This document discusses endpoint security and the limitations of antivirus software. It notes that 60-70% of malware goes undetected by antiviruses and that attackers have sophisticated methods to avoid detection. 90% of attacks exploit vulnerabilities or misconfigurations in systems. The document then promotes an endpoint security product called saner that aims to prevent attacks by proactively fixing vulnerabilities and misconfigurations. It claims saner reduces the attack surface, ensures compliance, and lowers costs compared to traditional vulnerability assessment products.
Overview of vulnerabilities, endpoint system security, and how attackers exploit weaknesses. Key data: 60-70% of malware undetected, 90% use system weaknesses.
Focus on prevention over cure, emphasizing the need for proper defenses and fixing vulnerabilities to stop malware.
Introduction to software that ensures compliance, prevents attacks, and saves time by fixing vulnerabilities.
Features of ANCOR platform, such as security intelligence, real-time visibility, and remediation measures for endpoint security.
Highlights reduced attack surfaces, compliance, bundling of remediation, and simplicity of use, specifically addressing regulatory compliance.
Antiviruses are proneto let
malicious programs pass
through, however great a
program is.
• It takes time to know what is a bad
program.
• Even if it did, attackers are far more
sophisticated in devising methods to stay
undetected for your antivirus programs.
Why? 60-70% of malware
go undetected
Industry’s biggest
analysts report
4.
90% of virusesmake
use of a weakness and
mis-configuration in the
system.
Making it easy for attackers to
launch their exploits from end
points.
5.
exploitation
techniques
have advanced
attackers have
infrastructureto
test all AV products
to make sure the
malicious code is
undetected
Attacker’s Work, Summarized
67%
malware go
unnoticed
blacklisting method
is not working
detection is hardautomate malware creationantivirus is not enoughstate de affairs
6.
widely exploited
applications
drop maliciouscode
through a combination of
social engineering and
vulnerabilities
malware stay in the
system, spread to other
systems
Modus
Operandi.
prevent.
instead of curetechniques.
get second line of defense from anti-malware products
Here.
proper
defense for
endpoint
security
fix the
vulnerabilities
or misconfigurations
fix
misconfigurationsStart
Keeps your endpointsystems compliant
Vulnerability mitigation software.
Prevents the attacks by proactively fixing vulnerabilities
saner Conform to every regulatory benchmark
11.
Eliminate massive time
consumedin fixing loopholes
Get rid of the laborious
tasks of fixing
Always stay compliant
Get razor sharp details on
every loophole
Powerful
choice.
saner
Probes security
of thesystems
Saner / defender*
ancor
agents run on
each endpoint
downloads the
relevant content
remediation
dataAssess and compares
system against
expected state
deviations
reported
Gives visibility through
dashboards in real-time
viser
vulnerability
data
reporting
interface for
the security
administrator
Applies remediation
measures in real-time
Heuristics*
* In our Roadmap
Software
reputation*
17.
1.With reduced attacksurface
2.Stay compliant always
3.Reduced cost of owning the solution
4. Bundled with patch management
Rediscover
vulnerability solution
18.
• Remediation isbundled, usually not the case
with other vulnerability assessment
products.
• Competing products only assess
(we manage vulnerabilities)
(We do not just give reports,
we help you fix)
• Reporting is simple, search based
• Simple to deploy and easy to use
• Fully SCAP compliant. It is easy to integrate
with other SCAP compliant solutions.
Why us?
Why Saner?
19.
1. Discover andmonitor assets
2. Apply operating system and application
vulnerability scanning and remediation
3. Makes sure organizational security benchmark
compliance and remediation is inline
4. Meet regulatory compliance PCI, HIPAA, NERC,
ISO 27001, USGCB, NIST 800-53
saner
put
to use