SlideShare a Scribd company logo
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
DEFENDING AGAINST THREATS
TARGETING THE MAC PLATFORM
PETER INGEBRIGTSEN TECHNICAL MARKETING MANAGER
Continuous Breach Prevention
MANAGED
HUNTING
ENDPOINT DETECTION
AND RESPONSE
NEXT-GEN
ANTIVIRUS
Cloud Delivered
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WHAT WE DO
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MAC IN THE OFFICE
§ 91% of Enterprise
organizations use Mac
§ The growth and adoption of
Macs is growing in 74% of
organizations
§ The BYOD movement is
widening to become a BYO
Platform
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
EMPLOYEE CHOICE
§ 44% of organization offer
choice between a Mac and PC
§ Increased productivity when
employees choose
§ According to IBM’s internal
survey, 73 percent of
employees want a Mac as
their next computer.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
SUPPORTING MAC
63%Say it’s as easy or easier,
in general, to support a
Mac than a PC
58%Say it’s as easy or easier
to configure a Mac than
its counterpart the PC
66%Say it’s as easy or easier
to maintain a secure
environment on the Mac
versus a PC
Managing apple devices in the enterprise report - JAMF report 2016
SECURING THE MAC
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Filling the gaps
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MAC SECURITY IN THE NEWS
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
GROWING THREATS TO MAC
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
50000
2015	
Jan
2015	
March
2015	
June
2015	
Sept.
2016	
Jan
2016	
March
2016	
June
2016	
Sept.
2017	
Jan
2017	
March
Mac File Submissions to VirusTotal
Data collected from VirusTotal Intelligence
CURRENT MAC PROTECTION
Limit Exposure (Gatekeeper)
CURRENT MAC PROTECTION
Built in AV protection (xProtect)
Limit Exposure (Gatekeeper)
CURRENT MAC PROTECTION
Built in AV protection (xProtect)
Unknown, APTs, File-less, Exploits
?
Limit Exposure (Gatekeeper)
WHAT WE DO
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WE STOP BREACHES
FALCON	PLATFORM
THE POWER OF ONE LIGHTWEIGHT	AGENT
API
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
NEXT-GEN	
ANTIVIRUS
IT	
HYGIENE
ENDPOINT	DETECTION	
AND	RESPONSE
THREAT	
INTEL
MANAGED	
HUNTING
THE POWER OF ONE LIGHTWEIGHT AGENT
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
API
INTELOVERWATCHPREVENTDISCOVER INSIGHT
FALCON	PLATFORM
CLOUD-DELIVERED ENDPOINT PROTECTION
FALCON	OVERWATCH
FALCON	INSIGHT
FALCON	DISCOVER
FALCON	PREVENT
FALCON	INTEL
MAC
PROTECTION
WITH
CROWDSTRIKE Limit Exposure
(Gatekeeper)
Built in AV
protection
(xProtect)
Unknown,
APTs, File-less,
Exploits
MAC PREVENTION FEATURES
Block known Bad Machine Learning IOA Behavioral Blocking
• Blacklisting
• Whitelisting
• Import and
protect using
industry IOCs
• Block new and
unknown
threats
• No need to
update
signature files
• Identify
malicious
patterns for
greater threat
visibility
• Identify APTs
• Exploit
prevention
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
SUSPICIOUS PATTERNS
IOA Behavioral Blocking
Indicators of Attack
§ A user is attempting to locally elevate
privileges by modifying a root binary
§ A user's password hash was dumped
§ A command was run that is associated with
Chopper web shell activity
§ Command prompt in subtree beneath a
browser renderer process
MAC PREVENTION FEATURES
Block known Bad Machine Learning IOA Behavioral Blocking OverWatch
• Blacklisting
• Whitelisting
• Import and
protect using
industry IOCs
• Block new and
unknown
threats
• No need to
update
signature files
• Identify
malicious
patterns for
greater threat
visibility
• Identify APTs
• Exploit
prevention
• Expert hunters
constantly
watching your
organization
• Community
Immunity
• Stop the
”mega-breach”
Force Multiplier
Community
Immunity
Reduce Alert Fatigue:
Focus on What Matters
Stop the
“Mega” Breach
MANAGED HUNTING – FALCON
OVERWATCH
BUSINESS VALUE
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FINDING THE ADVERSARY
So You Don’t Have To
24x7
BREACH PREVENTION
SERVICES
Team of Hunters
Working for You
Alert
Prioritize
Hunt
Respond
PREVENTS ALL
TYPES OF ATTACKS
Protect against Known/
Unknown Malware
Protect Against
Zero-Day Attacks
Eliminate Ransomware
No Signature Updates
No User Impact—Less than
1% CPU overhead
BUSINESS VALUE
NEXT-GEN AV – FALCON PREVENT
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Machine
Learning
IOA
Behavioral
Blocking
Block
Known Bad
Overwatch
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Questions?
Please submit all questions in the Q&A chat
right below the presentation slides
Contact Us
Additional Information
Join	Weekly	Demos
crowdstrike.com/productdemos
Upcoming	CrowdCast
Proactive Hunting – April 26th
(Link in Resource List)
Website: crowdstrike.com
Email: info@crowdstrike.com
Number: 1.888.512.8902 (US)

More Related Content

PDF
Cloud-Enabled: The Future of Endpoint Security
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
CrowdCasts Monthly: When Pandas Attack
PDF
Cyber Security Extortion: Defending Against Digital Shakedowns
PDF
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
PDF
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Cloud-Enabled: The Future of Endpoint Security
CrowdCast Monthly: Operationalizing Intelligence
How to Replace Your Legacy Antivirus Solution with CrowdStrike
You Can't Stop The Breach Without Prevention And Detection
CrowdCasts Monthly: When Pandas Attack
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them

What's hot (20)

PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
Bear Hunting: History and Attribution of Russian Intelligence Operations
PDF
CrowdCasts Monthly: You Have an Adversary Problem
PDF
An Inside Look At The WannaCry Ransomware Outbreak
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
PDF
Hacking Exposed Live: Mobile Targeted Threats
PDF
In search of unique behaviour
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PPTX
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
PDF
Battling Unknown Malware with Machine Learning
PPTX
Evolving Cybersecurity Threats
PDF
CrowdCasts Monthly: Mitigating Pass the Hash
PDF
State of Endpoint Security: The Buyers Mindset
PPTX
Cyberextortion
PDF
What Happens Before the Kill Chain
PPTX
DevTalks 2021 Cloud Engineering @Crowdstrike
PDF
OFFENSIVE IDS
PDF
NTXISSACSC4 - The Art of Evading Anti-Virus
PDF
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
PDF
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
CrowdCasts Monthly: Going Beyond the Indicator
Bear Hunting: History and Attribution of Russian Intelligence Operations
CrowdCasts Monthly: You Have an Adversary Problem
An Inside Look At The WannaCry Ransomware Outbreak
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Hacking Exposed Live: Mobile Targeted Threats
In search of unique behaviour
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
Battling Unknown Malware with Machine Learning
Evolving Cybersecurity Threats
CrowdCasts Monthly: Mitigating Pass the Hash
State of Endpoint Security: The Buyers Mindset
Cyberextortion
What Happens Before the Kill Chain
DevTalks 2021 Cloud Engineering @Crowdstrike
OFFENSIVE IDS
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
[CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by C...
Ad

Similar to DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM (20)

PPTX
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
PPTX
Crowdstrike .pptx
PDF
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PPTX
Steve Porter : cloud Computing Security
PPTX
Trend micro v2
PPTX
Lenovo Presentation for Sys Logic Lunch and Learn
PPT
Panda Cloud Services
PPTX
Panda Security Corporate Presentation
PDF
What we Learned from Sunburst with Zero Trust
PDF
Solutions for PCI DSS Compliance
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PPTX
The Cyber Protection Revolution
PDF
PP_Acronis_Cyber_Protection_SAPAS_EN-US_191004.pdf
PPT
Panda Cloud Protection - protectie maxima, costuri reduse
PDF
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
PDF
“8th National Biennial Conference on Medical Informatics 2012”
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Crowdstrike .pptx
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Top 5 Cybersecurity Threats in Retail Industry
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Steve Porter : cloud Computing Security
Trend micro v2
Lenovo Presentation for Sys Logic Lunch and Learn
Panda Cloud Services
Panda Security Corporate Presentation
What we Learned from Sunburst with Zero Trust
Solutions for PCI DSS Compliance
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
The Cyber Protection Revolution
PP_Acronis_Cyber_Protection_SAPAS_EN-US_191004.pdf
Panda Cloud Protection - protectie maxima, costuri reduse
RSA Conference 2011 Presentation: BYOC: Securing Untrusted, Employee-Owned De...
“8th National Biennial Conference on Medical Informatics 2012”
Ad

More from CrowdStrike (8)

PDF
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
PDF
Venom
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family
PDF
TOR... ALL THE THINGS
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family Whitepaper
PDF
TOR... ALL THE THINGS Whitepaper
PDF
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
PDF
Be Social. Use CrowdRE.
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
Venom
End-to-End Analysis of a Domain Generating Algorithm Malware Family
TOR... ALL THE THINGS
End-to-End Analysis of a Domain Generating Algorithm Malware Family Whitepaper
TOR... ALL THE THINGS Whitepaper
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
Be Social. Use CrowdRE.

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Electronic commerce courselecture one. Pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Electronic commerce courselecture one. Pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
sap open course for s4hana steps from ECC to s4
Machine learning based COVID-19 study performance prediction

DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM

  • 1. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM PETER INGEBRIGTSEN TECHNICAL MARKETING MANAGER
  • 2. Continuous Breach Prevention MANAGED HUNTING ENDPOINT DETECTION AND RESPONSE NEXT-GEN ANTIVIRUS Cloud Delivered 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WHAT WE DO
  • 3. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. MAC IN THE OFFICE § 91% of Enterprise organizations use Mac § The growth and adoption of Macs is growing in 74% of organizations § The BYOD movement is widening to become a BYO Platform
  • 4. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. EMPLOYEE CHOICE § 44% of organization offer choice between a Mac and PC § Increased productivity when employees choose § According to IBM’s internal survey, 73 percent of employees want a Mac as their next computer.
  • 5. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. SUPPORTING MAC 63%Say it’s as easy or easier, in general, to support a Mac than a PC 58%Say it’s as easy or easier to configure a Mac than its counterpart the PC 66%Say it’s as easy or easier to maintain a secure environment on the Mac versus a PC Managing apple devices in the enterprise report - JAMF report 2016
  • 6. SECURING THE MAC 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Filling the gaps
  • 7. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. MAC SECURITY IN THE NEWS
  • 8. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. GROWING THREATS TO MAC 0 5000 10000 15000 20000 25000 30000 35000 40000 45000 50000 2015 Jan 2015 March 2015 June 2015 Sept. 2016 Jan 2016 March 2016 June 2016 Sept. 2017 Jan 2017 March Mac File Submissions to VirusTotal Data collected from VirusTotal Intelligence
  • 9. CURRENT MAC PROTECTION Limit Exposure (Gatekeeper)
  • 10. CURRENT MAC PROTECTION Built in AV protection (xProtect) Limit Exposure (Gatekeeper)
  • 11. CURRENT MAC PROTECTION Built in AV protection (xProtect) Unknown, APTs, File-less, Exploits ? Limit Exposure (Gatekeeper)
  • 12. WHAT WE DO 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WE STOP BREACHES
  • 13. FALCON PLATFORM THE POWER OF ONE LIGHTWEIGHT AGENT API 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. NEXT-GEN ANTIVIRUS IT HYGIENE ENDPOINT DETECTION AND RESPONSE THREAT INTEL MANAGED HUNTING
  • 14. THE POWER OF ONE LIGHTWEIGHT AGENT 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. API INTELOVERWATCHPREVENTDISCOVER INSIGHT FALCON PLATFORM CLOUD-DELIVERED ENDPOINT PROTECTION FALCON OVERWATCH FALCON INSIGHT FALCON DISCOVER FALCON PREVENT FALCON INTEL
  • 15. MAC PROTECTION WITH CROWDSTRIKE Limit Exposure (Gatekeeper) Built in AV protection (xProtect) Unknown, APTs, File-less, Exploits
  • 16. MAC PREVENTION FEATURES Block known Bad Machine Learning IOA Behavioral Blocking • Blacklisting • Whitelisting • Import and protect using industry IOCs • Block new and unknown threats • No need to update signature files • Identify malicious patterns for greater threat visibility • Identify APTs • Exploit prevention
  • 17. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. SUSPICIOUS PATTERNS IOA Behavioral Blocking Indicators of Attack § A user is attempting to locally elevate privileges by modifying a root binary § A user's password hash was dumped § A command was run that is associated with Chopper web shell activity § Command prompt in subtree beneath a browser renderer process
  • 18. MAC PREVENTION FEATURES Block known Bad Machine Learning IOA Behavioral Blocking OverWatch • Blacklisting • Whitelisting • Import and protect using industry IOCs • Block new and unknown threats • No need to update signature files • Identify malicious patterns for greater threat visibility • Identify APTs • Exploit prevention • Expert hunters constantly watching your organization • Community Immunity • Stop the ”mega-breach”
  • 19. Force Multiplier Community Immunity Reduce Alert Fatigue: Focus on What Matters Stop the “Mega” Breach MANAGED HUNTING – FALCON OVERWATCH BUSINESS VALUE 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. FINDING THE ADVERSARY So You Don’t Have To 24x7 BREACH PREVENTION SERVICES Team of Hunters Working for You Alert Prioritize Hunt Respond
  • 20. PREVENTS ALL TYPES OF ATTACKS Protect against Known/ Unknown Malware Protect Against Zero-Day Attacks Eliminate Ransomware No Signature Updates No User Impact—Less than 1% CPU overhead BUSINESS VALUE NEXT-GEN AV – FALCON PREVENT 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Machine Learning IOA Behavioral Blocking Block Known Bad Overwatch
  • 21. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Questions? Please submit all questions in the Q&A chat right below the presentation slides Contact Us Additional Information Join Weekly Demos crowdstrike.com/productdemos Upcoming CrowdCast Proactive Hunting – April 26th (Link in Resource List) Website: crowdstrike.com Email: info@crowdstrike.com Number: 1.888.512.8902 (US)