Flying spiders, snakes, and ghosts are long gone. The software we use every day is being turned against us, and it’s now the stuff of nightmares.
Known good processes are being hijacked to deliver malware on our systems and ransomware has become one of the most widespread and damaging threats internet users now face. What’s more, these threats are evading traditional defences.
Sleep better at night. Join Sophos pro, Paul Biant as he shows us how Sophos’s Intercept X, EXP and Phish Threat technology can work together to prevent modern cyber-attacks, including crypto ransomware.
2. Endpoint Security
has reached a
Tipping Point
• Attacks are from
within the perimeter,
focused on Software
Exploits
• Ransomware reaches
$1.2B in damages
• Lack of Threat
Intelligence after a
Breach
3. Driving the Paradigm Shift to Next-Generation
3
ADVANCED
MALWARE
ZERO DAY
EXPLOITS
LIMITED
VISIBILITY
4. TRADITIONAL MALWARE ADVANCED THREATS
The Evolution of Sophos Endpoint Security
From Anti-Malware to Anti-Exploit to Next-Generation
Exposure
Prevention
URL Blocking
Web Scripts
Download Rep
Pre-Exec
Analytics
Generic Matching
Heuristics
Core Rules
File
Scanning
Signatures
Known Malware
Malware Bits
Run-Time
Signatureless
Behavior Analytics
Runtime Behavior
Exploit
Detection
Technique
Identification
31. Deployment Options
31
Sophos Endpoint Protection
(Central managed, standard or advanced)
Antivirus and endpoint
solutions from other
vendors
SOPHOS INTERCEPT X
32. Deployment Options
32
Sophos Enterprise Console
(SEC)
Protection Features Only
Anti-Exploit
CryptoGuard
Anti-Ransomware
Clean
SOPHOS ENDPOINT EXPLOIT PREVENTION
(EXP)
33. Deployment Options
33
Sophos Central Server Protection
Advanced
Protection Features Only
• Anti-Ransomware (CryptoGuard )
SOPHOS CRYPTOGUARD FOR SERVER
34. Taking Your Endpoints To The Next-Generation
34
ADVANCED
MALWARE
ZERO DAY
EXPLOITS
LIMITED
VISIBILITY