SlideShare a Scribd company logo
INTERCEPT X
THE NEXT STEP IN NEXT-GEN
ENDPOINT PROTECTION
Lars Putteneers
Sales Engineer
23/03/2017
1985
FOUNDED
OXFORD, UK
$450M
IN FY15 BILLING
(APPX.)
3,500
EMPLOYEES
(APPX.)
200,000+
CUSTOMERS
100M+
USERS
HQ
OXFORD, UK
90+%
BEST IN CLASS
RENEWAL RATES
15,000+
CHANNEL
PARTNERS
OEM PARTNERS:
KEY DEV
CENTERS
OFFICES
Sophos snapshot
Taking the battle to Ransomware with Sophos Intercept X
WHY
Melissa Virus
1999
$1.2B
Love Letter
Worm
$15B
1998
$2.3B
2007
$800M
2014
Locky
Ransomware
$1.1B
2016
FinFischer
Spyware
2003
$780M
Exploit as a
Service
$500M
2015
Traditional Malware Advanced Threats
The Evolution of Threats
From Malware to Exploits
Traditional Malware Advanced Threats
The Evolution of Security
From Anti-Malware to Anti-Exploit
Exposure
Prevention
URL Blocking
Web/App/Dev Ctrl
Download Rep
Pre-Exec
Analytics
Generic Matching
Heuristics
Core Rules
File
Scanning
Known Malware
Malware Bits
Run-Time
Behavior Analytics
Runtime Behavior
Exploit
Detection
Technique
Identification
80% 15% 5%
We believe
7
•Security must be:
o Simple
o Comprehensive
oEasy to use
o Single console
•You need to have MORE SECURITY with LESS EFFORT
HOW
How we do it?
9
• Own worldwide Threat Research Center
• Firewalls
• Centrally managed endpoint protection
• Sandboxing
• Communication between endpoint & firewall
Heap Spray Use after Free Stack Pivot ROP
Call OS
function
PREPARATION
• Most exploit-based attacks consist of 2 or more exploit techniques
• Exploit techniques do not change and are mandatory to exploit existing and future
software vulnerabilities
Intercepting Exploits
Blocking Exploit Techniques vs Antivirus
TRIGGERING GAIN CONTROL
CIRCUMVENT
(DEP) POST PAYLOAD DROP
Memory
Corruption
/UaF
In-Memory
(Diskless)
On Disk
Ransomware
Activity
!
Sophos Intercept X
Antivirus
WHAT
Endpoint protection
Cloud Endpoint Protection Advanced
13
Introducing
Introducing Sophos Intercept X
ADVANCED
MALWARE
ZERO DAY
EXPLOITS
LIMITED
VISIBILITY
Anti-Exploit
Prevent Exploit Techniques
• Signatureless Exploit Prevention
• Protects Patient-Zero / Zero-Day
• Blocks Memory-Resident Attacks
• Tiny Footprint & Low False Positives
No User/Performance Impact
No File Scanning
No Signatures
Automated Incident Response
• IT Friendly Incident Response
• Process Threat Chain Visualization
• Prescriptive Remediation Guidance
• Advanced Malware Clean
Root-Cause Analysis
Faster Incident Response
Root-Cause Visualization
Forensic Strength Clean
Detect Next-Gen Threats
• Stops Malicious Encryption
• Behavior Based Conviction
• Automatically Reverts Affected Files
• Identifies source of Attack
Anti-Ransomware
Prevent Ransomware Attacks
Roll-Back Changes
Attack Chain Analysis
Intercepting Ransomware
Monitor File Access
• If suspicious file
changes are detected,
file copies are created
Attack Detected
• Malicious process is
stopped and we
investigate the process
history
Rollback Initiated
• Original files restored
• Malicious files removed
Forensic Visibility
• User message
• Admin alert
• Root cause analysis
details available
Root Cause Analytics
Understanding the Who, What, When, Where, Why and How
17
What we do differently
18
• Application Lockdown
• Cryptoguard
• Look at the complete chain/live of a process/application
• Security heartbeat
• Works besides other AV
What we do differently
19
Phishing Exploits Scripts
Bad
Devices
Bad
Apps
Runtime
(.exe)
Office
Docs
Real
Results
DEMO
Future?
Machine Learning:
Pre-execution Malware Prevention & Detection
22
Complete Next-Gen Endpoint Protection
Script-based
Malware
Malicious
URLs
Phishing
Attacks
Removable
Media
.exe
Malware
Non-.exe
Malware
Unauthorized
Apps
Exploits
Invincea pre-execution
malware prevention is highly
scalable, fast, and effective,
especially against zero-day
threats. Invincea’s pioneering
ML technology delivers high
detection rates and very low
FP rates, which is unique.
Effective for run-time
prevention of exploit-based
malware such as ransomware.
Sophos Intercept X thrives with
next-gen exploit prevention
capabilities.
Heuristic detections based on the behaviors of execution to
stop evasive malware before damage occurs.
Knowing the source/reputation of a file, URL, email, etc.
can prevent an attack before it happens. Includes
technologies such as MTD, download reputation, URL
filtering, secure email gateway, etc.
For server or locked-down endpoint
environments, app control prevents
unknown / unwanted apps from running.
The only effective defense against in-memory malware.
The only effective way to set
policy to ensure removable
media cannot put an
organization at risk.
Provides reliable detection of
script, document, and macro
malware, and an efficient first
line of defense against known
executable variants.
Synchronized Security
Sophos Central Mgmt..doc
.xls
.pdf
23
Root Cause Analytics
Questions?
Taking the battle to Ransomware with Sophos Intercept X

More Related Content

PPTX
Intercept X - Sophos Endpoint
PPTX
Discover Synchronized Security - Sophos Day Netherlands
PPTX
This is Next-Gen IT Security - Introducing Intercept X
PPTX
Sophos Next-Generation Enduser Protection
PPTX
The next generation of IT security
PPTX
Sophos Security Day Belgium - The Hidden Gems of Sophos
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Intercept X - Sophos Endpoint
Discover Synchronized Security - Sophos Day Netherlands
This is Next-Gen IT Security - Introducing Intercept X
Sophos Next-Generation Enduser Protection
The next generation of IT security
Sophos Security Day Belgium - The Hidden Gems of Sophos
Security: more important than ever - Sophos Day Belux 2014
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?

What's hot (20)

PPT
Sophos Utm Presentation 2016
PDF
Complete Endpoint protection
PPTX
Thinking Differently About Security Protection and Prevention
PPTX
Cerdant Security State of the Union
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PPTX
PPTX
Make Every Spin Count: Putting the Security Odds in Your Favor
PPTX
Advanced Threat Protection
PDF
Sophos XG Firewall
PPSX
SonicWALL Advanced Features
PPTX
PPT
Safeguard your enterprise against ransomware
PPTX
Advanced Threat Protection - Sandboxing 101
PPTX
Sandbox
PPTX
FireEye Engineering
PDF
Advanced Threat Protection – ultimátní bezpečnostní řešení
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PDF
Advanced Threat Defense Intel Security
PDF
FireEye - Breaches are inevitable, but the outcome is not
PPT
FireEye
Sophos Utm Presentation 2016
Complete Endpoint protection
Thinking Differently About Security Protection and Prevention
Cerdant Security State of the Union
Anatomy of an Attack - Sophos Day Belux 2014
Make Every Spin Count: Putting the Security Odds in Your Favor
Advanced Threat Protection
Sophos XG Firewall
SonicWALL Advanced Features
Safeguard your enterprise against ransomware
Advanced Threat Protection - Sandboxing 101
Sandbox
FireEye Engineering
Advanced Threat Protection – ultimátní bezpečnostní řešení
A Closer Look at Isolation: Hype or Next Gen Security?
Advanced Threat Defense Intel Security
FireEye - Breaches are inevitable, but the outcome is not
FireEye
Ad

Viewers also liked (11)

PPTX
Sophos introduces the Threat Landscape
PDF
Manual Sophos
PPTX
Sophos Cloud advanced
PDF
shah-meet-cloud-certified-engineer[6] copy
PPTX
Sophos Cloud - breaking the stereotypes
PPTX
Sophos End User Protection
PPTX
What's cooking at Sophos - an introduction to Synchronized Security
PPTX
Sophos EndUser Protection
PPTX
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
PDF
Sophos 2010
PPT
Benefits of web application firewalls
Sophos introduces the Threat Landscape
Manual Sophos
Sophos Cloud advanced
shah-meet-cloud-certified-engineer[6] copy
Sophos Cloud - breaking the stereotypes
Sophos End User Protection
What's cooking at Sophos - an introduction to Synchronized Security
Sophos EndUser Protection
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos 2010
Benefits of web application firewalls
Ad

Similar to Taking the battle to Ransomware with Sophos Intercept X (20)

PDF
SolPartner_InterceptX.pdf
PDF
Bescherm jezelf tegen ransomware
PDF
Sophos intercept-x
PPTX
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
PPTX
Raging Ransomware Roadshow May
PPTX
The Best Just Got Better, Intercept X Now With EDR
PPTX
Defending the Endpoint with Next-Gen Security
PPTX
Consider Sophos - Security Made Simple
PPTX
LSI Spring Agent Open House 2014
PDF
sophos-intercept-x-license-guide.pdf
PDF
Protecting Against Ransomware
PPT
dataProtection_p3.ppt
PDF
Symantec Endpoint Protection Presentation Slide
PDF
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
PPTX
This is Next-Gen
PDF
sophos-ep-vs-bitdefender.pdf
PPT
Symantec_2-4-5 nov 2010
PPTX
SYMANTEC ENDPOINT PROTECTION Administration Introduction
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
SolPartner_InterceptX.pdf
Bescherm jezelf tegen ransomware
Sophos intercept-x
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
Raging Ransomware Roadshow May
The Best Just Got Better, Intercept X Now With EDR
Defending the Endpoint with Next-Gen Security
Consider Sophos - Security Made Simple
LSI Spring Agent Open House 2014
sophos-intercept-x-license-guide.pdf
Protecting Against Ransomware
dataProtection_p3.ppt
Symantec Endpoint Protection Presentation Slide
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
This is Next-Gen
sophos-ep-vs-bitdefender.pdf
Symantec_2-4-5 nov 2010
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...

More from Sophos Benelux (12)

PDF
Sophos Day Belgium - The IT Threat Landscape and what to look out for
PDF
IT Security landscape and the latest threats and trends
PPTX
How to stay protected against ransomware
PPTX
Hacking Mobile Apps
PPTX
SDN - a new security paradigm?
PPTX
Balabit - Shell Control Box
PPTX
The EU Data Protection Regulation and what it means for your organization
PPTX
Prevent million dollar fines - preparing for the EU General Data Regulation
PPTX
Case Study Diagnostiek voor U
PPTX
Introduction Sophos Day Netherlands
PPTX
The EU Data Protection Regulation - what you need to know
PPTX
Securing with Sophos - Sophos Day Belux 2014
Sophos Day Belgium - The IT Threat Landscape and what to look out for
IT Security landscape and the latest threats and trends
How to stay protected against ransomware
Hacking Mobile Apps
SDN - a new security paradigm?
Balabit - Shell Control Box
The EU Data Protection Regulation and what it means for your organization
Prevent million dollar fines - preparing for the EU General Data Regulation
Case Study Diagnostiek voor U
Introduction Sophos Day Netherlands
The EU Data Protection Regulation - what you need to know
Securing with Sophos - Sophos Day Belux 2014

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharma ospi slides which help in ospi learning
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
O7-L3 Supply Chain Operations - ICLT Program
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cell Structure & Organelles in detailed.
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
Week 4 Term 3 Study Techniques revisited.pptx
Renaissance Architecture: A Journey from Faith to Humanism

Taking the battle to Ransomware with Sophos Intercept X

  • 1. INTERCEPT X THE NEXT STEP IN NEXT-GEN ENDPOINT PROTECTION Lars Putteneers Sales Engineer 23/03/2017
  • 2. 1985 FOUNDED OXFORD, UK $450M IN FY15 BILLING (APPX.) 3,500 EMPLOYEES (APPX.) 200,000+ CUSTOMERS 100M+ USERS HQ OXFORD, UK 90+% BEST IN CLASS RENEWAL RATES 15,000+ CHANNEL PARTNERS OEM PARTNERS: KEY DEV CENTERS OFFICES Sophos snapshot
  • 4. WHY
  • 5. Melissa Virus 1999 $1.2B Love Letter Worm $15B 1998 $2.3B 2007 $800M 2014 Locky Ransomware $1.1B 2016 FinFischer Spyware 2003 $780M Exploit as a Service $500M 2015 Traditional Malware Advanced Threats The Evolution of Threats From Malware to Exploits
  • 6. Traditional Malware Advanced Threats The Evolution of Security From Anti-Malware to Anti-Exploit Exposure Prevention URL Blocking Web/App/Dev Ctrl Download Rep Pre-Exec Analytics Generic Matching Heuristics Core Rules File Scanning Known Malware Malware Bits Run-Time Behavior Analytics Runtime Behavior Exploit Detection Technique Identification 80% 15% 5%
  • 7. We believe 7 •Security must be: o Simple o Comprehensive oEasy to use o Single console •You need to have MORE SECURITY with LESS EFFORT
  • 8. HOW
  • 9. How we do it? 9 • Own worldwide Threat Research Center • Firewalls • Centrally managed endpoint protection • Sandboxing • Communication between endpoint & firewall
  • 10. Heap Spray Use after Free Stack Pivot ROP Call OS function PREPARATION • Most exploit-based attacks consist of 2 or more exploit techniques • Exploit techniques do not change and are mandatory to exploit existing and future software vulnerabilities Intercepting Exploits Blocking Exploit Techniques vs Antivirus TRIGGERING GAIN CONTROL CIRCUMVENT (DEP) POST PAYLOAD DROP Memory Corruption /UaF In-Memory (Diskless) On Disk Ransomware Activity ! Sophos Intercept X Antivirus
  • 11. WHAT
  • 15. Introducing Sophos Intercept X ADVANCED MALWARE ZERO DAY EXPLOITS LIMITED VISIBILITY Anti-Exploit Prevent Exploit Techniques • Signatureless Exploit Prevention • Protects Patient-Zero / Zero-Day • Blocks Memory-Resident Attacks • Tiny Footprint & Low False Positives No User/Performance Impact No File Scanning No Signatures Automated Incident Response • IT Friendly Incident Response • Process Threat Chain Visualization • Prescriptive Remediation Guidance • Advanced Malware Clean Root-Cause Analysis Faster Incident Response Root-Cause Visualization Forensic Strength Clean Detect Next-Gen Threats • Stops Malicious Encryption • Behavior Based Conviction • Automatically Reverts Affected Files • Identifies source of Attack Anti-Ransomware Prevent Ransomware Attacks Roll-Back Changes Attack Chain Analysis
  • 16. Intercepting Ransomware Monitor File Access • If suspicious file changes are detected, file copies are created Attack Detected • Malicious process is stopped and we investigate the process history Rollback Initiated • Original files restored • Malicious files removed Forensic Visibility • User message • Admin alert • Root cause analysis details available
  • 17. Root Cause Analytics Understanding the Who, What, When, Where, Why and How 17
  • 18. What we do differently 18 • Application Lockdown • Cryptoguard • Look at the complete chain/live of a process/application • Security heartbeat • Works besides other AV
  • 19. What we do differently 19 Phishing Exploits Scripts Bad Devices Bad Apps Runtime (.exe) Office Docs Real Results
  • 20. DEMO
  • 22. Machine Learning: Pre-execution Malware Prevention & Detection 22
  • 23. Complete Next-Gen Endpoint Protection Script-based Malware Malicious URLs Phishing Attacks Removable Media .exe Malware Non-.exe Malware Unauthorized Apps Exploits Invincea pre-execution malware prevention is highly scalable, fast, and effective, especially against zero-day threats. Invincea’s pioneering ML technology delivers high detection rates and very low FP rates, which is unique. Effective for run-time prevention of exploit-based malware such as ransomware. Sophos Intercept X thrives with next-gen exploit prevention capabilities. Heuristic detections based on the behaviors of execution to stop evasive malware before damage occurs. Knowing the source/reputation of a file, URL, email, etc. can prevent an attack before it happens. Includes technologies such as MTD, download reputation, URL filtering, secure email gateway, etc. For server or locked-down endpoint environments, app control prevents unknown / unwanted apps from running. The only effective defense against in-memory malware. The only effective way to set policy to ensure removable media cannot put an organization at risk. Provides reliable detection of script, document, and macro malware, and an efficient first line of defense against known executable variants. Synchronized Security Sophos Central Mgmt..doc .xls .pdf 23 Root Cause Analytics

Editor's Notes

  • #6: Anti-M Better, so threats more adv, coord Virus/Sigs, Poly/Heuristics – Sandbox/Sleep Malware to Hacking Spray/Pray focus payload Creds/Remote Access – focus approach
  • #7: Like threats, security had to evolve File scan, Heuristics, Limit Surface (Prevent) Good, but reactive, focus history, known, defense Move to proactive, unk, offense Why? The move to hacking What if legit creds, apps, systems…
  • #11: Stopping the attack pre-execution of the malicious payload.
  • #17: Monitor for distinct changes in the file headers