SlideShare una empresa de Scribd logo
1 de 24
Kaseya and Kaspersky Lab
Cybercrime Threats in 2012: What You
Need to Know


Cynthia James,
Director Business Development, CISSP

September 2012
Agenda


           Kaspersky Lab
           Today’s Threatscape & Top Threats
           10 Internet Safety Tips
           Sources




PAGE 2 |        Kaspersky Lab Presentation   | September 26, 2012
About Kaspersky Lab
     Founded in 1997; largest private anti-malware company – 100%
     focused on anti-malware
     Over $600M annual revenues
     Presence in 19 countries: CEO is Russian; incorporated in the UK;
     new to US market in 2005
     #1 vendor in Germany, France, Spain, Eastern Europe
     America’s distribution: 12,000 outlets; top two vendors (revenue
     & units shipping)
     Top supplier to OEMs/ISVs of anti-malware worldwide
        Aggressively protecting businesses




PAGE 3 |        Kaspersky Lab Presentation   | September 26, 2012
Cybercrime threatscape: malware growth
     Recent years have seen exponential growth in malware.
     200k unique malware samples were identified in 2006; 2M in
     2007, over 15 million by 2009…50 million this past year.




     Now it is the quality of malware that improves annually.


PAGE 4 |       Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats of 2012: backdrop
           Cybercriminals earn over $100 billion annually!

           Cybercrime markets are now very organized and
           sophisticated  everything has a price, most data
           has some value
              Affiliate programs pay hackers to distribute malware

           “Rented” botnets & malware kits for sale

      Code re-use: there’s no such thing
    as “old news” in cybercrime
              Trickle down effect (of tactics)


PAGE 5 |          Kaspersky Lab Presentation   | September 26, 2012
The power of botnets
Kido (aka Conficker) botnet in May 2009 (peak)


    GFLOPS




   When the Kido botnet reached its peak in May 2009 it contained about
   6 mln. zombie machines
   Botnet = an on-line army for rent

PAGE 6 |       Kaspersky Lab Presentation   | September 26, 2012
How infection occurs
      Infection vectors
           Delivered via email spam
           •   Malware link: evil website masquerading as legit
           Legit website that’s been infected
      “Exploit” – the entry mechanism
      Trojans – the tool
      bot + bot + bot = botnet
      Botherder C&C (command & control)


PAGE 7 |        Kaspersky Lab Presentation   | September 26, 2012
On-line bank robberies
           Clampi Trojan
           $100M in 2010 from SMB, SLED
            Goal: steal login and password
             for on-line bank accounts
            Database of over 4500 different
             financially related sites
            Learn about users’ on-line banking activity (times, dates)
            Wait for a break in bank contact
            Recruit money mules
            Transfer money out in sums of under $10K
            Money mule transfers out of the country



PAGE 8 |          Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats 2012
     Named viruses:
       Stuxnet, Flame, APTs
        – Enterprises
       Clampi – SMB
     Hacktivism – good or bad?
     Accelerated discovery of multi-year operations
     (Mac botnet, Flame, etc.)
    What companies or individuals are infected today
    who will only know about it years from now?


PAGE 9 |    Kaspersky Lab Presentation   | September 26, 2012
Biggest Issue in Security 2012 (as always)

            Human beings!
            (impatient, proud, busy, curious…) – RSA’s $71M
            man
             For consumers: save yourself from yourself…
            The blurry boundaries between
            work, home, school – BYOD
             Who else are you jeopardizing?
             Who else is jeopardizing you?


    Best solution: forced patching & AV
PAGE 10 |        Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Better Internet Safety
            1. Your AV is your friend – be patient
            2. Use the best AV possible (not the free
            stuff!)
            3. Always patch when prompted
            4. Never click a link offered by any email
            without checking where it goes (you are
            looking for …marriott.com/ )
            5. Try to get everyone you work or play
            with to follow the same rules!

PAGE 11 |         Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Internet Safety
            6. On-line banking:
              Take the extra security!
              Log on after your AV updates and before
              going to any other websites
            7. Write down passwords (be complex)
            8. Make sure your Macs are protected
            too
            9. Let strange mail get “stale”
            10. Check suspicious email or links via
            phone (or not at all)

PAGE 12 |        Kaspersky Lab Presentation   | September 26, 2012
What Kaspersky Delivers!


            Fastest response to threats
            Cracks more archives and file types
            Consistently rated “the best” by independent
            test organizations
             www.av-test.org
             www.av-comparatives.org
             www.virusbtn.com


PAGE 13 |        Kaspersky Lab Presentation   | September 26, 2012
Fast Response Ensures the Shortest ‘Window of Opportunity’




PAGE 14 |   Kaspersky Lab Presentation   | September 26, 2012
Useful security links!

       KLAB Digest - a proactive security news push:
       KLAB Digest – email me to subscribe: security
       news highlights monthly
       cynthia.james@kaspersky.com
       www.securelist.com
       The more technical version
       www.threatpost.com
       Generic security information - “the first stop for
       security on the web”


  Email me for a free copy of Kaspersky PURE!




PAGE 15 |        Kaspersky Lab Presentation   | September 26, 2012
Thank You

 Kaseya & Kaspersky Lab
 What You Need to Know about Cyber Security in 2012



Cynthia James, Director Business Development, CISSP, Kaspersky Lab
Global Business Development
September 2012
Speakers




      Jeff Keyes        Scott Brackett
  Product Marketing   Product Manager
Kaseya’s Security Solution
• Blended Protection / Unified Platform / Remediation / Partners


                                     Anti-          Partners /
  Patching        Anti-Virus
                                    Malware        Remediation

                                                        Partners
   Operating
    System            Kaseya
                     Antivirus                          Agent
   MS Office                                          Procedures

                                      Kaseya         Monitoring &
                                    AntiMalware        Mobile
                      Kaseya                         Service Desk &
   3rd Party *
                     Endpoint                          Reporting
   Software          Security
  Deployment                                         Scheduling &
                                                     Management

                                                                   18
Show Me How Easy it is to Manage
All My Patches
KAV 1.4 - New Features
• Kaseya Anti-Virus 1.4 additions:
  1.   Manageability
  2.   Manageability
  3.   Manageability
  4.   File Share for updates / installs of endpoints
       dependent upon VSA 6.3

• Requires VSA 6.2 or higher
• Kaspersky 6.0.4 server & workstation
  – can continue managing existing AV 2010
KAV 1.4 Key Points
•   LAN Cache Support – for installs and updates; 6.3 required
•   Detections – filter and add to quarantine
•   Column Sets - definitions out of date/ reboot required/profile compliance issue
•   New Status Flags – 5 from “have active threats” to “reboot required”
•   Advanced Installation Options
     –   Select server and workstation
     –   Remove competing product
     –   Reboot if needed
     –   Prompt user for approval
     –   Skip if offline
     –   Endpoint password for uninstall and change options
•   Profile Visibility
•   Profile Configuration – BIGGEST addition The biggest/most requested change
•   License Management-
     –   Separate pools workstation & server
     –   Licensed from point of time install; not purchase
•   Reporting
•   Alerts
Show Me How Easy it is to Manage
Kaspersky AntiVirus
Resources

•   KAV 1.4 Help Doc
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm

•   KAV 1.4 Release Notes:
     – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm

•   KAV 1.4 Users Guide:
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf

•   Patch Users Guide:
     – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62.
       pdf#view=Fit&navpanes=0



    scott.brackett@kaseya.com
    jeff.keyes@kaseya.com
Patch Management Valu Prop
• Schedule scans
• Manage the Patch status on all machines
  or groups of machines
• Apply policies to individual or groups of
  machines
  – Logical Segmentation
  – Operating System Type
• Test Patches on groups before applying to
  others
• Alert and patch status

Más contenido relacionado

La actualidad más candente

Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...David Etue
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsDinis Cruz
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_programShannon Lietz
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationTjylen Veselyj
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSAShannon Lietz
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Skybox Security
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016Shannon Lietz
 

La actualidad más candente (20)

Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 

Similar a Cybercrime Threats in 2012 - What You Need to Know

Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutiaTenzin Thiley
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundRickMeasham
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsIBM Security
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsBlack Duck by Synopsys
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aIgor Pandzic
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...imagazinepl
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security TestingRay Lai
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 

Similar a Cybercrime Threats in 2012 - What You Need to Know (20)

Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Más de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Más de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Cybercrime Threats in 2012 - What You Need to Know

  • 1. Kaseya and Kaspersky Lab Cybercrime Threats in 2012: What You Need to Know Cynthia James, Director Business Development, CISSP September 2012
  • 2. Agenda Kaspersky Lab Today’s Threatscape & Top Threats 10 Internet Safety Tips Sources PAGE 2 | Kaspersky Lab Presentation | September 26, 2012
  • 3. About Kaspersky Lab Founded in 1997; largest private anti-malware company – 100% focused on anti-malware Over $600M annual revenues Presence in 19 countries: CEO is Russian; incorporated in the UK; new to US market in 2005 #1 vendor in Germany, France, Spain, Eastern Europe America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) Top supplier to OEMs/ISVs of anti-malware worldwide  Aggressively protecting businesses PAGE 3 | Kaspersky Lab Presentation | September 26, 2012
  • 4. Cybercrime threatscape: malware growth Recent years have seen exponential growth in malware. 200k unique malware samples were identified in 2006; 2M in 2007, over 15 million by 2009…50 million this past year. Now it is the quality of malware that improves annually. PAGE 4 | Kaspersky Lab Presentation | September 26, 2012
  • 5. Top Security Threats of 2012: backdrop Cybercriminals earn over $100 billion annually! Cybercrime markets are now very organized and sophisticated  everything has a price, most data has some value  Affiliate programs pay hackers to distribute malware “Rented” botnets & malware kits for sale Code re-use: there’s no such thing as “old news” in cybercrime  Trickle down effect (of tactics) PAGE 5 | Kaspersky Lab Presentation | September 26, 2012
  • 6. The power of botnets Kido (aka Conficker) botnet in May 2009 (peak) GFLOPS When the Kido botnet reached its peak in May 2009 it contained about 6 mln. zombie machines Botnet = an on-line army for rent PAGE 6 | Kaspersky Lab Presentation | September 26, 2012
  • 7. How infection occurs Infection vectors Delivered via email spam • Malware link: evil website masquerading as legit Legit website that’s been infected “Exploit” – the entry mechanism Trojans – the tool bot + bot + bot = botnet Botherder C&C (command & control) PAGE 7 | Kaspersky Lab Presentation | September 26, 2012
  • 8. On-line bank robberies Clampi Trojan $100M in 2010 from SMB, SLED  Goal: steal login and password for on-line bank accounts  Database of over 4500 different financially related sites  Learn about users’ on-line banking activity (times, dates)  Wait for a break in bank contact  Recruit money mules  Transfer money out in sums of under $10K  Money mule transfers out of the country PAGE 8 | Kaspersky Lab Presentation | September 26, 2012
  • 9. Top Security Threats 2012 Named viruses:  Stuxnet, Flame, APTs – Enterprises  Clampi – SMB Hacktivism – good or bad? Accelerated discovery of multi-year operations (Mac botnet, Flame, etc.) What companies or individuals are infected today who will only know about it years from now? PAGE 9 | Kaspersky Lab Presentation | September 26, 2012
  • 10. Biggest Issue in Security 2012 (as always) Human beings! (impatient, proud, busy, curious…) – RSA’s $71M man  For consumers: save yourself from yourself… The blurry boundaries between work, home, school – BYOD  Who else are you jeopardizing?  Who else is jeopardizing you? Best solution: forced patching & AV PAGE 10 | Kaspersky Lab Presentation | September 26, 2012
  • 11. 10 Tips to Better Internet Safety 1. Your AV is your friend – be patient 2. Use the best AV possible (not the free stuff!) 3. Always patch when prompted 4. Never click a link offered by any email without checking where it goes (you are looking for …marriott.com/ ) 5. Try to get everyone you work or play with to follow the same rules! PAGE 11 | Kaspersky Lab Presentation | September 26, 2012
  • 12. 10 Tips to Internet Safety 6. On-line banking: Take the extra security! Log on after your AV updates and before going to any other websites 7. Write down passwords (be complex) 8. Make sure your Macs are protected too 9. Let strange mail get “stale” 10. Check suspicious email or links via phone (or not at all) PAGE 12 | Kaspersky Lab Presentation | September 26, 2012
  • 13. What Kaspersky Delivers! Fastest response to threats Cracks more archives and file types Consistently rated “the best” by independent test organizations  www.av-test.org  www.av-comparatives.org  www.virusbtn.com PAGE 13 | Kaspersky Lab Presentation | September 26, 2012
  • 14. Fast Response Ensures the Shortest ‘Window of Opportunity’ PAGE 14 | Kaspersky Lab Presentation | September 26, 2012
  • 15. Useful security links! KLAB Digest - a proactive security news push: KLAB Digest – email me to subscribe: security news highlights monthly cynthia.james@kaspersky.com www.securelist.com The more technical version www.threatpost.com Generic security information - “the first stop for security on the web” Email me for a free copy of Kaspersky PURE! PAGE 15 | Kaspersky Lab Presentation | September 26, 2012
  • 16. Thank You Kaseya & Kaspersky Lab What You Need to Know about Cyber Security in 2012 Cynthia James, Director Business Development, CISSP, Kaspersky Lab Global Business Development September 2012
  • 17. Speakers Jeff Keyes Scott Brackett Product Marketing Product Manager
  • 18. Kaseya’s Security Solution • Blended Protection / Unified Platform / Remediation / Partners Anti- Partners / Patching Anti-Virus Malware Remediation Partners Operating System Kaseya Antivirus Agent MS Office Procedures Kaseya Monitoring & AntiMalware Mobile Kaseya Service Desk & 3rd Party * Endpoint Reporting Software Security Deployment Scheduling & Management 18
  • 19. Show Me How Easy it is to Manage All My Patches
  • 20. KAV 1.4 - New Features • Kaseya Anti-Virus 1.4 additions: 1. Manageability 2. Manageability 3. Manageability 4. File Share for updates / installs of endpoints dependent upon VSA 6.3 • Requires VSA 6.2 or higher • Kaspersky 6.0.4 server & workstation – can continue managing existing AV 2010
  • 21. KAV 1.4 Key Points • LAN Cache Support – for installs and updates; 6.3 required • Detections – filter and add to quarantine • Column Sets - definitions out of date/ reboot required/profile compliance issue • New Status Flags – 5 from “have active threats” to “reboot required” • Advanced Installation Options – Select server and workstation – Remove competing product – Reboot if needed – Prompt user for approval – Skip if offline – Endpoint password for uninstall and change options • Profile Visibility • Profile Configuration – BIGGEST addition The biggest/most requested change • License Management- – Separate pools workstation & server – Licensed from point of time install; not purchase • Reporting • Alerts
  • 22. Show Me How Easy it is to Manage Kaspersky AntiVirus
  • 23. Resources • KAV 1.4 Help Doc – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm • KAV 1.4 Release Notes: – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm • KAV 1.4 Users Guide: – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf • Patch Users Guide: – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62. pdf#view=Fit&navpanes=0 scott.brackett@kaseya.com jeff.keyes@kaseya.com
  • 24. Patch Management Valu Prop • Schedule scans • Manage the Patch status on all machines or groups of machines • Apply policies to individual or groups of machines – Logical Segmentation – Operating System Type • Test Patches on groups before applying to others • Alert and patch status

Notas del editor

  1. Points to make here: Even when presenting in a more educational (product free) format, we should say – this a slide to make you feel comfortable with who Kaspersky is today and give you confidence in the fact that we have the expertise to educate you on cybercrime. It’s also a good primer on how to pick any AV company whose product you use. Most importantly they should have a worldwide focus and millions of end points, because most cybercriminals test and tune their malware before they mass distribute it. So if we can catch it when it first appears, you’ll be protected by the time it reaches you. You can see that Kaspersky has: Millions of end pointsWW presence (for sampling and solutions) And: Kaspersky began distributing in the US only since 2005, but that was after rising to the top of every other AV market in the world. We’ve progressed quickly. Many people haven’t kept up with our growth because it’s been so rapid. When I started 5 years ago we were in the $100 million revenue range; today we have over $600M in revenues. Revenues do matter because a significant amount of that money goes back into our R&D, and they help us hire our worldwide staff – right now that’s about 2500 employees and a huge number of those are actively engaged in creating solutions to malware. We’re proud to be the leaders in providing technology to OEMs and ISVs (define what OEM means if your audience is unlikely to know). Overwhelmingly we are selected by companies like (list any which are not competitive). These OEMs and ISVs have very stringent technical requirements and are able to choose among all vendors. In fact our first ever deal back in 1997 involved licensing the technology to a company who sold to other businesses. Of course we credit the fact we are selected most often to the superiority of our solution.
  2. This is a visual representation of what I’m talking about. Kaspersky has a unique genealogy in the anti-malware community because we started out doing technology licensing deals. (Describe OEM briefly.) We licensed our technology to a company who then used it to protect other companies. This matters because in those days – back in the late 1990’s – home users who even had internet connections were still forcing a connection. It wasn’t even close to being “always on”, and getting updates every 48 hours was fine. But businesses were on the leading edge – they came on-line fastest with websites and customer interactivity, etc. So the technical requirement for protecting them was much more stringent than it was for home users. Serving the very demanding segment of business users forced us to compress the vulnerability window as much as possible and become really efficient about delivering the smallest updates possible.