Sophos Email Appliance · Sophos Email Appliance User Guide Product Version 4.3 Sophos Limited 2018
Security: more important than ever - Sophos Day Belux 2014
-
Upload
sophos-benelux -
Category
Education
-
view
445 -
download
3
Transcript of Security: more important than ever - Sophos Day Belux 2014
1
Analyzing and rethinking securityJorn Lutters, Pre-Sales Engineer for Sophos
Security: More important than ever.
22
Threat trendsand 2014 notable cases
3
4
5
6
7
8
9
10
11
12
42.8 million
Security incidents detected per year.
© PWC Information Security Survey 2015
117,339incoming attacks per day, every day –roughly 1,5 per second
13
MalvertisementsLegitimate websites serving malware
30,000Infections per hour –just for Yahoo alone.That’s roughly 8 computers per second
225%Increase in popularity in 2014 - currently 1 in 5 add providers are compromised
14
Professionalism, Crimeware“Monetization”: Bulk of Threats Are Automated, Coordinated & Professional
50% 75% 88%
Welcome to the Age of Personalized Malware
50% of our detections are based on only 19 malware identities.
75% of unique pieces of malware are targeted attacks (i.e., are not seen beyond the organization targeted).
88% of malware found in fewer than 10 other organizations.
1515
Let’s talk about security
16
1717
Problem 1:
Complexity
18
19
2020
Problem 2:
Security overlap(Compatibility issues)
21
22
2323
Problem 3:
Mind the gap
24
25
Solution A Solution B
Solution C
You are here
2626
Problem 4:
Segmentation
27
28
2929
Problem 5:
Defense in depth
30
31
32
33
3434
SophosSimpleSecurity
35
0 13
8
50
.0
10.0
20.0
30.0
40.0
50.0
60.0
100-499Employees
500-999Employees
1000-4,999Employees
5000-19,999Employees
20,000+Employees
Sophos’ core customers
Challenged by ComplexityLimited by Resources
36
Corporate Owned and
BYOD
Protect My Data
Go Wireless
Users Are Everywhere
What About Securing My
Servers?
Can’t Control Users via
Brute Force
Downtime Unacceptable
“Console Proliferation”
& “Agent Pollution”
Transition to the Cloud
Regulations & Compliance
Help Desk Queries
37
Corporate Owned and
BYOD
Protect My Data
Go Wireless
Users Are Everywhere
What About Securing My
Servers?
Can’t Control Users via
Brute Force
Downtime Unacceptable
“Console Proliferation”
& “Agent Pollution”
Transition to the Cloud
Regulations & Compliance
Help Desk Queries
New Attack Surfaces
(Android, iOS)
250,000 New Threats Will
Appear Today
Polymorphic Threats Affect
Everyone
Macs Are No Longer
Immune
Not Just A “Big Company” Problem
IT Systems Are The Lifeblood
for Any Size Org
3838
Sophos CompleteSecurity
Anti-spam
BYOD solution
Anti-malware
Usage policies
Security Management
Firewall
Encryption
39
Complete Security…
Made Simple.
Network End Users and DevicesServers
Simple Deployment Simple Protection Simple Management
• On premise• Virtual• Cloud• User self provision
• Active Protection – real-time protection powered by SophosLabs
• Live lookups via the Cloud• SophosLabs experts tune the
protection so you don’t have to
Next GenFirewall
Anti-malware and IPS
URLFiltering
NetworkAccess Control
Wireless VPN Anti-Spam EmailEncryption
Anti-Malware
Mobile Encryption PatchAssessment
Application Control
Device Control
Encryption for Cloud
Endpoint WebProtection
Anti-Malware
Webserver Protection
Virtualization
Intuitive consoles: On Premise or
From the Cloud
Backed by expert support
App Control
V-Shield
40
AT HOME AND ON THE MOVE
Mobile Control Endpoint SecuritySafeGuard Encryption
HEADQUARTERS
Endpoint SecuritySafeGuard Encryption
REMOTE OFFICE 1
NextGen Firewall
Secure Wi-Fi
Endpoint SecuritySafeGuard Encryption
Secure Wi-Fi
Secure VPN Client
Mobile Control
Reputation Data • Active Protection SophosLabs Correlated intelligence • Content Classification
Administration
SOPHOS CLOUD
Web Application Firewall
Secure Email Gateway
Secure Web Gateway
Mobile Control
Network Storage AntivirusServer Security
Guest Wi-Fi
UTMNextGen Firewall
Secure Web GatewaySecure Email Gateway
Web Application Firewall
REMOTE OFFICE 2
Secure Wi-Fi
Endpoint SecuritySafeGuard Encryption
Mobile Control
Secure VPN RED
42
HEADQUARTERS
AT HOME
ON THE MOVE
SAMPLES
TELEMETRY
HONEY POTS
HUMAN DECISION MAKING
AUTOMATED LEARNING& AUTOMATION
BIG DATA
ANALYTICSDynamic & Static
SOPHOSLABS
REMOTE OFFICE
43
SophosLabsActive Protection
Malware Data
Website URL Database
HIPS Rules
Reputation Data
MaliciousURLs
Spam Campaigns
Sensitive Data Types
Application Categories
Device Data
Mobile Application Reputation
Anonymizing Proxies
Application Patches
Network Servers Devices
Web EmailNextGen FW
Web App FW
Wifi
Smartphone/Tablet
Workstation/Laptop
Data
Correlated Intelligence
Reputation Data
Content Classification
File
Web
44
45
EFFECTIVENESS
USA
BIL
ITY
“INTEGRATED”PRODUCT
PORTFOLIO
COMPLETE SECURITY
INTEGRATION
POINT SOLUTION
46
“Complex solutions aren’t solutions. We make security for the real world – for the pragmatic enterprise. Simple security is better security.”
Kris Hagerman, CEO Sophos
47
4848
Why they should’ve gone for Sophos
Recent cases and how Sophos can help prevent disaster
49
50
51
SECand UTM Advanced Threat Protection
C&C ServerURL Database
Command & Control Server
Check URL
Contact C&C server
C&CBlock
File checksum
suspicious
Analyze
SXLSend file
Pattern
ATP
IPS
Webproxy
DNS
IP tables
AFC
52
53
SMCand Mobile Encryption
54
55
DLPmet Safeguard encryptie
56© Sophos Ltd. All rights reserved.