anti - exploit technology & spear-phishing protect the problem 319% the increase in spear-phishing...

Download ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECT THE PROBLEM 319% The increase in spear-phishing campaigns

Post on 27-May-2020

0 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • © Votiro Inc. 2016. All rights reserved.

    SECURE GATEWAYS EMPOWERED BY

    ADVANCED CONTENT

    DISARM AND

    RECONSTRUCTION

  • COMPANY OVERVIEW

    Private company

    established in 2010

    US patent

    technology since 2012

    US Office Sunnyvale, CA

    Israel Office Tel Aviv

    APAC Office Singapore

    Partners and

    Distributors

    Worldwide

    28 Active Customers in

    Countries

    16

  • SATISFIED CUSTOMERS

    Paying and

    renewing

    customers

    In 16 countries

    GovernmentHealthCare Critical

    Infrastructure Financial Services

    • Security agencies

    • Ministries

    • Defense

    • Healthcare

    companies

    • Hospitals

    • Pharmaceuticals

    • National energy,

    water and gas

    utilities

    • Nuclear research

    • Telecom groups

    • Banks

    • Insurance companies

    • Stock markets

    10B$ State Organization with

    13B$ World’s Second Largest Health Service Provider with

    4B$ Large Utility Company with

    6B$ Bank 3 out of the 7 biggest

    banks in Israel

    150,000+ Employees

    40,000+ employees

    30,000+ Employees

    10,000+ Employees

  • CERTIFICATIONS AND AWARDS Votiro: The “Holy Grail” of Cyber Security

    (Inc.com, 1 January 2016)

    “Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”

    Leading Industry Recognition of Votiro’s Technology:

    Industry awards recognizing world leading Intellectual Property:

    Prize for innovative technology

    Recognition as "hot" security start-up

    Prize for tomorrow’s technology

    today

    Director of Security

    of the Defense Establishment

    State Authority for Information

    Security

    World leading Government Certifications:

    Global Reach and Media Exposure

    https://www.gartner.com/doc/reprints?id=1-2IXWNX2&ct=150702&st=sb http://www.inc.com/dave-kerpen/15-israeli-startups-to-watch-in-2016.html http://www.scmagazineuk.com/no-inbox-left-behind-what-security-education-lacks-and-how-we-might-fix-it/article/504185/ http://www.nytimes.com/2015/08/28/technology/ashley-madison-users-face-threats-of-blackmail-and-identity-theft.html?_r=1 http://www.eweek.com/security/security-vendor-votiro-raises-4m-to-fund-global-growth-enhance-its-lineup.html http://www.darkreading.com/cloud/votiro-raises-$4-million-in-series-a-round-to-neutralize-zero-day-threats/d/d-id/1325680

  • “As malware sandbox evasion techniques improve, the use of content disarm and reconstruction (CDR) at the email gateway as a supplement or alternative to sandboxing will increase.” (Gartner, Fighting Phishing: Optimize Your Defense, Neil Wynne, Andrew Walls, Peter Firstbrook, 17 March 2016)

    “Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.” (Inc.com, 1 January 2016)

    Gartner, Inc. Founded in 1979, has over 7,800 employees, including 1,280 in research, located in 85 countries providing information technology related insight. Research provided by Gartner is targeted at CIOs and senior IT leaders, marketing leaders and supply chain leaders. Gartner clients include large corporations, government agencies, technology companies and the investment community.

    Inc. magazine, Founded in 1979 and based in New York City, is an American monthly publication focused on growing companies.

    What people say about Votiro’s technology?

  • OUR MISSION

    MAINTAINING CYBER SECURITY LEADERSHIP By protecting organizations from targeted attacks by disarming

    undisclosed, zero-day and known exploits

  • THE PROBLEM

    319% The increase in spear-phishing campaigns from 2012 to 2015 (Internet Security Threat Report 2014-2016, Symantec)

    $148M The cost of A SINGLE data breach incident (at Target), excluding Brand Damage (Forbes, August 2014)

    55% Anti-Virus software misses 55% of malwares and is “dead” (Brian Dye, senior vice-president for information security at Symantec, 2014)

    “Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats” (Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

  • VICTIMS OF SPEAR PHISHING ATTACKS

    95% of enterprise-network attacks are a result of a spear-phishing campaign

    (Network World, citing Alan Paller, Director of Research at SANS, 2013)

  • Using new IP and new E-mail account,

    the spam filter is bypassed.

    The recipient is lured into double-clicking

    the attachment.

    Undisclosed exploit evades detection by

    anti-malware.

    Using sandbox evasion techniques,

    the malware hops in.

    Targeted email directed at a specific individual in an organization

    Contextual content “contain accurate information about victims from social networks” (FBI, July 2013)

    Polymorphic malware installation, evading sandboxing

    Undisclosed or zero-day exploit in an “innocent” looking file

    UserSandboxAnti-MalwareAnti-Spam

    HACKERS EVASION TECHNIQUES

  • Threat

    Duration

    Usage

    Signature-Based Detection

    Protection by VOTIRO technology

    YesYesYes

    No

    Years

    High

    Cyber warfare and cyber crime

    According to provided samples

    According to provided samples

    Cyber warfare and cyber crime

    Opportunistic attacks by script kiddies

    Months

    Medium Low

    N/A

    Undisclosed Exploit Zero-Day Exploit Known / Patched Exploit

    Threat-Detection Sandbox

    Few Few Few

     Exploit

     Malware

    VULNERABILITY LIFECYCLE

  • VOTIRO PROVEN TECHNOLOGY Votiro’s solution has been shown capable of preventing the

    following attacks

    AND

    MANY

    MORE!

    CVE-2009-0927 CVE-2009-3129 CVE-2010-0188 CVE-2010-1297

    CVE-2010-3333

    CVE-2013-1331

    CVE-2014-0496

    CVE-2014-6352

    CVE-2013-0640

    CVE-2013-3906

    CVE-2014-1761

    CVE-2015-3050/1

    CVE-2013-0641

    CVE-2014-0322

    CVE-2014-4114

    CVE-2015-5119

    CVE-2012-0158

    CVE-2013-3346

    CVE-2014-0514

    CVE-2015-2523

    6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

  • THE NEED

    Secure Gateways capable of stopping undisclosed and zero-

    day threats.

    “Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”

    (Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

  • Commercial in Confidence: Votiro CyberSec Ltd

    VOTIRO’S SEG – MAIN PROTECTION LAYERS:

    6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

  • Before After

    Before After

    • Inspect metadata • Dissection into objects • Reconstruct file

    An embedded unknown exploit Seamless for the application A cleansed version of the original file

    THE SOLUTION Votiro’s patented Advanced Content Disarm and Reconstruction

    Try our demo: www.Votiro.com/demo

    http://www.votiro.vom/demo

  • SUPPORTED FILE TYPES

    Data taken from "Targeted Attack Trends Report" Trend Micro, 2014.

    Detection and Neutralization:

    • Office files (Excel®, Word, PowerPoint®)

    • Archive files

    • Word Viewer files (RTF)

    • PDF files

    • Image files

    Classification and Blocking:

    • Executables

    100% PROTECTION FROM

    TARGETED ATTACKS

  • File Transfer GatewayRemovable Media GatewaySecure Email Gateway

    • Integration with FTP servers and SMB shares

    • Multiple anti virus protection

    • Zero-Day exploit protection

    • Gateway for removable media and USB drives

    • Multiple anti virus protection • Zero-Day exploit protection

    • Gateway for all email servers • Multiple anti virus protection • Zero-Day exploit protection • Anti-Spam

    OUR GATEWAYS

    Deployment options: On-premises (physical / VM), SaaS

  • SECURE EMAIL GATEWAY - SaaS DEPLOYMENT

    Sender's server

    (mx) mail.corp.com cloud.votiro.com

    Recipient's mail server mail.corp.com

    • Quarantine • Users and Policies • Domain Settings • Reports

    One-click setup

    Requires no endpoint installation

    Real time operation

    (

  • ON-PREMISES DEPLOYMENT

    Confidential

    DMZ

    Network

    Internal

    Network

    Users

    Mail Relay

    File Server

    Removable Media

    VOTIRO SECURE EMAIL GATEWAY

    VOTIRO FILE TRANSFER GATEWAY

    VOTIRO REMOVABLE MEDIA

    GATEWAY

    Mail Server

    File Server

    Home Dir.

    Management / Updater

  • Confidential

    ZERO DAY EXPLOIT PROTECTION API

  • THANK YOU For more information, please contact:

    Adrian@witz.com.au

    Ph: +612 8041 9725

    100% PROTECTION

    FROM

Recommended

View more >