preventing “internal threats in the modern world€¦ · cloud-based or locally hosted remote...
TRANSCRIPT
©2016 Awareness Technologies, All Rights Reserved [email protected]
Brian Lambert Director of Strategic Business Development
Preventing “Internal Threats” in the modern world
Security Simplified
2
Complete Solutions; Easy Partner Program
©2016 Awareness Technologies, All Rights Reserved [email protected]
• Founded in 2002, with HQ in Westport CT
• Unique solution architected with 3 principles: 1. Complete – 4 technologies in one to solve whole problem 2. Endpoint – realities of today’s mobile workforce 3. Ease of use – traditional technologies are too complex
• Over 10,000 customers in numerous vertical markets across the globe
• Adding over 150 new corp. clients per month
Who is Awareness Technologies?
3
Zero-Day Threats CONFIDENTIAL DATA
LEAKAGE COMPLIANCE &
INVESTIGATION
• Customer Lists
• Source Code
• Mergers & Acquisitions
• Price Lists
• Payroll Records
• HIPAA, GLBA, PCI, etc.
• Cyber Bullying
• Workplace Harassment
• IT Forensics
Key Internal Threats
©2016 Awareness Technologies, All Rights Reserved [email protected]
The Insider Threat
• Gaining control of
vulnerable software
• Compromised credentials
to gain control of critical
assets
EMPLOYEE
PRODUCTIVITY
• Inappropriate websites
• Non work programs
• Work programs for side
business
4
Insider Threats Are Prolific
The Facts • 80.4 % of 2063 people surveyed waste time on non-work related activities GetVoip Business Insider
• 60 percent of exiting employees walk out with company information Ponemon Institute
©2016 Awareness Technologies, All Rights Reserved [email protected]
• Laptop/Workstation risks due to insider error & lack of judgment (employee errors that lead to data loss) is a Top threat at 56 % surveyed
IDC Research
• Insiders are responsible for 70 percent of the security incidents that incur losses Identity Theft Resource Center
5
Insider Threats Are Prolific
The Facts • The #2 threat vector at the end-point behind new malware infections are hackers gaining credentials to legitimate network tools IDC Research
©2016 Awareness Technologies, All Rights Reserved [email protected]
6
Insider Threats Are Prolific
The Facts
Top 5 Remote Desktop Tools exploited by hackers
©2016 Awareness Technologies, All Rights Reserved [email protected]
Tool Name Function Percentage of Top 10
TeamViewer Cloud-based or locally hosted remote desktop and web conferencing software; can be used for command and control and lateral movement
37.22%
WinVNC Remote desktop software using Virtual Network Computing (VNC) for remote access
27.44%
Radmin Remote desktop and technical support software 9.09%
AnyDesk Remote desktop software 6.86%
LogMeIn Cloud-based remote access and remote desktop service 4.12%
7
Insider Threats Are Prolific
The Facts • The #2 threat vector at the end-point behind new malware infections are hackers gaining credentials to legitimate network tools IDC Research
• Over 35 States have enacted security breach notification laws Ponemon Institute
©2016 Awareness Technologies, All Rights Reserved [email protected]
• 68 % of Healthcare Data Breaches are due to device theft or loss HIT Consultant
• Over 600,000 laptops are lost or stolen annually in the USA < 3% are recovered Gartner
8
Insider Threats Are Prolific
The Facts
• DLP is 2nd behind Firewall management as one of the top information-security projects over the next 12 months 451 Research
©2016 Awareness Technologies, All Rights Reserved [email protected]
• Fear of Data Loss is the top information security challenge for the next twelve months 451 Research
• 62 percent of CIO’s believe data leakage from end-points to be a top driver of their security spending Gartner
• 1:2 companies lose data on USB drives Symantec
Viruses
Spam
Hackers
Malware
Security 2000 - 2015
Company Network
Evolution of Security
External Threats
Viruses
Spam
Hackers
Malware
Security 2000 - 2015
Evolution of Security
Advent of UTM
Company Network
Single Point Solution
Viruses
Spam
Hackers
Malware
Security Today & Beyond
Company Network
Employee Errors
& Regulatory
Failures
Confidential
Data
Employee
Productivity
Laptop
Theft/Loss
Evolution of Security
Company Network
Internal threats
are for more
damaging
Viruses
Spam
Hackers
Malware
Employee Errors
& Regulatory
Failures
Confidential
Data
Employee
Productivity
Laptop
Theft/Loss
Company Network
Security Today & Beyond
Evolution of Security
Company Network
Single Point
Solutions
DLP
EMPLOYEE MONITORING
WE
B F
ILTE
RIN
G
LA
PTO
P R
EC
OV
ER
Y
ATI
- 4 technologies
- One download
- One interface
13
Awareness Technologies 3 Key Principles
COMPLETE Ease of Use ENDPOINT
REVOLUTIONARY INTERNAL THREAT SOLUTION
©2016 Awareness Technologies, All Rights Reserved [email protected]
• 4 technologies via 1
download/ interface
• Solves entire Internal
Threat problem
• Download in minutes
• 3 deployment options • Works On/ Off Network
• PC’s/ Laptops/ Smartphones
• Critical for today’s Mobile
workforce
• ATI Data Center
• Partner Data Center
• Client Premise
Remote Employees
Employees On the Road
Internet
Each workstation is now protected
ATI/ Partner DC OR
Client Premise
Customer Firewall
Endpoint Solution– Ideal for Mobile Workforce
Smartphone Laptop
Customer Site
Smartphone Laptop Desktop
Easily download and install agents on each workstation
©2016 Awareness Technologies, All Rights Reserved [email protected]
Agents upload data over SSL connections as they are connected to the internet
Customer Site
Employees On the Road
Internet
Customer Firewall
Reporting Dashboard
Endpoint Solution– Ideal for Mobile Workforce
ATI/Partner DC OR
Client Premise
Remote Employees
Smartphone Laptop Desktop
©2016 Awareness Technologies, All Rights Reserved [email protected]
Desktops Laptops
Unified View- For ALL Devices
©2016 Awareness Technologies, All Rights Reserved [email protected]
21
What’s In It For Your Customers?
REDUCES
COMPLEXITY
• 4 technologies
• 1 download
• 1 interface
• 5 minutes
1. Unified Insider Threat Solution Simplifies a complex problem
• 4 technologies in ONE
• Mouse-click deployment
• One Download/ One Interface
2. Deployed at the Endpoint Downloads easily in minutes
Works ON/ OFF network Enables Remote Workforce
Records/ blocks ALL activity
©2016 Awareness Technologies, All Rights Reserved [email protected]
22
What’s In It For You?
REDUCES
COMPLEXITY
• 4 technologies
• 1 download
• 1 interface
• 5 minutes
1. Unique Offerings New and untapped (internal threat) market segment
Differentiate from competition • 4 technologies in one
• Deployed at endpoint
• 2 delivery methods (cloud / on premise)
2. Partner Enablement Branded Control Console & Online Demo
Opportunity to self-host
Online trial / order / support tool
On demand training and marketing tools
MRR & ARR SKUs
Partnership with
©2016 Awareness Technologies, All Rights Reserved [email protected]
23
What’s In It For You?
3. Ideal Sale/Upsale Tool Very easy to try, buy, and install
4 Modules gives partner 4 opportunities to make a sale, then Upsell later • Can be complementary to existing solutions (ideal for remote staff, both WF + DLP)
• Increase per user revenue more than 10x (from WF)
Web Filtering
(per user) Laptop Recovery
(per user)
Data Loss
Prevention
(per user)
PC Activity
(per user) ATI Bundle
(per user)
$
$15
$49
$99 $99
$198
©2016 Awareness Technologies, All Rights Reserved [email protected]
CALL OR EMAIL ME AT:
Brian Lambert
888-550-3130 ext 419 or
203-414-1477 (cell)
www.awarenesstechnologies.com
Partner Program – Join Today
Join the ATI Partner Program Today
©2016 Awareness Technologies, All Rights Reserved [email protected]