The True Cost of Anti-Virus:  How to Ensure More Effective and Efficient Endpoint Security
Today’s Speakers Chris Merritt Director of Solution Marketing Lumension Paul Henry Security & Forensics Analyst MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE SANS Institute Instructor
Today’s Agenda Decreasing Effectiveness of Anti-Virus Cost Impact of Ineffective Anti-Virus In-Depth View of Application Whitelisting Q&A
Decreasing Effectiveness of Anti-Virus
Malware By The Numbers in 2010 1/3 of all malware ever recorded historically were produced One vendor found 60,000,000 malicious files out of 134,000,000 unique files submitted (~45%) The average number of unique new malware instances / threats increased by 63,000 per day 52% of new malware exists for only 24 hours Gone before a signature is ever created? An astounding 53% of computers with current AV signatures experienced a malware infection
Malware Detection Rates Day 1 Source: Cyveillance,  Malware Detection Rates for Leading AV Solutions  (August 2010) AVERAGE detection rate upon initial discovery =  19%
Source: Cyveillance,  Malware Detection Rates for Leading AV Solutions  (August 2010) AVERAGE detection rate after 30 days =  62% Malware Detection Rates Day 30
AV - Nothing Innovative Here “ Current generation” AV is using Heuristics and Reputations to bolster signatures Heuristics have been around for over a decade and have not worked Reputation lasts only as long as the DHCP lease on the IP address Change the address and get a new reputation Better yet just spoof an IP address with a good reputation AV vendors are moving the signatures to the Cloud to solve the problem… This doesn’t solve anything. It simply moves the issue. The age old problem remains: you can’t keep up with the bad guys…..
Stuck in a Never-Ending Cycle Vulnerability discovered Hacker writes exploit Someone infected provides sample to AV company AV company creates signature and distributes to community Hacker changes a few bytes so signature no longer matches Go to step 3 and repeat
Anyway You Look At It – It’s Ugly
Fake AV Is Overtaking Real AV There are about 1,500 new / unique instances of Fake AV per day AV detection of Fake AV is less then 20% There are an estimated 500,000 unique Fake AV binaries on the Internet today http://www.techjaws.com/fake-antivirus-outpaces-real-antivirus/ Fake AV companies are making more money than security vendors http://www.infosecurity-us.com/view/16010/rsa-fake-av-companies-making-more-money-than-security-vendors/
Hard To Tell Fake AV From Real AV
Cost Impact of Ineffective Anti-Virus
Your Endpoint TCO Reality 2007: 250K Monthly Malware Signatures Identified 2011:  2M Monthly  Malware Signatures Identified Malware Signatures Endpoint TCO Current Endpoint Security Effectiveness Increasing malware Costly point technologies Fractured visibility
True Cost of Malware Acquisition Costs Licensing (license cost, maintenance, support) Installation (HW / SW, roll-out, other) Operational Costs System Managemenet Incident Management (help desk, escalation, re-imaging) Lost Productivity Extraordinary Costs Data Breach Operational (60~80%) Acquistion (20~40%)
True Cost of Malware * Trend Micro ** ICSA *** Hobson & Company **** Ponemon Institute ***** Unsecured Economies Report Malware Cost Framework Malware  Cost Variables Malware  Cost Information Security Infrastructure Cost of AV license Hardware overhead costs Maintenance and upgrade costs Cost of endpoint security management staff 20 hrs/wk avg. time to manage endpoint security*** Licensing represents 20% of the TCO for endpoint security software*** Average cost of network infrastructure engineer / IT security escalation team = $82K Malware Remediation Help desk costs related to malware IT staff cost related to malware Cost for an IT manager to be informed of/take action/virus incident $500* Cost for one workstation to be stopped, scanned, and cleaned of virus $1000* Cost for one workstation to detect and clean a virus infection $100* Average no. attempts at cracking network by hacker is 2x month* Average cost of security related help desk call: $18.75*** Lost Productivity Network downtime Workstation unavailable Median server downtime due to malware 21 hrs** 15 min/user/wk in average lost downtime due to scanning*** Average company has one incident affecting 10 users with downtime of 6 hours due to malware*** Data Loss Loss of sensitive data  Cost of lost data records Cost of remediation Litigation/compliance fine risk Loss customers Average organizational cost of a data breach is $7.2M**** Average cost of data record lost $214**** 20% loss of customer after a publicly disclosed data breach*****
A Look at Application Whitelisting
A New Approach Is Needed With traditional AV Reputations and Heuristics did not work before and no signs point to them magically working now No one can dispute that whitelisting is a better approach in the current environment You’re already using a whitelist What people argue about is how it is implemented Automating whitelisting with a Trust Model is key Today’s Trust Models give a real edge to Whitelisting  Now that is something new and innovative
 
How Application Control Security Works Anti-Virus Blacklist Application Control Whitelist Malware Signatures 30 Million and growing @ xxx / Month DLoader.AMHZW \ Exploit_Gen.HOW  \  Hacktool.KDY \ INF/AutoRun.HK \ JS/BomOrkut.A \  JS/Exploit.GX \ JS/FakeCodec.B \ JS/Iframe.BZ \  JS/Redirector.AH \ KillAV.MPK \ LNK/CplLnk.K Hash of Approved Application As defined by IT Security Word.exe \ Excel.exe \ Winnet.dll \ Mozilla.exe Run as a  Service CPU Usage:  Intensive Reactive  Ineffective  on: Zero Day, Polymorphic  Run in the  Kernel CPU Usage:  Low Proactive Effective  for: Zero day, Polymorphic 95% 13%
Impact of AV and Application Control Antivirus Blacklist Application Control Whitelist Unwanted Software  (iTunes, Games, IM, etc.) Not supported Only trusted, authorized applications are permitted Updates Weekly, daily, hourly Automated by trust engine Zero Day Protection New malware is always one step ahead Implicit Operational Performance File filter slows system down  Huge pattern file comparison Kernel based (=fast), no pattern comparison required Scalability Today (avg): 3,666,872 sigs. Tomorrow? Next Year? Average PC has 66 applications with ~25,000 executables
Don’t Just Listen To Us – Listen To Them! Antivirus, firewalls and intrusion detection are a start… But "whitelisting" offers a stronger defense. … McAfee believes "that's where the future is going.” -- George Kurtz, Worldwide CTO, McAfee “ Effective threat prevention today requires a more proactive combination of approaches that take various infection vectors into consideration.” -- Raimund Genes, CTO, Trend Micro Inc. “ [Signatures are] completely ineffective as the only layer [of endpoint security], but as one of the layers, [they're] effective.” -- Nikolay Grebennikov, CTO, Kaspersky
Lumension ® Intelligent Whitelisting™ Discover Snapshot endpoints to identify and catalog all executables currently running on individual endpoints Define Define policies that automate trust decisions for endpoint applications Enforce Adjust and transition endpoints to final lockdown policy Clean Eliminate known malware from production endpoints  Manage Reporting and Integrated systems management to update patches, configurations and deploy software Monitor Log all execution attempts and introduced changes  to  assess policy completeness and impact to current IT environment
Defense-in-Depth Endpoint Security Known Malware Unknown Malware Unwanted, Unlicensed, Unsupported Applications Application Vulnerabilities Configuration Vulnerabilities AntiVirus X X Application Control X X Patch & Remediation X X Security Configuration Management X
Intelligent Whitelisting Value Proposition Malware Signatures Malware Related Costs More Effective Endpoint Security ROI of Intelligent Whitelisting 2011: Introducing  Intelligent Whitelisting™
Next Steps Overview of  Lumension ® Intelligent Whitelisting™  http://www.lumension.com/Resources/Demo-Center/Overview-Endpoint-Protection.aspx Application Scanner Tool http://www.lumension.com/Resources/Security-Tools/Application-Scanner-Tool-2-0.aspx   Whitepapers Think Your Anti-Virus Software is Working? Think Again. http://www.lumension.com/Resources/WhitePapers/Think-Your-AntiVirus-Software-Is-Working-Think-Again.aspx Intelligent Whitelisting: An Introduction to More Effective and Efficient Security http://www.lumension.com/Resources/Whitepapers/Intelligent-Whitelisting-An-Introduction-to-More-Effective-and-Efficient-Endpoint-Security.aspx
Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 [email_address]

More Related Content

PPTX
Cyber Security protection by MultiPoint Ltd.
PDF
Impacts cloud remote_workforce
PPT
Damballa automated breach defense june 2014
PDF
Bitdefender - Solution Paper - Active Threat Control
PPTX
SAM05_Barber PW (7-9-15)
PDF
Defense Innovation Summit
PPTX
Software Vulnerability management
PDF
EndpointSecurityConcerns2014
Cyber Security protection by MultiPoint Ltd.
Impacts cloud remote_workforce
Damballa automated breach defense june 2014
Bitdefender - Solution Paper - Active Threat Control
SAM05_Barber PW (7-9-15)
Defense Innovation Summit
Software Vulnerability management
EndpointSecurityConcerns2014

What's hot (20)

PPTX
Crack the Code
PDF
Vulnerability Management Program
PDF
2 factor authentication beyond password : enforce advanced security with au...
PPTX
Top Application Security Trends of 2012
PDF
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
PDF
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
PDF
Next Dimension and Cisco | Solutions for PIPEDA Compliance
PPTX
DamballaOverview
PDF
Information security
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
PDF
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
PDF
Ransomware attacks
PDF
IBM X-Force Threat Intelligence Quarterly Q4 2015
PPTX
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
PDF
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
PDF
AI for Ransomware Detection & Prevention Insights from Patents
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Crack the Code
Vulnerability Management Program
2 factor authentication beyond password : enforce advanced security with au...
Top Application Security Trends of 2012
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
DamballaOverview
Information security
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Ransomware attacks
IBM X-Force Threat Intelligence Quarterly Q4 2015
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
AI for Ransomware Detection & Prevention Insights from Patents
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Ad

Viewers also liked (17)

PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPT
Paladin Group interview questions and answers
PDF
youth culture in film - Analysing film in educational research
PPTX
What is a virus and anti virus
PPT
11 virus vs. antivirus
PDF
Internet basics
PPTX
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
ODP
Computer virus
PPTX
PPTX
Powerpoint presentation on internet and its uses
PPTX
The Internet
PPT
Internet
PPT
Internet ppt
PPTX
advantages and disadvantages of internet
PPTX
Ppt on internet
KEY
Hacker- und Internetkultur
PPT
Interactive storytelling
ANTIVIRUS AND VIRUS Powerpoint presentation
Paladin Group interview questions and answers
youth culture in film - Analysing film in educational research
What is a virus and anti virus
11 virus vs. antivirus
Internet basics
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
Computer virus
Powerpoint presentation on internet and its uses
The Internet
Internet
Internet ppt
advantages and disadvantages of internet
Ppt on internet
Hacker- und Internetkultur
Interactive storytelling
Ad

Similar to The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endpoint Security (20)

PPT
It's Your Move: The Changing Game of Endpoint Security
PPTX
Application Whitelisting - Complementing Threat centric with Trust centric se...
PDF
Bypassing Antivirus for effective security
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
PPTX
Tech Throwdown: Secure Containerization vs Whitelisting
PPT
How to improve endpoint security on a SMB budget
PPTX
Securing data flow to and from organizations
PPT
Paul Henry’s 2011 Malware Trends
PPTX
Countering malware threats - Eric Vanderburg
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPT
Symantec_2-4-5 nov 2010
PDF
Failure Of Antivirus
PDF
Complete Endpoint protection
PDF
Índice de software sin licencia en el mundo.
PPT
The Role of Application Control in a Zero-Day Reality
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
PDF
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPTX
It's Time to Rethink Your Endpoint Strategy
PPT
Building & Leveraging White Database for Antivirus Testing
It's Your Move: The Changing Game of Endpoint Security
Application Whitelisting - Complementing Threat centric with Trust centric se...
Bypassing Antivirus for effective security
Key Strategies to Address Rising Application Risk in Your Enterprise
Tech Throwdown: Secure Containerization vs Whitelisting
How to improve endpoint security on a SMB budget
Securing data flow to and from organizations
Paul Henry’s 2011 Malware Trends
Countering malware threats - Eric Vanderburg
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Symantec_2-4-5 nov 2010
Failure Of Antivirus
Complete Endpoint protection
Índice de software sin licencia en el mundo.
The Role of Application Control in a Zero-Day Reality
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
3 Enablers of Successful Cyber Attacks and How to Thwart Them
It's Time to Rethink Your Endpoint Strategy
Building & Leveraging White Database for Antivirus Testing

More from Lumension (20)

PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
PPTX
2015 Endpoint and Mobile Security Buyers Guide
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
PPTX
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
PPTX
Careto: Unmasking a New Level in APT-ware
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
PPTX
2014 Data Protection Maturity Survey: Results and Analysis
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
PPTX
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
PPTX
Adobe Hacked Again: What Does It Mean for You?
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
PPTX
APTs: The State of Server Side Risk and Steps to Minimize Risk
PPTX
2014 Ultimate Buyers Guide to Endpoint Security Solutions
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
PPTX
Java Insecurity: How to Deal with the Constant Vulnerabilities
PPTX
BYOD & Mobile Security: How to Respond to the Security Risks
PPTX
3 Executive Strategies to Reduce Your IT Risk
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
2015 Endpoint and Mobile Security Buyers Guide
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
2014 BYOD and Mobile Security Survey Preliminary Results
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Careto: Unmasking a New Level in APT-ware
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Data Protection Maturity Survey: Results and Analysis
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Adobe Hacked Again: What Does It Mean for You?
Real World Defense Strategies for Targeted Endpoint Threats
APTs: The State of Server Side Risk and Steps to Minimize Risk
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Data Protection Rules are Changing: What Can You Do to Prepare?
Java Insecurity: How to Deal with the Constant Vulnerabilities
BYOD & Mobile Security: How to Respond to the Security Risks
3 Executive Strategies to Reduce Your IT Risk
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...

Recently uploaded (20)

PPTX
Module 1 Introduction to Web Programming .pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
CloudStack 4.21: First Look Webinar slides
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
STKI Israel Market Study 2025 version august
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Comparative analysis of machine learning models for fake news detection in so...
Module 1 Introduction to Web Programming .pptx
4 layer Arch & Reference Arch of IoT.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
sustainability-14-14877-v2.pddhzftheheeeee
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Early detection and classification of bone marrow changes in lumbar vertebrae...
sbt 2.0: go big (Scala Days 2025 edition)
CloudStack 4.21: First Look Webinar slides
OpenACC and Open Hackathons Monthly Highlights July 2025
Improvisation in detection of pomegranate leaf disease using transfer learni...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
NewMind AI Weekly Chronicles – August ’25 Week IV
STKI Israel Market Study 2025 version august
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Flame analysis and combustion estimation using large language and vision assi...
Comparative analysis of machine learning models for fake news detection in so...

The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endpoint Security

  • 1. The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endpoint Security
  • 2. Today’s Speakers Chris Merritt Director of Solution Marketing Lumension Paul Henry Security & Forensics Analyst MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI, CCE SANS Institute Instructor
  • 3. Today’s Agenda Decreasing Effectiveness of Anti-Virus Cost Impact of Ineffective Anti-Virus In-Depth View of Application Whitelisting Q&A
  • 5. Malware By The Numbers in 2010 1/3 of all malware ever recorded historically were produced One vendor found 60,000,000 malicious files out of 134,000,000 unique files submitted (~45%) The average number of unique new malware instances / threats increased by 63,000 per day 52% of new malware exists for only 24 hours Gone before a signature is ever created? An astounding 53% of computers with current AV signatures experienced a malware infection
  • 6. Malware Detection Rates Day 1 Source: Cyveillance, Malware Detection Rates for Leading AV Solutions (August 2010) AVERAGE detection rate upon initial discovery = 19%
  • 7. Source: Cyveillance, Malware Detection Rates for Leading AV Solutions (August 2010) AVERAGE detection rate after 30 days = 62% Malware Detection Rates Day 30
  • 8. AV - Nothing Innovative Here “ Current generation” AV is using Heuristics and Reputations to bolster signatures Heuristics have been around for over a decade and have not worked Reputation lasts only as long as the DHCP lease on the IP address Change the address and get a new reputation Better yet just spoof an IP address with a good reputation AV vendors are moving the signatures to the Cloud to solve the problem… This doesn’t solve anything. It simply moves the issue. The age old problem remains: you can’t keep up with the bad guys…..
  • 9. Stuck in a Never-Ending Cycle Vulnerability discovered Hacker writes exploit Someone infected provides sample to AV company AV company creates signature and distributes to community Hacker changes a few bytes so signature no longer matches Go to step 3 and repeat
  • 10. Anyway You Look At It – It’s Ugly
  • 11. Fake AV Is Overtaking Real AV There are about 1,500 new / unique instances of Fake AV per day AV detection of Fake AV is less then 20% There are an estimated 500,000 unique Fake AV binaries on the Internet today http://www.techjaws.com/fake-antivirus-outpaces-real-antivirus/ Fake AV companies are making more money than security vendors http://www.infosecurity-us.com/view/16010/rsa-fake-av-companies-making-more-money-than-security-vendors/
  • 12. Hard To Tell Fake AV From Real AV
  • 13. Cost Impact of Ineffective Anti-Virus
  • 14. Your Endpoint TCO Reality 2007: 250K Monthly Malware Signatures Identified 2011: 2M Monthly Malware Signatures Identified Malware Signatures Endpoint TCO Current Endpoint Security Effectiveness Increasing malware Costly point technologies Fractured visibility
  • 15. True Cost of Malware Acquisition Costs Licensing (license cost, maintenance, support) Installation (HW / SW, roll-out, other) Operational Costs System Managemenet Incident Management (help desk, escalation, re-imaging) Lost Productivity Extraordinary Costs Data Breach Operational (60~80%) Acquistion (20~40%)
  • 16. True Cost of Malware * Trend Micro ** ICSA *** Hobson & Company **** Ponemon Institute ***** Unsecured Economies Report Malware Cost Framework Malware Cost Variables Malware Cost Information Security Infrastructure Cost of AV license Hardware overhead costs Maintenance and upgrade costs Cost of endpoint security management staff 20 hrs/wk avg. time to manage endpoint security*** Licensing represents 20% of the TCO for endpoint security software*** Average cost of network infrastructure engineer / IT security escalation team = $82K Malware Remediation Help desk costs related to malware IT staff cost related to malware Cost for an IT manager to be informed of/take action/virus incident $500* Cost for one workstation to be stopped, scanned, and cleaned of virus $1000* Cost for one workstation to detect and clean a virus infection $100* Average no. attempts at cracking network by hacker is 2x month* Average cost of security related help desk call: $18.75*** Lost Productivity Network downtime Workstation unavailable Median server downtime due to malware 21 hrs** 15 min/user/wk in average lost downtime due to scanning*** Average company has one incident affecting 10 users with downtime of 6 hours due to malware*** Data Loss Loss of sensitive data Cost of lost data records Cost of remediation Litigation/compliance fine risk Loss customers Average organizational cost of a data breach is $7.2M**** Average cost of data record lost $214**** 20% loss of customer after a publicly disclosed data breach*****
  • 17. A Look at Application Whitelisting
  • 18. A New Approach Is Needed With traditional AV Reputations and Heuristics did not work before and no signs point to them magically working now No one can dispute that whitelisting is a better approach in the current environment You’re already using a whitelist What people argue about is how it is implemented Automating whitelisting with a Trust Model is key Today’s Trust Models give a real edge to Whitelisting Now that is something new and innovative
  • 19.  
  • 20. How Application Control Security Works Anti-Virus Blacklist Application Control Whitelist Malware Signatures 30 Million and growing @ xxx / Month DLoader.AMHZW \ Exploit_Gen.HOW \ Hacktool.KDY \ INF/AutoRun.HK \ JS/BomOrkut.A \ JS/Exploit.GX \ JS/FakeCodec.B \ JS/Iframe.BZ \ JS/Redirector.AH \ KillAV.MPK \ LNK/CplLnk.K Hash of Approved Application As defined by IT Security Word.exe \ Excel.exe \ Winnet.dll \ Mozilla.exe Run as a Service CPU Usage: Intensive Reactive Ineffective on: Zero Day, Polymorphic Run in the Kernel CPU Usage: Low Proactive Effective for: Zero day, Polymorphic 95% 13%
  • 21. Impact of AV and Application Control Antivirus Blacklist Application Control Whitelist Unwanted Software (iTunes, Games, IM, etc.) Not supported Only trusted, authorized applications are permitted Updates Weekly, daily, hourly Automated by trust engine Zero Day Protection New malware is always one step ahead Implicit Operational Performance File filter slows system down Huge pattern file comparison Kernel based (=fast), no pattern comparison required Scalability Today (avg): 3,666,872 sigs. Tomorrow? Next Year? Average PC has 66 applications with ~25,000 executables
  • 22. Don’t Just Listen To Us – Listen To Them! Antivirus, firewalls and intrusion detection are a start… But "whitelisting" offers a stronger defense. … McAfee believes "that's where the future is going.” -- George Kurtz, Worldwide CTO, McAfee “ Effective threat prevention today requires a more proactive combination of approaches that take various infection vectors into consideration.” -- Raimund Genes, CTO, Trend Micro Inc. “ [Signatures are] completely ineffective as the only layer [of endpoint security], but as one of the layers, [they're] effective.” -- Nikolay Grebennikov, CTO, Kaspersky
  • 23. Lumension ® Intelligent Whitelisting™ Discover Snapshot endpoints to identify and catalog all executables currently running on individual endpoints Define Define policies that automate trust decisions for endpoint applications Enforce Adjust and transition endpoints to final lockdown policy Clean Eliminate known malware from production endpoints Manage Reporting and Integrated systems management to update patches, configurations and deploy software Monitor Log all execution attempts and introduced changes to assess policy completeness and impact to current IT environment
  • 24. Defense-in-Depth Endpoint Security Known Malware Unknown Malware Unwanted, Unlicensed, Unsupported Applications Application Vulnerabilities Configuration Vulnerabilities AntiVirus X X Application Control X X Patch & Remediation X X Security Configuration Management X
  • 25. Intelligent Whitelisting Value Proposition Malware Signatures Malware Related Costs More Effective Endpoint Security ROI of Intelligent Whitelisting 2011: Introducing Intelligent Whitelisting™
  • 26. Next Steps Overview of Lumension ® Intelligent Whitelisting™ http://www.lumension.com/Resources/Demo-Center/Overview-Endpoint-Protection.aspx Application Scanner Tool http://www.lumension.com/Resources/Security-Tools/Application-Scanner-Tool-2-0.aspx Whitepapers Think Your Anti-Virus Software is Working? Think Again. http://www.lumension.com/Resources/WhitePapers/Think-Your-AntiVirus-Software-Is-Working-Think-Again.aspx Intelligent Whitelisting: An Introduction to More Effective and Efficient Security http://www.lumension.com/Resources/Whitepapers/Intelligent-Whitelisting-An-Introduction-to-More-Effective-and-Efficient-Endpoint-Security.aspx
  • 27. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 [email_address]

Editor's Notes

  • #4: © Copyright 2008 - Lumension Security