webroot multi-vector protection (mvp) · protecting the dns connection 01 gives visibility of web...

32
Webroot Multi-Vector Protection (MVP) Next Gen Smarter Protection Adam Nash | Sales Manager, EMEA Karl Twyford | Channel Account Manager, Nordics

Upload: others

Post on 24-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Webroot Multi-Vector Protection (MVP)

Next Gen Smarter Protection

Adam Nash | Sales Manager, EMEAKarl Twyford | Channel Account Manager, Nordics

Page 2: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

What Webroot Does

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals in a connected world.

“ “

Page 3: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Aiming for a Multi-Layered Cybersecurity Strategy

March 16, 20183

Deploy Multi-LayeredCybersecurity

Stop Threats Before They Reach Users

Lean on Education

Practice Good Hygiene

Strong Backup Policies

Low confidence in handling an attack

*Source: Webroot 2017 MSP Cybersecurity Trends

Page 4: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Why is Webroot popular with our customers?

» Our solutions are quick, light, effective and easy–Quick to deploy and configure, quick scan times

–Light – lightest in terms of memory, CPU in physical and virtual

environments

–Effective – trusted by technology market leaders to deliver threat

intel to their customers and very strong efficacy results (>99.7%)

–Easy – less time spent managing Webroot than any other solution

March 16, 2018 Public4

Page 5: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Webroot Inc.We provide:» Endpoint Protection, DNS Protection, Mobile, Security

Awareness Training» BrightCloud Threat Intelligence Services

Proven:» NextGen Behavior-Based Endpoint Protection» BrightCloud Threat Intelligence Services used by 55+

Vendors and powered by 5th generation machine learning

» Industry leading Customer Satisfaction & Net Promoter Scores (NPS of 59%)

» #1 - 30% share of MSPmentor 501 Survey MSPs» #1 - NA retail market share» EMEA Operations Centre in Dublin, Ireland – with

Threat Research & Support

30+ MillionLICENSED ENDPOINTS

27+ MillionOEM USERS

11000+ MSP PARTNERS

148k+ BUSINESS CUSTOMERS

Who We Secure

Page 6: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

27+ Billion URLs

600+ Million

Domains

4+ Billion

IP Addresses

13+ Billion

File Behavior Records

50+ Million

Mobile Apps

40+ Million

Connected Sensors

Webroot Threat Intelligence by the Numbers

Webroot Threat Intelligence services continuously classify and score 95% of the internet, and monitor the entire IPv4 space and in-use IPv6.

Page 7: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Webroot Threat Intelligence Platform

Page 8: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Why is cyber security so important right now?

Page 9: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Cyberattacks are constantly making the headlines

March 16, 20189

Page 10: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

MalwareWhat we learned in 2017

2016 was the year of Ransomware, it grew

again in 2017

2017 saw the return of Information Stealers,

Worms and the rediscovery of massive

exploit kits

Cybercrime industry has grown worldwide,

plenty of room for more growth!

Cybercrime in the Europe larger than all other crime by some

distance now

Page 11: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Exponential Growth of New Unknown Threats

Found Daily !

Page 12: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

The Role of Endpoint Protection

“Secure the Endpoint”

Page 13: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

» Fully remote cloud-based management with no on-premises infrastructure

» Complete endpoint agent management via 40+ remote commands

» Multi-vector threat shielding with infection rollback auto-remediation

» Unique dwell-timereporting

» Fully installed and operational in 33* seconds

» Individual endpoint monitoring &journaling of unknown files/processes

» 1mb agent, no definition or signature updates, scans in seconds

» On or off network protection with no conflicts

Quick, Light, Easy & Effective

Page 14: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Known File Hash DB

Behaviors DB

Other Threat DBs

How our predictive protection works

March 16, 2018 Public14

Accounts for 0.2% of overall Endpoint event data

Eliminates ~98% of event data from the Admin/Security analysts view

Cloud Predictive Intelligence

GOOD and BAD

Yes! Good. Seen before?

Execute

New File Endpoint

File Hash

Yes! Bad. Seen before?

New File Endpoint

File HashBlock

Known File Hash DB

Behaviors DB

Other Threat DBs

GOOD BAD

Page 15: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

~2% of overall Endpoint event data for the Admin/Security analyst to review

How our behavioral protection works

Cloud Predictive Intelligence

UNKNOWN

Has cloud-based threat intelligence

seen this file before?

Known File Hash DB

Behaviors DB

Other Threat DBs

New File Endpoint

File HashBlockBehavioral Analysis

& Categorization

1

Monitored pseudo execution on local machine. Analyze categories of behaviors

Pseudo execution

Has cloud-based threat intelligence

seen this behavior?Yes! Bad. No! Unknown.

Page 16: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

How Webroot Handles a Real-World Phishing Attack

Vector 1(Email)

User receives a phishing email to track a

package…

Vector 2(Link)

Track Your Package Link

(www.badsite.com)

User clicks the “track your package” link which…

Vector 3(Browser)

Opens a web browser and…

Vector 4(Malicious Website)

Attack Stage Delivery Stage Infection/Remediation

Real-TimeAnti-Phishing

Web Threat Shield

Real-TimeShield

BehaviorShield

Auto-Remediation

Page 17: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Webroot SecureAnywhere® Business Endpoint Protection outperforms 7 competitors

Webroot Benchmark Performance Results RatingInstallation time 1st

Installation size 1st

Boot Time 1st

CPU Usage during idle 3rd

CPU Usage during scan 4th

Memory usage during system idle 1st

Memory usage during initial scan 1st

Scheduled scan time 1st

File copy, Move, and Delete 1st

Browse Time 1st

File Compression & Decompression 1st

File Write, Open and Close 1st

Network Throughput 1st

Memory Usage Scheduled Scan 1st

Benchmark Performance Results

Objective tests of key metrics01

Higher is better02

True like-for-like benchmark tests03

Measures impact of usage of AV04

Page 18: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Efficacy

March 16, 2018 Public18

» Direct ‘efficacy’ tests of Webroot SecureAnywhere versus leaders (McAfee/Intel, Sophos, Symantec and Trend Micro)

» Beaten in all cases in instant detection rates

» In efficacy rating beat all ‘detection’ vendors

» https://www.mrg-effitas.com/sponsored-tests/

MRG Effitas

» Biggest impact right now and major focus within Webroot

» Ransomware infographic guide

» webroot.com/us/en/business/resources

Crypto-ransomware

Page 19: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

The Role of DNS Protection

“Secure the Network”

Page 20: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Network Threat Challenges

Public20

Worldwide Infrastructure Security Report, Vol XI: https://www.arbornetworks.com/images/documents/WISR2016_EN_Web.pdf

67%

experience multi-vector

attacks

95%

experience application-layer attacks

21%

experience 50+ attacks /

month

60%

see APT as the #1 threat

Page 21: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Quick, Light, Easy & Effective – Webroot DNS

21

» No new vendor relationships to manage

» Single agent for endpoint and network protection

» No new consoles to learn or manage

» Reduces infections and associated costs

Less to Manage

Public

» Deploys in minutes

» Uses the GSM console

» Automated installation

» Filters all external DNS requests

» Roaming agent available

Easy to Deploy

» Analyzes and categorizes 95% of the internet 3x a day

» Uses contextual analysis to provide deeper insight into connections between files, apps, URLs, IPs, and more

» Trusted by 55+ leading network/security vendors such as F5, Cisco, Citrix, etc.

BrightCloud®

Threat Intelligence

Page 22: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Webroot SecureAnywhere® DNS Protection

Reduces the number of malware threats

that infect the network by up to

90%

Stops DNS attacks by protecting the DNS connection

01

Gives visibility of web access / usage

04

Filters high-risk sites with zero latency

02

Enforces acceptable web access

03

Lowers risk, infections, and remediation costs

06

Helps maintain staff productivity

05

Public22

Page 23: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Key Features

No hardware, software, or agent to install

Blocks malware threats and web usage risks at the domain layer

Enables policy by IP & IP range, global roaming agent policy

On-demand drill-down reporting

Powered by Webroot BrightCloud®

Web Classification Service

Public23

Page 24: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

The Role of Security Awareness

“Secure the Human”

Page 25: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

The statistics……

March 16, 201825

Users are under a constant threat of attack

01

91% of cyberattacks start with a phish

04

93% of phishing emails involve ransomware

02

Advanced social engineering is the norm

03

95% of successful attacksdown to human error

06

90% of breaches due to human error

05

Sources: IBM Cyber Security Intelligence + PhishMe June 2016 + Dark Reading 7 ways hackers target your employees – 4/6/2017+ Verizon Data Breach Report 2017

Page 26: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Phishing is Prolific & Successful

new zero-day phishing sites created per month1

average new phishing sites created per day1

yearly cost of phishing scams for an American business2

1 Webroot. Quarterly Threat Trends, Sept 2017. (Sept 2017)2 FBI. FBI Warns of Dramatic Increase in Business E-Mail Scams. (April 2016)March 16, 201826

Page 27: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

User Error is now a Big Issue

Necessary: People are the weakest link in the security chain

01

Proven: Educating employees can reduce security risk

02

Best Practice:Security Awareness Training is a best practice or requirement for many industries

03

\\

of all successful cyber attacks is caused by human error

Source: IBM Cyber Security Intelligence Index

95%

Page 28: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Compliance Regulations

Financial services01

Healthcare (HIPAA)02

Privacy (GDPR)04

Retail (PCI)03

Energy (PUC)05

Page 29: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Security Awareness Overview

• Raise awareness• Test and measure

end-users• Integrated with

training courses

Phishing Simulator

• Relevant multi-course library including several compliance courses

• Easy administration• One click user launch

Training Courses

• Integrated reporting center

• Meets compliance requirements

Reporting/Compliance

One centralized solution for ongoing awareness training

Page 30: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Why Webroot Security Awareness Training?

30 March 16, 2018 Public

» Easy-to-use interface with 5-step setup

» 1-click course launch end-user experience

» Responsive and mobile, tablet, and desktop friendly C

ompr

ehen

sive

» All the tools you need in one solution

» Compliance features and courses included in base package

» Expanding content library updated regularly

Inte

grat

ed

» Single vendor model, no need for others

» Easy deployment / management through Webroot Global Site Manager and Unity API

» Familiar Provisioning and Support team

Usa

bilit

y

Page 31: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

“How Can We Test It?”

Want to take a closer look ? - 30 days free trial of all products available

… simply contact your J2 Global account manager

Want to take a closer look ? - 30 days free trial of all products available

… simply contact your J2 Global account manager

Page 32: Webroot Multi-Vector Protection (MVP) · protecting the DNS connection 01 Gives visibility of web access / usage 04 Filters high-risk sites with zero latency 02 Enforces acceptable

Thank you.

[email protected]@Webroot.com