+ All Categories
Home > Documents > What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Date post: 29-Jan-2016
Category:
Upload: caren-golden
View: 230 times
Download: 0 times
Share this document with a friend
Popular Tags:
28
What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here
Transcript
Page 1: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

What’s new in SEP 12.1.5

Presenter’s Name HerePresenter’s Title Here

Page 2: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Major Attacks in 2014…

• Dragonfly

• CryptoLocker

• Gameover ZeuS

• Retail data breach

Page 3: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Increase in Targeted Attacks

Increase in targeted attack campaigns

+91% 2012

2013ISTR 2014

Page 4: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Targeted Attack Campaigns

2011 2012 2013

Email per Campaign

Recipient/Campaign

78

122

29

61

111

23

Campaigns

Duration of Campaign

165

408

779

4 days 3 days 8.3 days

ISTR 2014

Page 5: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Zero-Day Vulnerabilities

2006 2007 2008 2009 2010 2011 2012 20130

5

10

15

20

25

30

1315

912

14

8

14

23

Zero-Day Vulnerabilities, Annual Total,2006 - 2013Source: Symantec

23 zero-day vulnerabilities discovered in 2013

Increase from 14 in 2012

More zero-day vulnerabilities discovered in 2013 than in any year since we started tracking

More zero-days in 2013 than in past two years combined

Page 6: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Targeted Industries

Public Administration (Gov.)

Services – Professional

Services – Non-Traditional

Manufacturing

Finance, Insurance & Real Estate

Transportation, Gas, Communications, Electric

Wholesale

Retail

Mining

Construction

16%15

141313

65

211

Top 10 Industries Targetedin Spear-Phishing Attacks, 2013Source: Symantec

ISTR 2014

Page 7: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Size of Targeted Organization

Targeted attacks are moving downstream

Page 8: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Move beyond Antivirus with Intelligent Security

Page 9: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Symantec IS Security Intelligence

Monitors Threats in 157+ countries

550 Threat Researchers

14 Data Centers World Wide

7 Billion

1 Billion+

2.5 Trillion

File, URL & IP Classifications

Devices Protected

Rows of Security Telemetry

Capturing previously unseen threats and attack methods

Putting “big data” analytics to work for every end user

More visibility across devices creates better context and deeper insight

2B+ events logged daily Over 100,000 security alerts generated annually

200,000 daily code submissions

Page 10: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Intelligent Endpoint ProtectionLayered protection to stop mass, targeted and advanced threats

Network Threat

ProtectionBlocks malware

before it spreads to your machine

and controls traffic

Advanced Scanning

Blocks suspicious files – even those

with no fingerprint – before they

can run and steal your data

InsightReputationSafety ratings for

every single software file on the planet, and

uses this to block targeted attacks

SONARBehavior Blocking

Blocks software with suspicious

behaviors to stop advanced threats

SymantecPower Eraser

Aggressive SMR technology roots out entrenched

infections and kills them in seconds

Intelligent security technologies

Page 11: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Big Data Analytics

Analytics

Warehouse

AnalystsAttack

Quarantine System

Endpoints

Gateways

3rd Party Affiliates

Global SensorNetwork

Global Intelligence Network

Global Data Collection

Honeypots

INSIGHT: Reputation Monitoring for SEP Contextual intelligence for dynamic analysis

Bad Safety RatingFile is blocked

Good Safety RatingFile is whitelisted

No Safety Rating YetCan be blocked

Page 12: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Monitors 1390 file behaviors to answer:

SONAR: Behavior Monitoring in SEP

Human-authoredBehavioral Signatures

Artificial Intelligence Based Classification Engine

Behavioral PolicyLockdown

Who is it related to?

What did it contain?

Where did it come from?

What has it done?

Provides Zero-Day Protection Against Unknown Threats

Page 13: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

So… what’s new?

Page 14: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

What’s New in 12.1.5Performance Enhancements Management Enhancements

• Better client performance

• Reduced network load with

bandwidth throttling

• Reduced network storage space

• Integrated repair tool for better

control

• Linux client management support

• Integrated Host Integrity tool

• Remote MAC deployment

• Enhanced competitive uninstaller

Page 15: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Performance Enhancements

Page 16: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Client performance

• Improve boot time by more than 10%

Page 17: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Bandwidth throttling

• Better control of bandwidth to SEPM

• Can control connections based on:

– File location

– Bandwidth

– Subnet

– File size

– File type

Page 18: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Content deltas

• Reduces disk space on SEPM by 85-95%• Store older content revisions as delta files

• Allows customers to cache more revisions

– Reduces the # of full definitions delivered over the network

Page 19: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Management Enhancements

Page 20: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Power Eraser Integration

• New option to run Power Eraser command from SEPM

• Reduce time to clean infected systems

• Mitigate False Positives

Power eraser

Repair

Page 21: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Linux client management

• Fully managed by SEPM

• Antivirus policy management

• Reporting, monitoring and logging

• Single client package

Page 22: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Host Integrity checking and policy enforcement

• Previously SNAC-only features now added to SEP– Host Integrity policies: pre-built and custom– Peer-to-Peer enforcement– Quarantine location

Page 23: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Remote deployment for Mac

• Remotely install Mac clients from the Symantec Endpoint Protection Manager (SEPM)

Page 25: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

• 70 % Less scan overhead

• Smarter updates• Optimized for higher

VM densities

• Intelligent Security• Insight & SONAR• Advanced extended

protection

• Scalable, flexible control• Remote management• Granular policies and

reporting

Unrivaled Security Smarter Management

Blazing Performance

Compared to traditional scanning methods.

Symantec Endpoint Protection 12.1.5

Page 26: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

3rd Party tests confirm Unrivaled Security & Blazing Performance

• Dennis Technology Labs (2014)• The only product to receive AAA ratings for

protection for the past FIVE quarters

• PASSMARK Report (2014)• Received the highest overall score and

dominated other products in terms of product performance

• AV-Test Org (2013)• Detects and removes more threats than any

other solution in its class

Page 28: What’s new in SEP 12.1.5 Presenter’s Name Here Presenter’s Title Here.

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Presenter’s NamePresenter’s emailPresenter’s phone


Recommended