Download - Effective Threat Protection Strategies
![Page 1: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/1.jpg)
[Name / Title]
[Date]
Effective Threat Protection Strategies
![Page 2: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/2.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 3: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/3.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 4: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/4.jpg)
The business challenges
Increase in usage of internet means greater exposure to threats
Growing number of threats from cybercriminals
Costs of security breaches
Protecting business continuity
Maintaining regulatory compliance
![Page 5: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/5.jpg)
Organizations are still getting infected
Source: Ponemon Institute Security, Mega trends survey 2009
![Page 6: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/6.jpg)
The cost
Average cost of a data breach
$204 per record compromised
Average loss due to security incident
$234,244 per respondent
![Page 7: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/7.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 8: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/8.jpg)
Changing threat landscape
The paths to threat exposure are also multiplying:
Social network use by businesses, customers and employees
Infected web pages
Email and IM spam
![Page 9: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/9.jpg)
Regulatory and compliance riskComply with a growing body of government regulations and industry standards, such as:
National and state regulations
Payment Card Industry Data Security Standard
Health Insurance Portability and Accountability Act
![Page 10: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/10.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 11: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/11.jpg)
Effective threat protection strategy
Balancing business needs with threats and regulations
Protecting against the threats
Enabling your business to operation efficiently
Four key principles
1. Prevention
2. Proactive
3. Performance and productivity
4. Simplicity
![Page 12: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/12.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 13: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/13.jpg)
1. Prevention
Close the security gaps by addressing the sources of infection,preventing threats from getting in, and creating a secure IT environment
Look at implementing interlocking layers of protection
Firewall - secure the computers perimeter
Application Control - prevent unwanted applications
Device Control – allow on clean authorized devices
Network Access Control – ensure computers comply with policy
Email filtering – keep email free of spam and malware
Web security - protect users from accessing malicious websites
Patch management – keep computers protected with latest patches
![Page 14: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/14.jpg)
2. Proactive
Protect against previously unseen attacks before a signature is available
Technologies that deliver:
Behaviour-based detection – stopping code from performing suspicious actions
Host-based Intrusion Prevention Systems (HIPS)
Buffer Overflow Protection Systems (BOPS)
Cloud-based reputation protection – providing latest information online
Live Anti-Virus
Live URL Filtering
![Page 15: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/15.jpg)
3. Performance... and productivity
IT security should help protect productivity
Users will turn off security software if it slows down the performance
A security solution should not get in the way of business itself
Balance protection with productivity
![Page 16: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/16.jpg)
4. Simplicity
Security safeguards have to be simple and manageable to get the job done
Understand the incremental benefit over the security already in place
Assess the effect of proposed threat protection measures
Do as much as you can with the smallest number of products
Avoid products that require an expert to manage
Account for the cost of maintaining security products
![Page 17: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/17.jpg)
Agenda1. The Business Challenge
2. Changing Threat Landscape
3. Effective Threat Protection Strategy
4. The Four Principles
5. Getting It Right
![Page 18: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/18.jpg)
Security solutions with the greatest business flexibility, least operational effort and lowest investment
Comprehensive security & control
Simplicity & manageability
Pre-packaged intelligence
Unrivalled support
Security that frees IT managers to concentrate on their business.
The Sophos Approach
![Page 19: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/19.jpg)
Comprehensive security and data protection
![Page 20: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/20.jpg)
Simplicity and manageability
Simplification Manageability
Best security
with least investment
Single agent
Widest platform support
Integrated management
Intelligent policy updating
Appliance monitoring
Automatic protection
Easy to use management
Integrated data protection
Remote monitoring
Anonymizing proxy detection
Delivers consistent protection
Puts our expertise in your hands
Reduces agent pollution
Eliminates end user impact
Ensures lowest operating costs
![Page 21: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/21.jpg)
Pre-packaged intelligence from SophosLabs™
Unrivalled visibility
Integrated expertiseAutomated analysis
Monitoredregulations
Reduces need for specialist
security expertise
![Page 22: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/22.jpg)
Penalty backedSLAs
Unrivalled support and services
“Overall, Sophos, which places customer support as the cornerstone of its business, was the best. We were greatly impressed by the troubleshooting skills of its technicians, whose knowledge about their product and Windows is solid.”
Infosecurity Magazine Scorecard: AV Vendors Tech Support , Ed Skoudis
"I have always received outstanding attention from your support team.” Sal Serafino, Cold Spring Harbor Laboratory, US
"Sophos has continually demonstrated dedication to both technical support and customer service."Neil Barnes, calfordseaden, UK
24 / 7 support as standard
Exceptionalservice levels
Our staffin
our offices
Breadth ofknowledge,
cross platformissue resolution
Worldwidecoverage
Direct access toexperts speaking
local language
Enhancedsupport servicesto maximise ROI
![Page 23: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/23.jpg)
Summary
1. Review your current security against your business needs
2. Deploy layers of protection to close the security gaps
3. Measure each technology choice against the four principles
![Page 24: Effective Threat Protection Strategies](https://reader035.vdocuments.net/reader035/viewer/2022062323/5681602c550346895dcf3979/html5/thumbnails/24.jpg)