Security Research is good for the business
-
Upload
g-data-software -
Category
Technology
-
view
393 -
download
0
Transcript of Security Research is good for the business
2
SECURITY RESEARCH IS GOOD FOR BUSINESSJAN HAVER – DIRECTOR STRATEGIC PRODUCTS
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 3
FROM UTILITY TO SECURITY
Offering information and services for free on a massive scale Result: The business model behind a lot of the G DATA product
portfolio just vanished Solution: focus on AntiVirus, the product we invented
Then came… the internet.
G DATA Software has been selling a wide range of utility software products in the course of it’s 30 years of existence - some very useful, some very exotic…
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4
CONSUMER MARKET At that point, being a security pioneer, G DATA already had a lot of experience with security
software The number of vendors offering security software was relatively limited
Result: it was relatively easy for G DATA to become a leading player in the market of security solutions for consumers
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5
SECURITY FOR BUSINESSES New challenge: offering security for business customers We decided for in-house development of a product that could adequately serve the needs of the
market Today’s business solutions are technically much more complex than consumer products The market for business solutions was much more mature and much more densely populated
by the time G DATA was ready to enter it
Result: it was much harder for G DATA to successfully enter the market of security solutions for businesses
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6
NOT EASY… BUT WE DID IT For a number of years, the G DATA business solutions can perfectly compete with the leading
brands in the market, offering security for businesses of any size
Across the globe our business solutions are by now in use with a wide variety of companies and organizations, in different market segments
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7
SOME EXAMPLES Bild durch Klicken auf Symbol hinzufügen
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8
AIRPORT MÜNSTER - OSNABRÜCK German airport with 100 servers and 500 clients
G DATA Endpoint Protection Business
Opted for G DATA because of- Very easy to manage- Level of protection (both cyber crime and espionage)- Low impact on system performance
“As a German company, G DATA is bound by the strict German security laws. As such we are sure that no sensitive date will end up in the wrong hands.”
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 9
LONDON ACADEMY Secondary school in UK with virtualized Windows server
and over 1500 clients
G DATA Endpoint Protection Business
Opted for G DATA because of- Level of protection against malware- Interesting pricing
“G DATA ranked at the top of independent malware detection tests. The figures spoke for themselves.”
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10
REMAINING CHALLENGE Winning high profile business customers
- Heavily targeted by all competitors- The bigger the network, the more complex the situation- “Never touch a working system”
Great products and a great team are extremely helpful, but not always enough
Expertise in security research has proven to be the decisive factor in helping our sales team to win some high profile deals
Good example is Uroburos
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 11
UROBUROS Highly complex espionage software with Russian roots Can hide itself completely (rootkit) Discovered by the experts of our G DATA SecurityLabs in
early 2014 Name comes from ancient mythology Depicts a serpent or dragon eating its own tail This revelation lead to a lot of attention in the press
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 12
MASSIVE PRESS COVERAGE
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 13
HOW TO GIVE MALWARE A NAME As the experts from G DATA SecurityLabs were the first to report on this malware, they also had
to give it a name
‘Uroburos’ was chosen because of a string found in the malware’s code
Other names used in the press: Snake and Turla
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 14
WHAT ANALYSIS CAN REVEAL Level of complexity suggest very high investment, making it more likely that not an individual or
private organization, but a country (or government agency) is behind it
The link to Russia was assumed because of indications found in the code
Further (and still ongoing) analysis reveals links to other malware – quite similar to newer versions of a software product being released
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 15
GOOD FOR BUSINESS Do the high profile business deals come flying in automatically once you start establishing such
a reputation of expertise?
If only the life of a sales team were that easy (even just 1 day per year)
BUT: that reputation of expertise is what can get you on the shortlist of the relevant decision makers
Uroburos most probably did just that in a specific case of a 4000+ user deal in a vital government agency of a Western European country
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 16
NEED SOME OF THIS MATERIAL?
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 17
GOOD FOR YOUR BUSINESS Is there a case where the help of the G DATA SecurityLabs can be helpful for one your
customers? Is there a case where their expertise is needed?
G DATA also has a team for malware analysis, that can help with incidents happening at your customers (or their customers)
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 18
MALWARE ANALYSIS BUSINESS Analysis of (possible) incidents,
including detailed reporting
Contact via your G DATA contact person or [email protected]
G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 19
… THANK YOU!