10.07.2015 Views

Lastline Sales Card - Cloud Distribution

Lastline Sales Card - Cloud Distribution

Lastline Sales Card - Cloud Distribution

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Sales</strong> <strong>Card</strong>A Quick Guide to Selling <strong>Lastline</strong> Inc. SolutionsClarity Crowd InsideWho is <strong>Lastline</strong> Inc.?<strong>Lastline</strong> is the leader in Next Generation Malware Detection andDefence. The <strong>Lastline</strong> founders are also the inventors of Anubis andWepawet technologies, globally used by 1000’s of Enterprises.What does <strong>Lastline</strong> Inc. do?Detects zero-day Malware exploits, targeted attacks, AdvancedPersistent Threats (APTs) and other advanced malware whichroutinely bypass traditional signature based controls & AVsoftware.How does <strong>Lastline</strong> Inc. do this?Only <strong>Lastline</strong> has the technology to see through these evasiontechniques and prevent false negatives. The Previct Anti-MalwareSolution has been designed to be flexible, so that it can easilymatch the vastly different characteristics of large enterprisenetworks.Web Security Protects users from malicious websites in two ways:1) Provides real-time analysis to block inbound web exploitsand outbound command and control traffic.2) Utilizes a database of toxic websites to proactively blocksusers from accessing malicious URLs.Email Security <strong>Lastline</strong> provides security against email-basedattacks. We address blended attacks, zero-day exploits, maliciousURLs and malicious email attachments.Malware Analysis Analyzes every processor instruction (not justsystem calls) providing vastly increased visibility and analytics.Detecting Command & Control <strong>Lastline</strong>’s behaviour graphscull through bogus Internet connections to block command andcontrol communication – even if it is encrypted.Actionable Threat Intelligence The Central Management Systemcorrelates and aggregates alerts into incidents and prioritizes byrelevance and severity. It provides a full set of reports as well as aforensic analysis.Active Threat Discovery Sophisticated cloud-based crawlingpinpoints the location of malware and compiles a global malwarelandscape. It prevents users from accessing malicious websites.Flexible Deployment Scales as the complexity of your networkgrows but without costly hardware upgrades.Legacy solutions ARE failing….Anti-virus systems ALONE are not enough!• Artifacts change their appearance at a fast pace• Signatures and blacklists are insufficient• AV vendors do not see the binary used in targeted attacksFirewalls ALONE are not enough!• Users actively (and unsuspectingly) go out to the attacker• Attackers use port 80Intrusion Detection (IDS / IPS) ALONE are not enough!• Signatures and blacklists only catch known attacks• Limited insight into downloaded artifacts (binaries, spearphishinglinks,) and outbound network activityWhat the market is saying…“Why Antivirus Companies Like Mine Failed to Catch Flame andStuxnet”Chief Security Researcher @ F-Secure“Turning on only the signature-based anti-virus componentsof endpoint solutions alone are not enough in a world that ischanging daily from attacks and threats. We encourage customersto be very aggressive in deploying solutions that offer a combinedapproach to security. Anti-virus software alone is not enough,”William L. Watts – SymantecVertical sector example requirements…Pharmaceutical – Key targets for attackers trying to steal criticaldata (patent pending research) to patient information.Financial Services – This sector is consistently the mostaggressively targeted sector by cyber attackers.Government – This is headline news – Cyber espionage fromorchestrated national campaigns is rapidly on the rise.Energy and Utilities – follow the money – critical data on ongoingoil or gas discovery work through to bids for oil and gas reservesare all being actively targeted.Luxury Goods & Manufacturing - next season’s designs and datais often targeted for duplication and launch in other parts of theworld - the market for replica luxury items is worth billions.The competitors…. (See Page 2)Head Quarters: LondoNorthern Office: Yorksh1. FireEye – High cost, Especially in multi site environments2. Damballa – Focused on Outbound traffic flows3. Palo Alto / Wildfire – Limited capability “Bolt On” feature4. Trend – Deep Discover – See Page 25. Checkpoint – Anti Bot Software Blade – See Page 2Why should I sell <strong>Lastline</strong>?1. High Margin Solution2. Deal Registration – Investment Protection3. Great Price / Performance Vs The Competition4. Subscription Model = Recurring Revenue Model5. Differentiated Per User Pricing Model6. Wrap around existing AV offerings - Symantec, MacAfee,Bluecoat, Websense etc7. Easily deliver managed services utilizing the <strong>Cloud</strong> &per user model8. Highlighted as “Network World’s” - 12 must watchsecurity startups for 20139. Employ 3 of the top 28 h-index security scientists!10. Many of today’s security vendors use tools created by<strong>Lastline</strong> founders, Palo Alto Networks, Fortinet, Cisco,Websense, Bluecoat, Juniper, Symantec, Trend Micro.Customer examples…<strong>Cloud</strong> <strong>Distribution</strong> LtdSouthern Office: Tel: 01635 800410 Email: south@cloud-distribution.comNorthern Office: Tel: 01635 800416 Email: north@cloud-distribution.com


<strong>Sales</strong> <strong>Card</strong>A Quick Guide to Selling <strong>Lastline</strong> Inc. SolutionsClarity Crowd InsideCompetitive MatrixHead Quarters: LondoNorthern Office: AntiVirus YorkshINBOUND: Analysis and prevention of inbound threats (malware, infected objects)+ IDS/IPSKnown malware detection (signatures & heuristics) • • • • • •Dynamic, on-demand analysis of malware programs (sandbox) • • • • •Dynamic analysis of documents with embedded exploits (PDF, Office, …) • • • •Detailed forensics for both malware binaries and web threats (exploits) • •High resolution malware analysis (monitoring execution from the inside)•Support for multiple operating systems (Windows, Android, …) • •Collecting live threats via customer crowdsourcing • • • • • •Collecting live threats via active threat discovery•Flexible malware analysis in the cloud • • • •OUTBOUND: Network visibility, blocking of C&C connections and data leakageContent rules and signatures to block known, mallicious traffic • • • • • •Reputation analysis (URLs, IPs) to block traffic to known bad sites • • • •Identifies anomalous network activity (domain name generation, fast flux) • •Detect and block attack behaviour (spam, DoS) • • • •Abstract malware communication pattern detection (network fingerprints)•AntiVirus+ IDS/IPSConfiguration FlexibilityDeployment OptionsProprietary hardware appliance • • • • • •Virtual appliance (for specific environments) • •Software agent (Software Image on Customer Server)•On Premise (<strong>Lastline</strong> architecture installed in Customer DataCentre) or Hosted (<strong>Lastline</strong> Private <strong>Cloud</strong>) architectures •Supported Network Speed1 Gbps egress • • • • • •10 Gbps egress • • •AntiVirus+ IDS/IPS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!