anti - exploit technology & spear-phishing...

Post on 27-May-2020

10 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© Votiro Inc. 2016. All rights reserved.

SECURE GATEWAYSEMPOWERED BY

ADVANCED CONTENT

DISARM AND

RECONSTRUCTION

COMPANY OVERVIEW

Private company

established in 2010

US patent

technology since 2012

US OfficeSunnyvale, CA

Israel OfficeTel Aviv

APAC OfficeSingapore

Partners and

Distributors

Worldwide

28Active Customers in

Countries

16

SATISFIED CUSTOMERS

Paying and

renewing

customers

In 16 countries

GovernmentHealthCareCritical

InfrastructureFinancial Services

• Security agencies

• Ministries

• Defense

• Healthcare

companies

• Hospitals

• Pharmaceuticals

• National energy,

water and gas

utilities

• Nuclear research

• Telecom groups

• Banks

• Insurance companies

• Stock markets

10B$ State Organization with

13B$ World’s Second Largest Health Service Provider with

4B$ Large UtilityCompany with

6B$ Bank 3 out of the 7 biggest

banks in Israel

150,000+Employees

40,000+employees

30,000+Employees

10,000+Employees

CERTIFICATIONS AND AWARDSVotiro: The “Holy Grail” of Cyber Security

(Inc.com, 1 January 2016)

“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”

Leading Industry Recognition of Votiro’s Technology:

Industry awards recognizing world leading Intellectual Property:

Prize for innovativetechnology

Recognition as "hot" security start-up

Prize for tomorrow’stechnology

today

Director of Security

of the Defense Establishment

State Authority for Information

Security

World leading Government Certifications:

Global Reach and Media Exposure

“As malware sandbox evasion techniques improve, the use of content disarm and reconstruction (CDR) at the email gateway as a supplement or alternative to sandboxing will increase.”(Gartner, Fighting Phishing: Optimize Your Defense, Neil Wynne, Andrew Walls, Peter Firstbrook, 17 March 2016)

“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”(Inc.com, 1 January 2016)

Gartner, Inc. Founded in 1979, has over 7,800 employees, including 1,280 in research, located in 85 countries providing information technology related insight. Research provided by Gartner is targeted at CIOs and senior IT leaders, marketing leaders and supply chain leaders. Gartner clients include large corporations, government agencies, technology companies and the investment community.

Inc. magazine, Founded in 1979 and based in New York City, is an American monthly publication focused on growing companies.

What people say about Votiro’s technology?

OUR MISSION

MAINTAINING CYBER SECURITY LEADERSHIPBy protecting organizations from targeted attacks by disarming

undisclosed, zero-day and known exploits

THE PROBLEM

319%The increase in spear-phishing campaigns from 2012 to 2015(Internet Security Threat Report 2014-2016, Symantec)

$148MThe cost of A SINGLE data breach incident (at Target), excluding Brand Damage (Forbes, August 2014)

55%Anti-Virus software misses 55% of malwares and is “dead”(Brian Dye, senior vice-president for information security at Symantec, 2014)

“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

VICTIMS OF SPEAR PHISHING ATTACKS

95% of enterprise-network attacks are a result of a spear-phishing campaign

(Network World, citing Alan Paller, Director of Research at SANS, 2013)

Using new IP and new E-mail account,

the spam filter is bypassed.

The recipient is lured into double-clicking

the attachment.

Undisclosed exploit evades detection by

anti-malware.

Using sandbox evasion techniques,

the malware hops in.

Targeted emaildirected at a specific individual in an organization

Contextual content“contain accurate information about victims from social networks” (FBI, July 2013)

Polymorphic malware installation, evading sandboxing

Undisclosed or zero-day exploit in an “innocent” looking file

UserSandboxAnti-MalwareAnti-Spam

HACKERS EVASION TECHNIQUES

Threat

Duration

Usage

Signature-Based Detection

Protection by VOTIRO technology

YesYesYes

No

Years

High

Cyber warfare and cyber crime

According to provided samples

According to provided samples

Cyber warfare and cyber crime

Opportunistic attacks by script kiddies

Months

Medium Low

N/A

Undisclosed Exploit Zero-Day Exploit Known / Patched Exploit

Threat-Detection Sandbox

Few Few Few

Exploit

Malware

VULNERABILITY LIFECYCLE

VOTIRO PROVEN TECHNOLOGYVotiro’s solution has been shown capable of preventing the

following attacks

AND

MANY

MORE!

CVE-2009-0927 CVE-2009-3129 CVE-2010-0188 CVE-2010-1297

CVE-2010-3333

CVE-2013-1331

CVE-2014-0496

CVE-2014-6352

CVE-2013-0640

CVE-2013-3906

CVE-2014-1761

CVE-2015-3050/1

CVE-2013-0641

CVE-2014-0322

CVE-2014-4114

CVE-2015-5119

CVE-2012-0158

CVE-2013-3346

CVE-2014-0514

CVE-2015-2523

6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

THE NEED

Secure Gateways capable of stopping undisclosed and zero-

day threats.

“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”

(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

Commercial in Confidence: Votiro CyberSec Ltd

VOTIRO’S SEG – MAIN PROTECTION LAYERS:

6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

Before After

Before After

• Inspect metadata• Dissection into objects• Reconstruct file

An embedded unknown exploitSeamless for the applicationA cleansed version of the original file

THE SOLUTIONVotiro’s patented Advanced Content Disarm and Reconstruction

Try our demo: www.Votiro.com/demo

SUPPORTED FILE TYPES

Data taken from "Targeted Attack Trends Report" Trend Micro, 2014.

Detection and Neutralization:

• Office files (Excel®, Word, PowerPoint®)

• Archive files

• Word Viewer files (RTF)

• PDF files

• Image files

Classification and Blocking:

• Executables

100% PROTECTION FROM

TARGETED ATTACKS

File Transfer GatewayRemovable Media GatewaySecure Email Gateway

• Integration with FTP servers and SMB shares

• Multiple anti virus protection

• Zero-Day exploit protection

• Gateway for removable media and USB drives

• Multiple anti virus protection• Zero-Day exploit protection

• Gateway for all email servers• Multiple anti virus protection• Zero-Day exploit protection• Anti-Spam

OUR GATEWAYS

Deployment options: On-premises (physical / VM), SaaS

SECURE EMAIL GATEWAY - SaaS DEPLOYMENT

Sender's server

(mx) mail.corp.comcloud.votiro.com

Recipient's mail servermail.corp.com

• Quarantine • Users and Policies• Domain Settings• Reports

One-click setup

Requires no endpoint installation

Real time operation

(<1 second latency)

Supports Microsoft Office

365™, Google Apps™, and on-

premises email servers

Seamless for the employee

ON-PREMISES DEPLOYMENT

Confidential

DMZ

Network

Internal

Network

Users

Mail Relay

File Server

Removable Media

VOTIRO SECURE EMAIL GATEWAY

VOTIRO FILE TRANSFER GATEWAY

VOTIRO REMOVABLE MEDIA

GATEWAY

Mail Server

File Server

Home Dir.

Management / Updater

Confidential

ZERO DAY EXPLOIT PROTECTION API

THANK YOUFor more information, please contact:

Adrian@witz.com.au

Ph: +612 8041 9725

100% PROTECTION

FROM DOCUMENTS

EXPLOITS

Commercial in Confidence: Votiro CyberSec Ltd

top related