preventing “internal threats in the modern world€¦ · cloud-based or locally hosted remote...

24
©2016 Awareness Technologies, All Rights Reserved [email protected] Brian Lambert Director of Strategic Business Development Preventing “Internal Threatsin the modern world Security Simplified

Upload: others

Post on 19-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

©2016 Awareness Technologies, All Rights Reserved [email protected]

Brian Lambert Director of Strategic Business Development

Preventing “Internal Threats” in the modern world

Security Simplified

Page 2: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

2

Complete Solutions; Easy Partner Program

©2016 Awareness Technologies, All Rights Reserved [email protected]

• Founded in 2002, with HQ in Westport CT

• Unique solution architected with 3 principles: 1. Complete – 4 technologies in one to solve whole problem 2. Endpoint – realities of today’s mobile workforce 3. Ease of use – traditional technologies are too complex

• Over 10,000 customers in numerous vertical markets across the globe

• Adding over 150 new corp. clients per month

Who is Awareness Technologies?

Page 3: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

3

Zero-Day Threats CONFIDENTIAL DATA

LEAKAGE COMPLIANCE &

INVESTIGATION

• Customer Lists

• Source Code

• Mergers & Acquisitions

• Price Lists

• Payroll Records

• HIPAA, GLBA, PCI, etc.

• Cyber Bullying

• Workplace Harassment

• IT Forensics

Key Internal Threats

©2016 Awareness Technologies, All Rights Reserved [email protected]

The Insider Threat

• Gaining control of

vulnerable software

• Compromised credentials

to gain control of critical

assets

EMPLOYEE

PRODUCTIVITY

• Inappropriate websites

• Non work programs

• Work programs for side

business

Page 4: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

4

Insider Threats Are Prolific

The Facts • 80.4 % of 2063 people surveyed waste time on non-work related activities GetVoip Business Insider

• 60 percent of exiting employees walk out with company information Ponemon Institute

©2016 Awareness Technologies, All Rights Reserved [email protected]

• Laptop/Workstation risks due to insider error & lack of judgment (employee errors that lead to data loss) is a Top threat at 56 % surveyed

IDC Research

• Insiders are responsible for 70 percent of the security incidents that incur losses Identity Theft Resource Center

Page 5: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

5

Insider Threats Are Prolific

The Facts • The #2 threat vector at the end-point behind new malware infections are hackers gaining credentials to legitimate network tools IDC Research

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 6: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

6

Insider Threats Are Prolific

The Facts

Top 5 Remote Desktop Tools exploited by hackers

©2016 Awareness Technologies, All Rights Reserved [email protected]

Tool Name Function Percentage of Top 10

TeamViewer Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral movement

37.22%

WinVNC Remote desktop software using Virtual Network Computing (VNC) for remote access

27.44%

Radmin Remote desktop and technical support software 9.09%

AnyDesk Remote desktop software 6.86%

LogMeIn Cloud-based remote access and remote desktop service 4.12%

Page 7: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

7

Insider Threats Are Prolific

The Facts • The #2 threat vector at the end-point behind new malware infections are hackers gaining credentials to legitimate network tools IDC Research

• Over 35 States have enacted security breach notification laws Ponemon Institute

©2016 Awareness Technologies, All Rights Reserved [email protected]

• 68 % of Healthcare Data Breaches are due to device theft or loss HIT Consultant

• Over 600,000 laptops are lost or stolen annually in the USA < 3% are recovered Gartner

Page 8: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

8

Insider Threats Are Prolific

The Facts

• DLP is 2nd behind Firewall management as one of the top information-security projects over the next 12 months 451 Research

©2016 Awareness Technologies, All Rights Reserved [email protected]

• Fear of Data Loss is the top information security challenge for the next twelve months 451 Research

• 62 percent of CIO’s believe data leakage from end-points to be a top driver of their security spending Gartner

• 1:2 companies lose data on USB drives Symantec

Page 9: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Viruses

Spam

Hackers

Malware

Security 2000 - 2015

Company Network

Evolution of Security

External Threats

Page 10: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Viruses

Spam

Hackers

Malware

Security 2000 - 2015

Evolution of Security

Advent of UTM

Company Network

Single Point Solution

Page 11: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Viruses

Spam

Hackers

Malware

Security Today & Beyond

Company Network

Employee Errors

& Regulatory

Failures

Confidential

Data

Employee

Productivity

Laptop

Theft/Loss

Evolution of Security

Company Network

Internal threats

are for more

damaging

Page 12: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Viruses

Spam

Hackers

Malware

Employee Errors

& Regulatory

Failures

Confidential

Data

Employee

Productivity

Laptop

Theft/Loss

Company Network

Security Today & Beyond

Evolution of Security

Company Network

Single Point

Solutions

DLP

EMPLOYEE MONITORING

WE

B F

ILTE

RIN

G

LA

PTO

P R

EC

OV

ER

Y

ATI

- 4 technologies

- One download

- One interface

Page 13: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

13

Awareness Technologies 3 Key Principles

COMPLETE Ease of Use ENDPOINT

REVOLUTIONARY INTERNAL THREAT SOLUTION

©2016 Awareness Technologies, All Rights Reserved [email protected]

• 4 technologies via 1

download/ interface

• Solves entire Internal

Threat problem

• Download in minutes

• 3 deployment options • Works On/ Off Network

• PC’s/ Laptops/ Smartphones

• Critical for today’s Mobile

workforce

• ATI Data Center

• Partner Data Center

• Client Premise

Page 14: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Remote Employees

Employees On the Road

Internet

Each workstation is now protected

ATI/ Partner DC OR

Client Premise

Customer Firewall

Endpoint Solution– Ideal for Mobile Workforce

Smartphone Laptop

Customer Site

Smartphone Laptop Desktop

Easily download and install agents on each workstation

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 15: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Agents upload data over SSL connections as they are connected to the internet

Customer Site

Employees On the Road

Internet

Customer Firewall

Reporting Dashboard

Endpoint Solution– Ideal for Mobile Workforce

ATI/Partner DC OR

Client Premise

Remote Employees

Smartphone Laptop Desktop

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 16: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

Desktops Laptops

Unified View- For ALL Devices

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 17: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

17

What’s In It For You?

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 18: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

18

What’s In It For You?

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 19: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

19

What’s In It For You?

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 20: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

20

What’s In It For You?

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 21: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

21

What’s In It For Your Customers?

REDUCES

COMPLEXITY

• 4 technologies

• 1 download

• 1 interface

• 5 minutes

1. Unified Insider Threat Solution Simplifies a complex problem

• 4 technologies in ONE

• Mouse-click deployment

• One Download/ One Interface

2. Deployed at the Endpoint Downloads easily in minutes

Works ON/ OFF network Enables Remote Workforce

Records/ blocks ALL activity

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 22: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

22

What’s In It For You?

REDUCES

COMPLEXITY

• 4 technologies

• 1 download

• 1 interface

• 5 minutes

1. Unique Offerings New and untapped (internal threat) market segment

Differentiate from competition • 4 technologies in one

• Deployed at endpoint

• 2 delivery methods (cloud / on premise)

2. Partner Enablement Branded Control Console & Online Demo

Opportunity to self-host

Online trial / order / support tool

On demand training and marketing tools

MRR & ARR SKUs

Partnership with

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 23: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

23

What’s In It For You?

3. Ideal Sale/Upsale Tool Very easy to try, buy, and install

4 Modules gives partner 4 opportunities to make a sale, then Upsell later • Can be complementary to existing solutions (ideal for remote staff, both WF + DLP)

• Increase per user revenue more than 10x (from WF)

Web Filtering

(per user) Laptop Recovery

(per user)

Data Loss

Prevention

(per user)

PC Activity

(per user) ATI Bundle

(per user)

$

$15

$49

$99 $99

$198

©2016 Awareness Technologies, All Rights Reserved [email protected]

Page 24: Preventing “Internal Threats in the modern world€¦ · Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral

CALL OR EMAIL ME AT:

Brian Lambert

888-550-3130 ext 419 or

203-414-1477 (cell)

[email protected]

www.awarenesstechnologies.com

Partner Program – Join Today

Join the ATI Partner Program Today

©2016 Awareness Technologies, All Rights Reserved [email protected]