabilities)
(We do not just give reports,
we help you fix)
• Reporting is simple, search based
• Simple to deploy and easy to use
• Fully SCAP compliant. It is easy to integrate
with other SCAP compliant solutions.
Why us?
Why Saner?
19. 1. Discover and monitor assets
2. Apply operating system and application
vulnerability scanning and remediation
3. Makes sure organizational security benchmark
compliance and remediation is inline
4. Meet regulatory compliance PCI, HIPAA, NERC,
ISO 27001, USGCB, NIST 800-53
saner
put
to use