webroot multi-vector protection (mvp) · protecting the dns connection 01 gives visibility of web...
TRANSCRIPT
Webroot Multi-Vector Protection (MVP)
Next Gen Smarter Protection
Adam Nash | Sales Manager, EMEAKarl Twyford | Channel Account Manager, Nordics
What Webroot Does
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals in a connected world.
“ “
Aiming for a Multi-Layered Cybersecurity Strategy
March 16, 20183
Deploy Multi-LayeredCybersecurity
Stop Threats Before They Reach Users
Lean on Education
Practice Good Hygiene
Strong Backup Policies
Low confidence in handling an attack
*Source: Webroot 2017 MSP Cybersecurity Trends
Why is Webroot popular with our customers?
» Our solutions are quick, light, effective and easy–Quick to deploy and configure, quick scan times
–Light – lightest in terms of memory, CPU in physical and virtual
environments
–Effective – trusted by technology market leaders to deliver threat
intel to their customers and very strong efficacy results (>99.7%)
–Easy – less time spent managing Webroot than any other solution
March 16, 2018 Public4
Webroot Inc.We provide:» Endpoint Protection, DNS Protection, Mobile, Security
Awareness Training» BrightCloud Threat Intelligence Services
Proven:» NextGen Behavior-Based Endpoint Protection» BrightCloud Threat Intelligence Services used by 55+
Vendors and powered by 5th generation machine learning
» Industry leading Customer Satisfaction & Net Promoter Scores (NPS of 59%)
» #1 - 30% share of MSPmentor 501 Survey MSPs» #1 - NA retail market share» EMEA Operations Centre in Dublin, Ireland – with
Threat Research & Support
30+ MillionLICENSED ENDPOINTS
27+ MillionOEM USERS
11000+ MSP PARTNERS
148k+ BUSINESS CUSTOMERS
Who We Secure
27+ Billion URLs
600+ Million
Domains
4+ Billion
IP Addresses
13+ Billion
File Behavior Records
50+ Million
Mobile Apps
40+ Million
Connected Sensors
Webroot Threat Intelligence by the Numbers
Webroot Threat Intelligence services continuously classify and score 95% of the internet, and monitor the entire IPv4 space and in-use IPv6.
Webroot Threat Intelligence Platform
Why is cyber security so important right now?
Cyberattacks are constantly making the headlines
March 16, 20189
MalwareWhat we learned in 2017
2016 was the year of Ransomware, it grew
again in 2017
2017 saw the return of Information Stealers,
Worms and the rediscovery of massive
exploit kits
Cybercrime industry has grown worldwide,
plenty of room for more growth!
Cybercrime in the Europe larger than all other crime by some
distance now
Exponential Growth of New Unknown Threats
Found Daily !
The Role of Endpoint Protection
“Secure the Endpoint”
» Fully remote cloud-based management with no on-premises infrastructure
» Complete endpoint agent management via 40+ remote commands
» Multi-vector threat shielding with infection rollback auto-remediation
» Unique dwell-timereporting
» Fully installed and operational in 33* seconds
» Individual endpoint monitoring &journaling of unknown files/processes
» 1mb agent, no definition or signature updates, scans in seconds
» On or off network protection with no conflicts
Quick, Light, Easy & Effective
Known File Hash DB
Behaviors DB
Other Threat DBs
How our predictive protection works
March 16, 2018 Public14
Accounts for 0.2% of overall Endpoint event data
Eliminates ~98% of event data from the Admin/Security analysts view
Cloud Predictive Intelligence
GOOD and BAD
Yes! Good. Seen before?
Execute
New File Endpoint
File Hash
Yes! Bad. Seen before?
New File Endpoint
File HashBlock
Known File Hash DB
Behaviors DB
Other Threat DBs
GOOD BAD
~2% of overall Endpoint event data for the Admin/Security analyst to review
How our behavioral protection works
Cloud Predictive Intelligence
UNKNOWN
Has cloud-based threat intelligence
seen this file before?
Known File Hash DB
Behaviors DB
Other Threat DBs
New File Endpoint
File HashBlockBehavioral Analysis
& Categorization
1
Monitored pseudo execution on local machine. Analyze categories of behaviors
Pseudo execution
Has cloud-based threat intelligence
seen this behavior?Yes! Bad. No! Unknown.
How Webroot Handles a Real-World Phishing Attack
Vector 1(Email)
User receives a phishing email to track a
package…
Vector 2(Link)
Track Your Package Link
(www.badsite.com)
User clicks the “track your package” link which…
Vector 3(Browser)
Opens a web browser and…
Vector 4(Malicious Website)
Attack Stage Delivery Stage Infection/Remediation
Real-TimeAnti-Phishing
Web Threat Shield
Real-TimeShield
BehaviorShield
Auto-Remediation
Webroot SecureAnywhere® Business Endpoint Protection outperforms 7 competitors
Webroot Benchmark Performance Results RatingInstallation time 1st
Installation size 1st
Boot Time 1st
CPU Usage during idle 3rd
CPU Usage during scan 4th
Memory usage during system idle 1st
Memory usage during initial scan 1st
Scheduled scan time 1st
File copy, Move, and Delete 1st
Browse Time 1st
File Compression & Decompression 1st
File Write, Open and Close 1st
Network Throughput 1st
Memory Usage Scheduled Scan 1st
Benchmark Performance Results
Objective tests of key metrics01
Higher is better02
True like-for-like benchmark tests03
Measures impact of usage of AV04
Efficacy
March 16, 2018 Public18
» Direct ‘efficacy’ tests of Webroot SecureAnywhere versus leaders (McAfee/Intel, Sophos, Symantec and Trend Micro)
» Beaten in all cases in instant detection rates
» In efficacy rating beat all ‘detection’ vendors
» https://www.mrg-effitas.com/sponsored-tests/
MRG Effitas
» Biggest impact right now and major focus within Webroot
» Ransomware infographic guide
» webroot.com/us/en/business/resources
Crypto-ransomware
The Role of DNS Protection
“Secure the Network”
Network Threat Challenges
Public20
Worldwide Infrastructure Security Report, Vol XI: https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf
67%
experience multi-vector
attacks
95%
experience application-layer attacks
21%
experience 50+ attacks /
month
60%
see APT as the #1 threat
Quick, Light, Easy & Effective – Webroot DNS
21
» No new vendor relationships to manage
» Single agent for endpoint and network protection
» No new consoles to learn or manage
» Reduces infections and associated costs
Less to Manage
Public
» Deploys in minutes
» Uses the GSM console
» Automated installation
» Filters all external DNS requests
» Roaming agent available
Easy to Deploy
» Analyzes and categorizes 95% of the internet 3x a day
» Uses contextual analysis to provide deeper insight into connections between files, apps, URLs, IPs, and more
» Trusted by 55+ leading network/security vendors such as F5, Cisco, Citrix, etc.
BrightCloud®
Threat Intelligence
Webroot SecureAnywhere® DNS Protection
Reduces the number of malware threats
that infect the network by up to
90%
Stops DNS attacks by protecting the DNS connection
01
Gives visibility of web access / usage
04
Filters high-risk sites with zero latency
02
Enforces acceptable web access
03
Lowers risk, infections, and remediation costs
06
Helps maintain staff productivity
05
Public22
Key Features
No hardware, software, or agent to install
Blocks malware threats and web usage risks at the domain layer
Enables policy by IP & IP range, global roaming agent policy
On-demand drill-down reporting
Powered by Webroot BrightCloud®
Web Classification Service
Public23
The Role of Security Awareness
“Secure the Human”
The statistics……
March 16, 201825
Users are under a constant threat of attack
01
91% of cyberattacks start with a phish
04
93% of phishing emails involve ransomware
02
Advanced social engineering is the norm
03
95% of successful attacksdown to human error
06
90% of breaches due to human error
05
Sources: IBM Cyber Security Intelligence + PhishMe June 2016 + Dark Reading 7 ways hackers target your employees – 4/6/2017+ Verizon Data Breach Report 2017
Phishing is Prolific & Successful
new zero-day phishing sites created per month1
average new phishing sites created per day1
yearly cost of phishing scams for an American business2
1 Webroot. Quarterly Threat Trends, Sept 2017. (Sept 2017)2 FBI. FBI Warns of Dramatic Increase in Business E-Mail Scams. (April 2016)March 16, 201826
User Error is now a Big Issue
Necessary: People are the weakest link in the security chain
01
Proven: Educating employees can reduce security risk
02
Best Practice:Security Awareness Training is a best practice or requirement for many industries
03
\\
of all successful cyber attacks is caused by human error
Source: IBM Cyber Security Intelligence Index
95%
Compliance Regulations
Financial services01
Healthcare (HIPAA)02
Privacy (GDPR)04
Retail (PCI)03
Energy (PUC)05
Security Awareness Overview
• Raise awareness• Test and measure
end-users• Integrated with
training courses
Phishing Simulator
• Relevant multi-course library including several compliance courses
• Easy administration• One click user launch
Training Courses
• Integrated reporting center
• Meets compliance requirements
Reporting/Compliance
One centralized solution for ongoing awareness training
Why Webroot Security Awareness Training?
30 March 16, 2018 Public
» Easy-to-use interface with 5-step setup
» 1-click course launch end-user experience
» Responsive and mobile, tablet, and desktop friendly C
ompr
ehen
sive
» All the tools you need in one solution
» Compliance features and courses included in base package
» Expanding content library updated regularly
Inte
grat
ed
» Single vendor model, no need for others
» Easy deployment / management through Webroot Global Site Manager and Unity API
» Familiar Provisioning and Support team
Usa
bilit
y
“How Can We Test It?”
Want to take a closer look ? - 30 days free trial of all products available
… simply contact your J2 Global account manager
Want to take a closer look ? - 30 days free trial of all products available
… simply contact your J2 Global account manager
Thank you.
[email protected]@Webroot.com