EDR Presentation
Learn about Endpoint Detection and Prevention
Learn about Endpoint Detection and Prevention
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Endpoint<br />
Detection & Response<br />
1.800.264.8851
Changing Threat Landscape<br />
THEN<br />
Easily Recognized<br />
Not Motivated by Money<br />
Required Technical Knowledge to Create and Deploy<br />
Threats Don’t Always Look Like Threats<br />
Ransomware is a $2 Billion/YR Criminal Enterprise<br />
350,000 New Malware Variations Per Day!<br />
NOW
IT’S NOT IF, BUT WHEN<br />
The AME Group 2020<br />
67%<br />
small and medium-sized<br />
businesses (SMB) affected by<br />
a cyberattack<br />
82%<br />
attacks not caught by<br />
traditional AV<br />
70%<br />
paid the ransom at an average<br />
of $1,466 per incident
THE TREAT IS RISING<br />
4%<br />
increase in data breaches<br />
6%<br />
increase in cyberattacks<br />
9%<br />
increase in ransomware<br />
The AME Group 2020
Limitations to Legacy Antivirus<br />
Legacy<br />
AV<br />
Based on signature and static AI to recognize<br />
malicious files BEFORE they run.<br />
Volume of new malware surpassed ability to stay<br />
up-to-date.<br />
Requires Internet connection.<br />
Requires more device resources to scan for<br />
malicious signatures.<br />
Fails often, increasing downtime.
1.800.264.8851<br />
New Threats Require New Solutions<br />
Endpoint Detection and Response
Time for Next Generation AV<br />
Watches processes for BEHAVIOR as they are running.<br />
Ensures a good program doesn’t go bad.<br />
Records changes to endpoint so the actions of the<br />
malicious program can be rolled back.<br />
Looks for malicious code in docs and scripts.<br />
Isolates device when threat detected.<br />
Quarantine and Kills file and process.<br />
Does not require internet connection.<br />
NEXT<br />
Generation<br />
Endpoint<br />
Protection
Active <strong>EDR</strong><br />
real-time protection<br />
for known and<br />
unknown threats<br />
using on-device<br />
AI Algorithms<br />
watches processes as they<br />
run in case they “turn bad”,<br />
then stops / quarantines<br />
and remediates them<br />
protection from<br />
constantly changing<br />
and disguised threats<br />
allows quick<br />
rollback to a known<br />
good state when<br />
an attack occur<br />
rollback includes<br />
restoring files encrypted<br />
by ransomware<br />
The AME Group 2020
WHY UPGRADE<br />
1<br />
REDUCE YOUR RISK<br />
Traditional Anti-Virus Does NOT Work Against Todays Threats<br />
2<br />
CONTROL YOUR ENDPOINT DEVICES<br />
Identify Rogue Devices, Ensure Clean Devices, Segment Devices with Policy<br />
3<br />
SAVE MONEY<br />
Avoid Ransomware Payments, Device Replacement and Repair<br />
4<br />
SAVE TIME<br />
Faster Endpoint Performance, Faster Remediation to Last<br />
Known Good State, Reduce Downtime, Get Back to Work<br />
The AME Group 2020
Cost to Return to Normal<br />
25% of 40 devices = 10 devices<br />
10 Devices x 1 hour to remediate @ $160/hour = $1,600<br />
PLUS $1,466 per device ransom<br />
$16,260<br />
Does not include lost sales, productivity, or employee<br />
salaries<br />
The AME Group 2020