SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
With each new headline about another major security breach, it is vital to know, in real-time, what applications are
installing and running in your server and endpoint environment. Rogue applications, embedded with malware, are
used by hackers as a critical invasion path to get to the heart of your IT operation. Understanding which applications
are running on servers and desktops offers key insights for IT security. Observing unauthorized changes can be a clear
indicator of advanced targeted attacks, and with real-time change management alerts in place, often these attacks
can be diffused.
Application Monitoring and Visibility
Viewfinity utilizes Forensic Analysis and continuous Application Monitoring to aid in the investigation of security
breaches and identifies information related to malicious files. Our forensic analysis keeps track of the source and
the entire footprint of a suspect attack, while
our application monitoring offers visibility
into your server and desktop environments
by continuously monitoring and observing on
several levels.
Viewfinity Application Control
Benefits Features
Secures your infrastructure against malware, advanced
persisent threats, and zero-day attacks.
Greylisting - handles unknown applications beyond the
limits of default/deny by restricting access to resources.
Accelerates incident response and reduces dwell time in the
event a breach occurs.
Forensic Analysis - aids in the investigation of security
breaches & identifies information related to malicious files.
Integrates with threat detection technologies to bridge the
gap between network and endpoint security.
Real-Time Change Management Alerts - detects and
diffuses attacks by sharing suspicious activity and behavior
with network security devices for analysis and remediation.
Reduces data breach insurance premiums. Application Monitoring - continuously works to identify
potentially malicous executables and identifies root source
information.
FORENSICSPREVENTIONVISIBILITYRESPONSE
400 Totten Pond Road • Waltham, MA 02451 • 781.810.4320 • www.viewfinity.com
VIEWFINITY APPLICATION CONTROL
WHO?
WHERE?
WHEN?
HOW?
Integration with Palo Alto, FireEye, and Check Point
Viewfinity integrates with top network security vendors (Palo Alto Networks, FireEye, Check Point) to broaden
and reinforce threat prevention, detection, and analysis for both endpoints and servers, as well as for networks.
Viewfinity’s real-time change management alerts detect and diffuse many attacks by sharing suspicious application
activity and network behavior with network security devices for thorough analysis and further remediation.
Greylisting - A novel approach
Viewfinity captures the installation and/or execution of applications which are not yet classified as approved trusted
sources during its continuous process of application execution and monitoring. These are the applications that
are not known trusted applications or blocked applications - these “grey” unknown/unclassified applications are
monitored and allowed to run on the computer in a restricted mode (no admin privileges - access to file/folder,
network shares, registry, internet, etc.)
The observation mode shows what applications are actively being used and will report if these applications require
administrative rights - - another security loophole that Viewfinity can eliminate. Applications can be incorporated
into previously established trusted software source locations such as SCCM, Altiris, CA, LANDesk, trusted OS image,
network shares, and software vendor (Microsoft, Dell, HP, etc.).
400 Totten Pond Road • Waltham, MA 02451 • 781.810.4320 • www.viewfinity.com
Viewfinity Manager
Server/SaaS/GPO
End User Computer
W/ Viewfinity Agent
Threat Detection
Platform
Application
1
5
Step 1: A new application
installation/execution is attempted
on the endpoint
Step 3: The greylisted file is
uploaded to the threat detection
platform for further verification/
analysis
Step 4: The threat detection
platform identifies the file as
malicious and a threat report is sent
to Viewfinity
Step 5: Viewfinity creates a policty
to block the application from
installing and/or running on any
endpoint or server
Step 2: Viewfinity Agent
communicates with Viewfinity
Manager, flags the application as
suspicious due to an unclassified
status and the application is
greylisted
1
2
3
4
5
3
4
2
010111001100010
10110011HACKER0
100111000011100
111000111000100
111011100110110
111001001110110
110111010110010
HACKER
Run with standard
privileges only
Limited access to
corporate data
No access to network
shares, servers, or
removable devices
No access to
the internet
FORENSICSPREVENTIONVISIBILITYRESPONSE
Until categorized, applications can execute in restrictive Mode:
Viewfinity Greylist Restrictive Mode
Utilize all or custom configure your needs based on these restrictive elements:

Más contenido relacionado

La actualidad más candente

Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approachIdexcel Technologies
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...Alisha Henderson
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)Open Analytics
 
Brian Starr Cover Letter
Brian Starr Cover LetterBrian Starr Cover Letter
Brian Starr Cover LetterBrian Starr
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security DemoCheah Eng Soon
 
Report on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industryReport on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industryChandrak Trivedi
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMAlienVault
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security servicesPhreedom Technologies
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019Eoin Keary
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecCyberops Infosec LLP
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack Medigate
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVault
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 

La actualidad más candente (20)

Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)
 
Brian Starr Cover Letter
Brian Starr Cover LetterBrian Starr Cover Letter
Brian Starr Cover Letter
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Microsoft Cloud App Security Demo
Microsoft Cloud App Security DemoMicrosoft Cloud App Security Demo
Microsoft Cloud App Security Demo
 
Report on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industryReport on Software Vulnerabilities in the financial industry
Report on Software Vulnerabilities in the financial industry
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
 
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019Edgescan   vulnerability stats report 2019 - h-isac-2-2-2019
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
Cloud computingsec p3
Cloud computingsec p3Cloud computingsec p3
Cloud computingsec p3
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
Cloud Security Demo
Cloud Security DemoCloud Security Demo
Cloud Security Demo
 

Similar a Viewfinity Application Control and Monitoring 2015

Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networksCisco Canada
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfAmeliaJonas2
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideInstaSafe Technologies
 

Similar a Viewfinity Application Control and Monitoring 2015 (20)

Application security
Application securityApplication security
Application security
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
185
185185
185
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative Guide
 

Viewfinity Application Control and Monitoring 2015

  • 1. With each new headline about another major security breach, it is vital to know, in real-time, what applications are installing and running in your server and endpoint environment. Rogue applications, embedded with malware, are used by hackers as a critical invasion path to get to the heart of your IT operation. Understanding which applications are running on servers and desktops offers key insights for IT security. Observing unauthorized changes can be a clear indicator of advanced targeted attacks, and with real-time change management alerts in place, often these attacks can be diffused. Application Monitoring and Visibility Viewfinity utilizes Forensic Analysis and continuous Application Monitoring to aid in the investigation of security breaches and identifies information related to malicious files. Our forensic analysis keeps track of the source and the entire footprint of a suspect attack, while our application monitoring offers visibility into your server and desktop environments by continuously monitoring and observing on several levels. Viewfinity Application Control Benefits Features Secures your infrastructure against malware, advanced persisent threats, and zero-day attacks. Greylisting - handles unknown applications beyond the limits of default/deny by restricting access to resources. Accelerates incident response and reduces dwell time in the event a breach occurs. Forensic Analysis - aids in the investigation of security breaches & identifies information related to malicious files. Integrates with threat detection technologies to bridge the gap between network and endpoint security. Real-Time Change Management Alerts - detects and diffuses attacks by sharing suspicious activity and behavior with network security devices for analysis and remediation. Reduces data breach insurance premiums. Application Monitoring - continuously works to identify potentially malicous executables and identifies root source information. FORENSICSPREVENTIONVISIBILITYRESPONSE 400 Totten Pond Road • Waltham, MA 02451 • 781.810.4320 • www.viewfinity.com VIEWFINITY APPLICATION CONTROL WHO? WHERE? WHEN? HOW?
  • 2. Integration with Palo Alto, FireEye, and Check Point Viewfinity integrates with top network security vendors (Palo Alto Networks, FireEye, Check Point) to broaden and reinforce threat prevention, detection, and analysis for both endpoints and servers, as well as for networks. Viewfinity’s real-time change management alerts detect and diffuse many attacks by sharing suspicious application activity and network behavior with network security devices for thorough analysis and further remediation. Greylisting - A novel approach Viewfinity captures the installation and/or execution of applications which are not yet classified as approved trusted sources during its continuous process of application execution and monitoring. These are the applications that are not known trusted applications or blocked applications - these “grey” unknown/unclassified applications are monitored and allowed to run on the computer in a restricted mode (no admin privileges - access to file/folder, network shares, registry, internet, etc.) The observation mode shows what applications are actively being used and will report if these applications require administrative rights - - another security loophole that Viewfinity can eliminate. Applications can be incorporated into previously established trusted software source locations such as SCCM, Altiris, CA, LANDesk, trusted OS image, network shares, and software vendor (Microsoft, Dell, HP, etc.). 400 Totten Pond Road • Waltham, MA 02451 • 781.810.4320 • www.viewfinity.com Viewfinity Manager Server/SaaS/GPO End User Computer W/ Viewfinity Agent Threat Detection Platform Application 1 5 Step 1: A new application installation/execution is attempted on the endpoint Step 3: The greylisted file is uploaded to the threat detection platform for further verification/ analysis Step 4: The threat detection platform identifies the file as malicious and a threat report is sent to Viewfinity Step 5: Viewfinity creates a policty to block the application from installing and/or running on any endpoint or server Step 2: Viewfinity Agent communicates with Viewfinity Manager, flags the application as suspicious due to an unclassified status and the application is greylisted 1 2 3 4 5 3 4 2 010111001100010 10110011HACKER0 100111000011100 111000111000100 111011100110110 111001001110110 110111010110010 HACKER Run with standard privileges only Limited access to corporate data No access to network shares, servers, or removable devices No access to the internet FORENSICSPREVENTIONVISIBILITYRESPONSE Until categorized, applications can execute in restrictive Mode: Viewfinity Greylist Restrictive Mode Utilize all or custom configure your needs based on these restrictive elements: