anti - exploit technology & spear-phishing...

20
© Votiro Inc. 2016. All rights reserved. SECURE GATEWAYS EMPOWERED BY ADVANCED CONTENT DISARM AND RECONSTRUCTION

Upload: others

Post on 27-May-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

© Votiro Inc. 2016. All rights reserved.

SECURE GATEWAYSEMPOWERED BY

ADVANCED CONTENT

DISARM AND

RECONSTRUCTION

Page 2: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

COMPANY OVERVIEW

Private company

established in 2010

US patent

technology since 2012

US OfficeSunnyvale, CA

Israel OfficeTel Aviv

APAC OfficeSingapore

Partners and

Distributors

Worldwide

28Active Customers in

Countries

16

Page 3: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

SATISFIED CUSTOMERS

Paying and

renewing

customers

In 16 countries

GovernmentHealthCareCritical

InfrastructureFinancial Services

• Security agencies

• Ministries

• Defense

• Healthcare

companies

• Hospitals

• Pharmaceuticals

• National energy,

water and gas

utilities

• Nuclear research

• Telecom groups

• Banks

• Insurance companies

• Stock markets

10B$ State Organization with

13B$ World’s Second Largest Health Service Provider with

4B$ Large UtilityCompany with

6B$ Bank 3 out of the 7 biggest

banks in Israel

150,000+Employees

40,000+employees

30,000+Employees

10,000+Employees

Page 4: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

CERTIFICATIONS AND AWARDSVotiro: The “Holy Grail” of Cyber Security

(Inc.com, 1 January 2016)

“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”

Leading Industry Recognition of Votiro’s Technology:

Industry awards recognizing world leading Intellectual Property:

Prize for innovativetechnology

Recognition as "hot" security start-up

Prize for tomorrow’stechnology

today

Director of Security

of the Defense Establishment

State Authority for Information

Security

World leading Government Certifications:

Global Reach and Media Exposure

Page 5: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

“As malware sandbox evasion techniques improve, the use of content disarm and reconstruction (CDR) at the email gateway as a supplement or alternative to sandboxing will increase.”(Gartner, Fighting Phishing: Optimize Your Defense, Neil Wynne, Andrew Walls, Peter Firstbrook, 17 March 2016)

“Votiro has achieved the holy grail of cybersecurity: technology that can defend against zero-day attacks.”(Inc.com, 1 January 2016)

Gartner, Inc. Founded in 1979, has over 7,800 employees, including 1,280 in research, located in 85 countries providing information technology related insight. Research provided by Gartner is targeted at CIOs and senior IT leaders, marketing leaders and supply chain leaders. Gartner clients include large corporations, government agencies, technology companies and the investment community.

Inc. magazine, Founded in 1979 and based in New York City, is an American monthly publication focused on growing companies.

What people say about Votiro’s technology?

Page 6: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

OUR MISSION

MAINTAINING CYBER SECURITY LEADERSHIPBy protecting organizations from targeted attacks by disarming

undisclosed, zero-day and known exploits

Page 7: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

THE PROBLEM

319%The increase in spear-phishing campaigns from 2012 to 2015(Internet Security Threat Report 2014-2016, Symantec)

$148MThe cost of A SINGLE data breach incident (at Target), excluding Brand Damage (Forbes, August 2014)

55%Anti-Virus software misses 55% of malwares and is “dead”(Brian Dye, senior vice-president for information security at Symantec, 2014)

“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

Page 8: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

VICTIMS OF SPEAR PHISHING ATTACKS

95% of enterprise-network attacks are a result of a spear-phishing campaign

(Network World, citing Alan Paller, Director of Research at SANS, 2013)

Page 9: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

Using new IP and new E-mail account,

the spam filter is bypassed.

The recipient is lured into double-clicking

the attachment.

Undisclosed exploit evades detection by

anti-malware.

Using sandbox evasion techniques,

the malware hops in.

Targeted emaildirected at a specific individual in an organization

Contextual content“contain accurate information about victims from social networks” (FBI, July 2013)

Polymorphic malware installation, evading sandboxing

Undisclosed or zero-day exploit in an “innocent” looking file

UserSandboxAnti-MalwareAnti-Spam

HACKERS EVASION TECHNIQUES

Page 10: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

Threat

Duration

Usage

Signature-Based Detection

Protection by VOTIRO technology

YesYesYes

No

Years

High

Cyber warfare and cyber crime

According to provided samples

According to provided samples

Cyber warfare and cyber crime

Opportunistic attacks by script kiddies

Months

Medium Low

N/A

Undisclosed Exploit Zero-Day Exploit Known / Patched Exploit

Threat-Detection Sandbox

Few Few Few

Exploit

Malware

VULNERABILITY LIFECYCLE

Page 11: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

VOTIRO PROVEN TECHNOLOGYVotiro’s solution has been shown capable of preventing the

following attacks

AND

MANY

MORE!

CVE-2009-0927 CVE-2009-3129 CVE-2010-0188 CVE-2010-1297

CVE-2010-3333

CVE-2013-1331

CVE-2014-0496

CVE-2014-6352

CVE-2013-0640

CVE-2013-3906

CVE-2014-1761

CVE-2015-3050/1

CVE-2013-0641

CVE-2014-0322

CVE-2014-4114

CVE-2015-5119

CVE-2012-0158

CVE-2013-3346

CVE-2014-0514

CVE-2015-2523

6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

Page 12: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

THE NEED

Secure Gateways capable of stopping undisclosed and zero-

day threats.

“Traditional malware protection proves increasingly unsuccessful to protect against some of the latest threats”

(Gartner, Malware Protection Systems for Detecting Malicious Code in the Network, Mario de Boer, 28 Feb. 2014)

Page 13: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

Commercial in Confidence: Votiro CyberSec Ltd

VOTIRO’S SEG – MAIN PROTECTION LAYERS:

6 YEARS OF ACTIVITY AND SUCCESS WITH ELIMINATING ALL EXPLOITS!

Page 14: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

Before After

Before After

• Inspect metadata• Dissection into objects• Reconstruct file

An embedded unknown exploitSeamless for the applicationA cleansed version of the original file

THE SOLUTIONVotiro’s patented Advanced Content Disarm and Reconstruction

Try our demo: www.Votiro.com/demo

Page 15: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

SUPPORTED FILE TYPES

Data taken from "Targeted Attack Trends Report" Trend Micro, 2014.

Detection and Neutralization:

• Office files (Excel®, Word, PowerPoint®)

• Archive files

• Word Viewer files (RTF)

• PDF files

• Image files

Classification and Blocking:

• Executables

100% PROTECTION FROM

TARGETED ATTACKS

Page 16: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

File Transfer GatewayRemovable Media GatewaySecure Email Gateway

• Integration with FTP servers and SMB shares

• Multiple anti virus protection

• Zero-Day exploit protection

• Gateway for removable media and USB drives

• Multiple anti virus protection• Zero-Day exploit protection

• Gateway for all email servers• Multiple anti virus protection• Zero-Day exploit protection• Anti-Spam

OUR GATEWAYS

Deployment options: On-premises (physical / VM), SaaS

Page 17: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

SECURE EMAIL GATEWAY - SaaS DEPLOYMENT

Sender's server

(mx) mail.corp.comcloud.votiro.com

Recipient's mail servermail.corp.com

• Quarantine • Users and Policies• Domain Settings• Reports

One-click setup

Requires no endpoint installation

Real time operation

(<1 second latency)

Supports Microsoft Office

365™, Google Apps™, and on-

premises email servers

Seamless for the employee

Page 18: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

ON-PREMISES DEPLOYMENT

Confidential

DMZ

Network

Internal

Network

Users

Mail Relay

File Server

Removable Media

VOTIRO SECURE EMAIL GATEWAY

VOTIRO FILE TRANSFER GATEWAY

VOTIRO REMOVABLE MEDIA

GATEWAY

Mail Server

File Server

Home Dir.

Management / Updater

Page 19: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

Confidential

ZERO DAY EXPLOIT PROTECTION API

Page 20: ANTI - EXPLOIT TECHNOLOGY & SPEAR-PHISHING PROTECTIONwitzcybersecurity.com/wp-content/uploads/2018/02/VOT-brochure.pdf · THE PROBLEM 319% The increase in spear-phishing campaigns

THANK YOUFor more information, please contact:

[email protected]

Ph: +612 8041 9725

100% PROTECTION

FROM DOCUMENTS

EXPLOITS

Commercial in Confidence: Votiro CyberSec Ltd