4. Content threats affecting the Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resources saturation e-mails resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time used to browse not job related pages
5. Network Level threats affecting the Organizations Unknown connections Incontrollable number of connections Free access to internal information Security administration time Intrusions Information destruction Loss of Information Software use limitations Unprotected remote connections Unrestricted access to network resources Strangers access to relevant information Time to correct the actions
9. Collective Intelligence Unmatched Security Data Processing Daily Intelligence at Panda Research 4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “ It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections. Cloud-based, collective intelligence services are the next big thing for anti-malware . I expect that every AV vendor will need to embrace an approach like this if they expect to survive” Yankee Group
11. How Does it Work? INTERNET Gateway Network level threats Content based threats Firewall IPS Anti malware Anti spam VPN Attacks through unknown connections Information theft on sending it Unknown attacks Known or unknown Malware Content Filter Potential risks Spam Web Filter Unwished web contents