Post on 27-May-2020
transcript
© Votiro Inc. 2016. All rights reserved.
SECURE GATEWAYSEMPOWERED BY
ADVANCED CONTENT
DISARM AND
RECONSTRUCTION
COMPANY OVERVIEW
Private company
established in 2010
US patent
technology since 2012
US OfficeSunnyvale, CA
Israel OfficeTel Aviv
APAC OfficeSingapore
Partners and
Distributors
Worldwide
28Active Customers in
Countries
16
SATISFIED CUSTOMERS
Paying and
renewing
customers
In 16 countries
GovernmentHealthCareCritical
InfrastructureFinancial Services
• Security agencies
• Ministries
• Defense
• Healthcare
companies
• Hospitals
• Pharmaceuticals
• National energy,
water and gas
utilities
• Nuclear research
• Telecom groups
• Banks
• Insurance companies
• Stock markets
10B$ State Organization with
13B$ World’s Second Largest Health Service Provider with
4B$ Large UtilityCompany with
6B$ Bank 3 out of the 7 biggest
banks in Israel
150,000+Employees
40,000+employees
30,000+Employees
10,000+Employees
CERTIFICATIONS AND AWARDSVotiro: The “Holy Grail” of Cyber Security
(Inc.com, 1 January 2016)
“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”
Leading Industry Recognition of Votiro’s Technology:
Industry awards recognizing world leading Intellectual Property:
Prize for innovativetechnology
Recognition as "hot" security start-up
Prize for tomorrow’stechnology
today
Director of Security
of the Defense Establishment
State Authority for Information
Security
World leading Government Certifications:
Global Reach and Media Exposure
“As malware sandbox evasion techniques improve, the use of content disarm and reconstruction (CDR) at the email gateway as a supplement or alternative to sandboxing will increase.”(Gartner, Fighting Phishing: Optimize Your Defense, Neil Wynne, Andrew Walls, Peter Firstbrook, 17 March 2016)
“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”(Inc.com, 1 January 2016)
Gartner, Inc. Founded in 1979, has over 7,800 employees, including 1,280 in research, located in 85 countries providing information technology related insight. Research provided by Gartner is targeted at CIOs and senior IT leaders, marketing leaders and supply chain leaders. Gartner clients include large corporations, government agencies, technology companies and the investment community.
Inc. magazine, Founded in 1979 and based in New York City, is an American monthly publication focused on growing companies.
What people say about Votiro’s technology?
OUR MISSION
MAINTAINING CYBER SECURITY LEADERSHIPBy protecting organizations from targeted attacks by disarming
undisclosed, zero-day and known exploits
THE PROBLEM
319%The increase in spear-phishing campaigns from 2012 to 2015(Internet Security Threat Report 2014-2016, Symantec)
$148MThe cost of A SINGLE data breach incident (at Target), excluding Brand Damage (Forbes, August 2014)
55%Anti-Virus software misses 55% of malwares and is “dead”(Brian Dye, senior vice-president for information security at Symantec, 2014)
“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)
VICTIMS OF SPEAR PHISHING ATTACKS
95% of enterprise-network attacks are a result of a spear-phishing campaign
(Network World, citing Alan Paller, Director of Research at SANS, 2013)
Using new IP and new E-mail account,
the spam filter is bypassed.
The recipient is lured into double-clicking
the attachment.
Undisclosed exploit evades detection by
anti-malware.
Using sandbox evasion techniques,
the malware hops in.
Targeted emaildirected at a specific individual in an organization
Contextual content“contain accurate information about victims from social networks” (FBI, July 2013)
Polymorphic malware installation, evading sandboxing
Undisclosed or zero-day exploit in an “innocent” looking file
UserSandboxAnti-MalwareAnti-Spam
HACKERS EVASION TECHNIQUES
Threat
Duration
Usage
Signature-Based Detection
Protection by VOTIRO technology
YesYesYes
No
Years
High
Cyber warfare and cyber crime
According to provided samples
According to provided samples
Cyber warfare and cyber crime
Opportunistic attacks by script kiddies
Months
Medium Low
N/A
Undisclosed Exploit Zero-Day Exploit Known / Patched Exploit
Threat-Detection Sandbox
Few Few Few
Exploit
Malware
VULNERABILITY LIFECYCLE
VOTIRO PROVEN TECHNOLOGYVotiro’s solution has been shown capable of preventing the
following attacks
AND
MANY
MORE!
CVE-2009-0927 CVE-2009-3129 CVE-2010-0188 CVE-2010-1297
CVE-2010-3333
CVE-2013-1331
CVE-2014-0496
CVE-2014-6352
CVE-2013-0640
CVE-2013-3906
CVE-2014-1761
CVE-2015-3050/1
CVE-2013-0641
CVE-2014-0322
CVE-2014-4114
CVE-2015-5119
CVE-2012-0158
CVE-2013-3346
CVE-2014-0514
CVE-2015-2523
6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!
THE NEED
Secure Gateways capable of stopping undisclosed and zero-
day threats.
“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”
(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)
Commercial in Confidence: Votiro CyberSec Ltd
VOTIRO’S SEG – MAIN PROTECTION LAYERS:
6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!
Before After
Before After
• Inspect metadata• Dissection into objects• Reconstruct file
An embedded unknown exploitSeamless for the applicationA cleansed version of the original file
THE SOLUTIONVotiro’s patented Advanced Content Disarm and Reconstruction
Try our demo: www.Votiro.com/demo
SUPPORTED FILE TYPES
Data taken from "Targeted Attack Trends Report" Trend Micro, 2014.
Detection and Neutralization:
• Office files (Excel®, Word, PowerPoint®)
• Archive files
• Word Viewer files (RTF)
• PDF files
• Image files
Classification and Blocking:
• Executables
100% PROTECTION FROM
TARGETED ATTACKS
File Transfer GatewayRemovable Media GatewaySecure Email Gateway
• Integration with FTP servers and SMB shares
• Multiple anti virus protection
• Zero-Day exploit protection
• Gateway for removable media and USB drives
• Multiple anti virus protection• Zero-Day exploit protection
• Gateway for all email servers• Multiple anti virus protection• Zero-Day exploit protection• Anti-Spam
OUR GATEWAYS
Deployment options: On-premises (physical / VM), SaaS
SECURE EMAIL GATEWAY - SaaS DEPLOYMENT
Sender's server
(mx) mail.corp.comcloud.votiro.com
Recipient's mail servermail.corp.com
• Quarantine • Users and Policies• Domain Settings• Reports
One-click setup
Requires no endpoint installation
Real time operation
(<1 second latency)
Supports Microsoft Office
365™, Google Apps™, and on-
premises email servers
Seamless for the employee
ON-PREMISES DEPLOYMENT
Confidential
DMZ
Network
Internal
Network
Users
Mail Relay
File Server
Removable Media
VOTIRO SECURE EMAIL GATEWAY
VOTIRO FILE TRANSFER GATEWAY
VOTIRO REMOVABLE MEDIA
GATEWAY
Mail Server
File Server
Home Dir.
Management / Updater
Confidential
ZERO DAY EXPLOIT PROTECTION API
THANK YOUFor more information, please contact:
Adrian@witz.com.au
Ph: +612 8041 9725
100% PROTECTION
FROM DOCUMENTS
EXPLOITS
Commercial in Confidence: Votiro CyberSec Ltd