Next generation security services as the new paradigm. · Adaptive Defense Differentiation of...
Transcript of Next generation security services as the new paradigm. · Adaptive Defense Differentiation of...
![Page 1: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/1.jpg)
Next generation security
services as the new paradigm.Lampros Katsonis
Regional Presales Manager
![Page 2: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/2.jpg)
The Evolution of the Cyber Attacks
Since its inception in 1990, Panda Security has become a leading European multinational in the development of advanced cybersecurity solutions and management and monitoring tools.
We care for
+30Mcorporations
Innovating for
27years
We protect
+200Mdevices
Panda Security
Worldwide
Presence in
55countries
Products in
23different languages
1st
Company to introduce daily
signatures
Distribution in
+180countries
1st
Company to introduce cloud AV
solutions
![Page 3: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/3.jpg)
The Evolution of the Cyber Attacks
Dynamics of digital life.
“Nexus of forces”
Our current digital behavior means a complex,
interconnected, and hyper-dynamic environment.
Now, the perimeter is where the user is.
The complexity of IT systems increases vulnerability
in the face of cyber-threats.
![Page 4: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/4.jpg)
The Malware Industry
The Target is
the Endpoint……but only 11% of the security
budgets is allocated to protect them
% Incidents by Target
Source: Verizon Data Breach Investigations Report 2016.
![Page 5: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/5.jpg)
The Detection Gap
The Gap is
Getting Wider.
The figure shows how the percent of breaches
where time to compromise/time to discovery was
days or less is increasing.
Source: Verizon Data Breach Investigations Report 2016.
Attackers are
more efficient now
than ever before.
Time to
Discover
Time to
Compromise
![Page 6: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/6.jpg)
The Malware Industry
Challenge #1:
“Malwareless” attacks.
Attackers exploit social engineering and
vulnerabilities in the design of security
products.
“POWERWARE” attack
No vulnerabilities exploited.
No malicious URL involved.
No malware file on disk.
POWERSHELL encrypts files. Conventional defences won’t work.
![Page 7: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/7.jpg)
The Malware Industry
Challenge #2: Agent
clutter prevents visibility.
Non-integrated solutions create
complexity, performance issues, and lack
of visibility.
![Page 8: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/8.jpg)
The Malware Industry
Top challenge: Alert
noise
Only 4% of alerts are ever investigated.
Source: Ponemon Institute. “The cost of malware containment”. n=630.
“Two-thirds of the time spent by security staff responding to malware alerts is wastedbecause of faulty intelligence”
“It costs organizations an average of $1.27 million annually intime wasted responding to erroneous or inaccurate malware alerts”
4%
![Page 9: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/9.jpg)
A New Approach to Endpoint Security
A New Approach to
Endpoint Security.
![Page 10: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/10.jpg)
A New Approach to Endpoint Security
The Prevailing
Paradigm…
… is based on punctual detection only of known
malicious processes, this means that:
• All suspicious activity has to be investigated case
by case.
• All unknown malicious processes are allowed.
That’s why attackers skirt around these systems so
easily, and their attacks’ success rate is so high.
Suspicious
Malware
Unknown
More Risk
More Effort
![Page 11: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/11.jpg)
A New Approach to Endpoint Security
A New Cybersecurity
Paradigm.
It is based on the classification of absolutely all
running processes on your network.
• All activity of all programs is monitored and
analyzed in real-time.
• All behaviors are verified by a managed service,
the admins don’t have to investigate anything.
• Higher level of protection with fewer effort.
Suspicious
Malware
Unknown
Zero Risk
Goodware
All processes
are classified .Managed Service
Managed Service with
Real Time Visibility & Forensic Analysis
![Page 12: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/12.jpg)
MSSP & MDR
Customers’
environment
Panda Security
Architecture &
components
![Page 13: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/13.jpg)
Adaptive Defense
How Adaptive Defense Works.
Sequence of filters.
Technology Filter 1Black Listing
Filter 2White Listing
Filter 3Auto Classification
Filter 4Manual Classification
Detects Known Malware Known Goodware Unknown Processes New Attack Patterns
Based on Competition: HashAD: Behavior
Competition: HashAD: Behavior
AD: Machine Learning AD: Malware Analyst
Results 1.2 Billion 2.5 Billion 99.985% Automatic0.015% Manual1 Analyst: 250K endpoints
8
![Page 14: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/14.jpg)
Threat Hunting process
Adaptive Defense 11
![Page 15: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/15.jpg)
Adaptive Defense
Differentiation of Adaptive Defense.
Aplication Trustability Full traceability
ServiceManagement
• Compatible with other security products
• Simple and immediate installation
• Unattended: dedicated Panda’s analysts
• All alerts are confirmed
• Trusted applications
• Eliminates detection gap
• Real monitoring (no sandboxing)
• Forensic Aid
• SIEM integration
100% Malware Prevention & Protection TCO Drastically Improved
![Page 16: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/16.jpg)
Panda Adaptive Defense
Third party validation
100% detection rate in the last 6
months in a row. Real-world test.
AV-Comparatives Benchmark
![Page 17: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/17.jpg)
Panda Adaptive Defense
Third party validation
Ranked first in class for EDR Market with an overall rating of 4,7/5
Gartner’s Peer-Insights program
![Page 18: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/18.jpg)
Panda Adaptive Defense
Third party validation
“…it is the only vendor to include a
managed threat hunting service in the
base purchase”
“The 100% attestation service can
drastically reduce the threat surface of
endpoints”
“…organizations will have a much better
deployment success rate..:”
![Page 19: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/19.jpg)
Panda Adaptive Defense
Adaptive DefenseDifferentiating values.
100% Attestation Service
By Panda.
Continuous Monitoring and Threat Hunting
Total Visibility of endpoint activity.
Seamless Deployment and Management
![Page 20: Next generation security services as the new paradigm. · Adaptive Defense Differentiation of Adaptive Defense. Aplication Trustability Full traceability Management Service •Compatible](https://reader034.fdocuments.in/reader034/viewer/2022050117/5f4ddf0e58c8084e814fa4b9/html5/thumbnails/20.jpg)
Reinventing
Cybersecurity.