End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an...
-
Upload
santos-sowl -
Category
Documents
-
view
215 -
download
2
Transcript of End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an...
![Page 1: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/1.jpg)
End Point Technologies
1
![Page 2: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/2.jpg)
End-Point ChallengesEnd-Point Challenges
EPP EfficacyThreats are breaking thru EPP at an increasing rateRise in threats discovered by users or post infection scans Hardware and Human resource costIncreased “Time Exposed to Danger” (TED) as advanced threats avoid detection and cleanup Signature models create unnecessary problems
Mutual EPP ExclusivityAs EPP products attempt to “punch above their weight” they are operating at the limits of their design parameters. As a result very few EPP products will co-exist denying customers the opportunity to improve protection by doubling up.
Vendor Research CapacityVendors no longer “have eyes” for low volume threats allowing high risk targeted attacks to go undetected
Poor/Non Existent EPP Security IntelligenceEPP designed as a protection layer with little or no surveillance capabilitiesLack of Intelligence makes Security Breach Detection and Management time consuming and unreliable and makes auditing all but impossible
End Point TechnologiesEnd Point Technologies
2
![Page 3: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/3.jpg)
Meeting the ChallengesMeeting the Challenges
EPP EfficacyInverted signature model, EPP client calculates ALL object signatures and feeds them to the centerPowerful generic detection and cleanup leveraging centralized intelligenceRapid un-intrusive scanning technology covering all forms of malware including rootkitsSmall footprint with low technology and human resource overheadsReduce “Time Exposed to Danger” (TED)
Mutual EPP ExclusivityWidest possible interoperability, by design
Vendor Research CapacityAutomation and linear scalability, by design – Prevx currently process 250,000 new objects /day
Poor Security IntelligenceMonitor all software then decide what is benign, what is malicious and what is worthy of closer attention. Don’t just look for known threats based on signatures or known behavior patterns.
Ease of use and simplicity and speed of installation, deployment and managementOne light weight agent with multiple uses –Incremental Detection/Remediation/Protection/SNACChoice of in-house or web based agent management or hybrid
End Point TechnologiesEnd Point Technologies
3
![Page 4: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/4.jpg)
The OpportunitiesThe Opportunities
Awareness and InformationKnowing what software exists, where , and for how long
Software NACSimple, fast, flexible EPP agent based System, Network or Application Access Control Extend EPP NAC to include casual visitors, even web connected clients
Security Breach ManagementInstall, scan and check 1,000 PCs for malware (including rootkits) in less than one hour
Customer Security ManagementEnable e-commence applications to query the security state of any web connected clientForce on-demand system scanForce cleanup before accessMonitor , verify and block poisoned DNS resolutionForce user into “more secure” browser environmentEnforce or monitor PC usage and authentication
End Point TechnologiesEnd Point Technologies
4
![Page 5: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/5.jpg)
Performance Comparison
5
![Page 6: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/6.jpg)
CSI / Edge System CSI / Edge System ImpactImpact
Edge: All components combined, produces only an 11MB RAM footprint.
CSI: Virtually no overhead when idle and shrinks to a 6MB RAM footprint.
Consistently low / transparent CPU usage: After 1 hour of heavy system use, Edge required only 24 seconds of kernel + user CPU time for realtime scanning.
Both products require less than 10 MB of available disk space and will run on computers with less than 64MB of physical RAM.
End Point TechnologiesEnd Point Technologies
6
![Page 7: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/7.jpg)
Without Edge: With Edge:
Edge impacted system performance by only 0.34% percent across a wide range of CPU, disk, and graphics benchmarks.
End Point TechnologiesEnd Point Technologies
PassMark™ System Performance ComparisonPassMark™ System Performance Comparison
7
![Page 8: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/8.jpg)
This chart compares size of the complete downloaded setup files of the above programs. (Lower is better)
0
20000
40000
60000
80000
100000
120000
Prevx EdgeNorton Antivirus
2009 McAfee VirusScanPlus 2009
846
116490114500
Size
(in
KB)
End Point TechnologiesEnd Point Technologies
Installation SizeInstallation Size
8
![Page 9: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/9.jpg)
End Point TechnologiesEnd Point Technologies
Registry Utilization ComparisonRegistry Utilization Comparison
0
1000
2000
3000
4000
5000
6000
Prevx Edge
Norton Antivirus 2009
McAfee VirusScanPlus 2009
672724
5412
This chart compares the count of registry entries installed by the above products. (Lower is better)
9
![Page 10: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/10.jpg)
Scan SpeedScan Speed
Although CSI scans extremely quickly, its rootkit scan and system analysis is as thorough as possible. It achieves this speed with some technical breakthroughs:
• The ability to duplicate the master file table (MFT) in memory and analyze files in an optimized sequence
• The ability to search through the system for duplicate/specific files in less than 1/100,000th of the time a standard search takes (0.01 seconds versus 20 minutes)
• The ability to analyze the system registry as a whole by reading it raw from the system and reorganizing it into a more optimized database format for on-demand analysis
• The ability to intelligently read the disk at a raw level, completely circumventing the Windows API, subsystem, and kernel
• The ability to use centralized, server-side resources to analyze behavior quickly and without requiring user resources
End Point TechnologiesEnd Point Technologies
10
![Page 11: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/11.jpg)
End Point TechnologiesEnd Point Technologies
System Scan TimeSystem Scan Time
Tests were conducted on the same Windows XP system with common software installing including the Microsoft Office Suite and Photoshop CS3.
0
1000
2000
3000
4000
5000
6000
Prevx EdgeMcAfee 2009
Trend Micro 2009
92
5301
2120
Seco
nds
11
![Page 12: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/12.jpg)
End Point TechnologiesEnd Point Technologies
Bootup Time ImpactBootup Time Impact
Tests were conducted on the same system and the resulting delay is the average of 5 reboots with the security product installed minus the average
without any security product.
0
20
40
60
80
Prevx EdgeMcAfee 2009
Trend Micro 2009
1.2
77.31
35.61
Seco
nds
12
![Page 13: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/13.jpg)
End Point TechnologiesEnd Point Technologies
Bandwidth Usage From Install to Full ProtectionBandwidth Usage From Install to Full Protection
0
20000
40000
60000
80000
100000
120000
Prevx EdgeMcAfee 2009
Trend Micro 2009
1322
101278.72 116788.32
Size
(KB)
13
![Page 14: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/14.jpg)
End Point TechnologiesEnd Point Technologies
Time from Install to Full ProtectionTime from Install to Full Protection
0
200
400
600
800
1000
Prevx EdgeMcAfee 2009
Trend Micro 2009
90674 825Se
cond
s
14
![Page 15: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/15.jpg)
Scan Comparative Video
15
![Page 16: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/16.jpg)
End Point TechnologiesEnd Point Technologies
Scan Comparative VideoScan Comparative Video
Please visit the following URL for a Scan Comparative video:
http://www.prevx.com/vid/scancomparative
16
![Page 17: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/17.jpg)
Rootkit DetectionRootkit Detection
• Rootkit scanning and low-level system analysis is the reason for the fast scan speed
• Uses a cross-section approach on raw disk structures, registry, and memory structures
• Reports all findings centrally to the database to ignore legitimate system modifications done by security products, etc. to prevent user confusion:
End Point TechnologiesEnd Point Technologies
Standard Flow of a File Read Request
fread() > ReadFile > NtReadFile > KiFastSystemCall > SSDT > ZwReadFile > [Minifilter driver stack] > [Legacy file system filter driver stack] > ntfs.sys > PhysicalDiskn device > Disk.sys > classpnp.sys > scsi.sys > HAL > BIOS
Flow of a CSI read request
CSIRawReadFile() > scsi.sys > HAL > BIOS
17
![Page 18: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/18.jpg)
Rootkit RemediationRootkit Remediation
• CSI removes rootkits by restructuring system components without the rootkits present before shutdown rather than falling into a race condition on bootup as other products do
• This provides stable rootkit removal which can remove any rootkit from the MBR rootkit to Rustock to TDSServ generically without having to write specific routines for each
• Spyware/usermode threat remediation isolates the threats from the rest of the system by closing or suspending open connections which the threats have and then forcing them to be removed, either from usermode or with the raw disk access modules
End Point TechnologiesEnd Point Technologies
18
![Page 19: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/19.jpg)
End Point TechnologiesEnd Point Technologies
Rootkit Scan ComparisonRootkit Scan Comparison
The popular antirootkit programs GMER and Rootkit Unhooker both
analyze the disk at a raw level like CSI to detect some of the threats which CSI can detect, however, they do so in a much less optimized manner.0
200
400
600
800
1000
1200
Prevx CSIGMER
Rootkit Unhooker
Scan
Tim
e (s
econ
ds)
These tests were performed on the same system with two rootkits active and an active usermode spyware infection. All three products detected the rootkits, but as CSI’s scan contains not only a
rootkit scan, it also identified the active spyware infection which the other products missed.
19
![Page 20: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/20.jpg)
Rootkit Infection Video
20
![Page 21: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/21.jpg)
End Point TechnologiesEnd Point Technologies
Rootkit Infection Video DemonstrationRootkit Infection Video Demonstration
Please visit the following URL for a Rootkit infection video demonstration:
http://www.prevx.com/vid/rootkitinfection
21
![Page 22: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/22.jpg)
Website Drop Video
22
![Page 23: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/23.jpg)
End Point TechnologiesEnd Point Technologies
Website Drop Video DemonstrationWebsite Drop Video Demonstration
Please visit the following URL for a website drop video demonstration:
http://www.prevx.com/vid/websitedrop
23
![Page 24: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/24.jpg)
Universal AgentCSI, Edge, Enterprise, eSAC
24
![Page 25: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/25.jpg)
Prevx SoftwarePrevx Software
Single Installation File: All Prevx products (CSI, Edge, eSAC, CSI-E) are contained in the single 1MB install file, requiring no additional downloads
Dynamic License Structure: The software will change dynamically depending on the license key entered or functionality requested
Light on Resources: The software is light on resources and requires a minimal number of files on disk as well as only two active processes to support multiple user accounts
End Point TechnologiesEnd Point Technologies
25
![Page 26: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/26.jpg)
Operating System Support
CSIWindows 7, 2008, Vista, 2003, XP, 2000, ME, 98, NT4Support for 32 bit and true 64 bit architectures
EDGEWindows 7, 2008, Vista, 2003, XP, 2000Support for 32 bit and true 64 bit architectures
ESACWindows 7, 2008, Vista, 2003, XP, 2000, ME, 98, NT4Support for 32 bit and true 64 bit architectures Plus Universal Browser support
End Point TechnologiesEnd Point Technologies
26
![Page 27: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/27.jpg)
EPP Compatibility
CSI, Edge and ESAC have been designed for complete compatibility between other security solutions and has been thoroughly tested and found to be completely compatible with all major enterprise security solutions including the following:
Symantec Endpoint Protection 11.0
McAfee Total Protection for Endpoint
Trend Micro Office Scan 8.0
Kaspersky Work Space Security*
ESET Smart Security Business Edition
Sophos Endpoint Security and Control 8
AVG Internet Security Network Edition 8.0
* A minor incompatibility between the memory scanner of Kaspersky and the self protection of Edge was found and corrected during testing
End Point TechnologiesEnd Point Technologies
27
![Page 28: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/28.jpg)
Consumer Security Suite Compatibility
CSI, Edge and ESAC are fully compatible with popular consumer security suites and have been thoroughly tested against the following popular suites as well as dozens of other products with no identified incompatibilities:
Norton Internet Security 2009
ESET Smart Security 2009
Trend Micro Internet Security 2009
McAfee Internet Security 2009
Kaspersky Internet Security 2009
AVG Internet Security 2009
F-Secure Internet Security 2009
G-Data Internet Security 2009
Panda Internet Security 2009
ZoneAlarm Internet Security Suite 2009
End Point TechnologiesEnd Point Technologies
28
![Page 29: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/29.jpg)
CSI and Edge
29
![Page 30: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/30.jpg)
End Point TechnologiesEnd Point Technologies
Prevx CSIPrevx CSI
Provides scanning and cleanup functionality for home users. Management takes place within the local software and users are provided a GUI to configure settings and schedule scans.
30
![Page 31: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/31.jpg)
End Point TechnologiesEnd Point Technologies
Prevx EdgePrevx Edge
Provides malware protection and advanced rootkit prevention with minimal system resource use and maximum compatibility with other software.
31
![Page 32: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/32.jpg)
End Point TechnologiesEnd Point Technologies
Software ConversionSoftware Conversion
Installing CSI automatically installs Edge. To activate the Edge functionality, the user can click “Prevent Infections” to upgrade to Edge.
To convert back to CSI from Edge, clicking “Revert to CSI” will disable the Edge functionality and revert the software to CSI.
32
![Page 33: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/33.jpg)
eSAC(eCommerce Secure Access Control)
33
![Page 34: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/34.jpg)
End Point TechnologiesEnd Point Technologies
Prevx eSACPrevx eSAC
Prevx eCommerce Secure Access Control protects accounts from fraud and phishing by utilizing centralized authentication validation intelligence and malware scanning with CSI.
34
![Page 35: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/35.jpg)
End Point TechnologiesEnd Point Technologies
Prevx eSACPrevx eSAC
Website Launches Prevx ESAC Seamlessly via special html <title>
Internet Integrity CheckLSP Chain. DNS Poison. Host File Injection.
Device Integrity CheckReal Time Malware Scan. AV Status Check.
Device/Account Cross CheckLogon History of this Device. Logon History of All Accounts using this device.
Website receives intimate knowledge of connected computer’s malware state and previous logon history in just 20 secs.
Website Continues Logon With more knowledge about the Connected PC
35
![Page 36: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/36.jpg)
End Point TechnologiesEnd Point Technologies
Prevx eSAC Video DemonstrationPrevx eSAC Video Demonstration
Please visit the following URL for a video demonstration:
http://www.prevx.com/vid/esac
36
![Page 37: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/37.jpg)
Enterprise
37
![Page 38: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/38.jpg)
End Point TechnologiesEnd Point Technologies
Prevx EnterprisePrevx Enterprise
Provides enterprise functionality and centralized management with alerts for large corporations. CSI also provides web-based management for smaller companies that do not have the resources to
run local server software.
38
![Page 39: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/39.jpg)
Enterprise AgentEnterprise Agent
• Built on current consumer offering
• Same strong detection and cleanup
• Lightweight implementation and Low-Resource footprint
• Compatibility for all windows platforms and with all security vendors
• Minimalistic user interface
• Communicates with in-house CSIE Server
End Point TechnologiesEnd Point Technologies
39
![Page 40: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/40.jpg)
Enterprise ServerEnterprise Server
• Multithreaded, single point of contact to the Prevx central database
• Own database implementation (MDB)
• Cloud-Response caching
• Agent configuration and distribution, report, alert and override capabilities
End Point TechnologiesEnd Point Technologies
40
![Page 41: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/41.jpg)
Enterprise ArchitectureEnterprise Architecture
End Point TechnologiesEnd Point Technologies
MDBAgents
• Determination• Configurations• Scan Histories• Overrides
Admins
Prevx CloudCommunity Database
CSIE Server
Firewall /Proxy server
SecureRelay Node
Agents
41
![Page 42: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/42.jpg)
End Point TechnologiesEnd Point Technologies
Enterprise StatusEnterprise Status
42
![Page 43: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/43.jpg)
End Point TechnologiesEnd Point Technologies
Enterprise AlertsEnterprise Alerts
43
![Page 44: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/44.jpg)
End Point TechnologiesEnd Point Technologies
Enterprise OverridesEnterprise Overrides
44
![Page 45: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/45.jpg)
End Point TechnologiesEnd Point Technologies
Enterprise Client ConfigurationEnterprise Client Configuration
45
![Page 46: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/46.jpg)
End Point TechnologiesEnd Point Technologies
Enterprise Remote DeploymentEnterprise Remote Deployment
46
![Page 47: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/47.jpg)
End Point TechnologiesEnd Point Technologies
Prevx Enterprise Video DemonstrationPrevx Enterprise Video Demonstration
Please visit the following URL for a video demonstration:
http://www.prevx.com/vid/csie
47
![Page 48: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/48.jpg)
MyPrevxOnline Management Console
48
![Page 49: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/49.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
All business users of either Prevx CSI , Prevx Edge and Prevx 2.0 receive access to the MyPrevx console as part of their subscription.
This allows administrators to manage not only the license and machines installed but also their auditing and alerting when a system is found to be infected.
49
![Page 50: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/50.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
MyPrevx for Business offers users a complete chronological list of infections found within their organisation.
System administrators and those tasked with assessing risk can easily see how and when certain infections might have impacted the security of their data.
50
![Page 51: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/51.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
MyPrevx Business allows you to administer your licenses...
51
![Page 52: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/52.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
... The machines on a license...
52
![Page 53: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/53.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
... And the individual machines.
53
![Page 54: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/54.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
MyPrevx offers both an over view of the infection and scan results of an individual machine together with details of co-existent EPP and their status
54
![Page 55: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/55.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
... As well as the full history of that machine while Prevx CSI/Edge was installed.
55
![Page 56: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/56.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
Full detailed information is available for all infections found within the business allowing the system administrator to assess it’s impact and further plan how they might respond across their organisation.
56
![Page 57: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/57.jpg)
MyPrevx MyPrevx – Business console– Business console
End Point TechnologiesEnd Point Technologies
57
![Page 58: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/58.jpg)
End-Point ChallengesEnd-Point Challenges
EPP EfficacyThreats are breaking thru EPP at an increasing rateRise in threats discovered by users or post infection scans Hardware and Human resource costIncreased “Time Exposed to Danger” (TED) as advanced threats avoid detection and cleanup Signature models create unnecessary problems
Mutual EPP ExclusivityAs EPP products attempt to “punch above their weight” they are operating at the limits of their design parameters. As a result very few EPP products will co-exist denying customers the opportunity to improve protection by doubling up.
Vendor Research CapacityVendors no longer “have eyes” for low volume threats allowing high risk targeted attacks to go undetected
Poor/Non Existent EPP Security IntelligenceEPP designed as a protection layer with little or no surveillance capabilitiesLack of Intelligence makes Security Breach Detection and Management time consuming and unreliable and makes auditing all but impossible
End Point TechnologiesEnd Point Technologies
58
![Page 59: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/59.jpg)
End Point Technologies
Thank You
59
![Page 60: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/60.jpg)
60
![Page 61: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/61.jpg)
Appendix
61
![Page 62: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/62.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
62
![Page 63: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/63.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
63
![Page 64: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/64.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
64
![Page 65: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/65.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
65
![Page 66: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/66.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
66
![Page 67: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/67.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
67
![Page 68: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/68.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
68
![Page 69: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/69.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
69
![Page 70: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/70.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
70
![Page 71: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/71.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
71
![Page 72: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/72.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
72
![Page 73: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/73.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
73
![Page 74: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/74.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
74
![Page 75: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/75.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
75
![Page 76: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/76.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
76
![Page 77: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/77.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
77
![Page 78: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/78.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
Meeting or Exceeding Standards:
• CSI Enterprise roadmap includes integration with standard Network Security Monitoring consoles, such as HP OpenView, IBM Tivoli, CA Unicenter, etc - thus providing quick integration of the agent with existing management solutions.
• Prevx eSAC is being developed to include the principles of a proprietary Network Access Control system, that follows and expands upon the goals of TNC in maintaining the ideals of integrity and identity.
78
![Page 79: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/79.jpg)
AppendixAppendix
End Point TechnologiesEnd Point Technologies
79
![Page 80: End Point Technologies 1. End-Point Challenges EPP Efficacy Threats are breaking thru EPP at an increasing rate Rise in threats discovered by users or.](https://reader035.fdocuments.in/reader035/viewer/2022070411/56649c925503460f9494e0c2/html5/thumbnails/80.jpg)
End Point TechnologiesEnd Point Technologies
AppendixAppendix
Installation of McAfee.Scan takes 30 mins on a computer with minimal base install of windows:
http://www.prevx.com/vid/scancomparativeopt
80