12.03.2020 Views

EDR Presentation

Learn about Endpoint Detection and Prevention

Learn about Endpoint Detection and Prevention

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Endpoint<br />

Detection & Response<br />

1.800.264.8851


Changing Threat Landscape<br />

THEN<br />

Easily Recognized<br />

Not Motivated by Money<br />

Required Technical Knowledge to Create and Deploy<br />

Threats Don’t Always Look Like Threats<br />

Ransomware is a $2 Billion/YR Criminal Enterprise<br />

350,000 New Malware Variations Per Day!<br />

NOW


IT’S NOT IF, BUT WHEN<br />

The AME Group 2020<br />

67%<br />

small and medium-sized<br />

businesses (SMB) affected by<br />

a cyberattack<br />

82%<br />

attacks not caught by<br />

traditional AV<br />

70%<br />

paid the ransom at an average<br />

of $1,466 per incident


THE TREAT IS RISING<br />

4%<br />

increase in data breaches<br />

6%<br />

increase in cyberattacks<br />

9%<br />

increase in ransomware<br />

The AME Group 2020


Limitations to Legacy Antivirus<br />

Legacy<br />

AV<br />

Based on signature and static AI to recognize<br />

malicious files BEFORE they run.<br />

Volume of new malware surpassed ability to stay<br />

up-to-date.<br />

Requires Internet connection.<br />

Requires more device resources to scan for<br />

malicious signatures.<br />

Fails often, increasing downtime.


1.800.264.8851<br />

New Threats Require New Solutions<br />

Endpoint Detection and Response


Time for Next Generation AV<br />

Watches processes for BEHAVIOR as they are running.<br />

Ensures a good program doesn’t go bad.<br />

Records changes to endpoint so the actions of the<br />

malicious program can be rolled back.<br />

Looks for malicious code in docs and scripts.<br />

Isolates device when threat detected.<br />

Quarantine and Kills file and process.<br />

Does not require internet connection.<br />

NEXT<br />

Generation<br />

Endpoint<br />

Protection


Active <strong>EDR</strong><br />

real-time protection<br />

for known and<br />

unknown threats<br />

using on-device<br />

AI Algorithms<br />

watches processes as they<br />

run in case they “turn bad”,<br />

then stops / quarantines<br />

and remediates them<br />

protection from<br />

constantly changing<br />

and disguised threats<br />

allows quick<br />

rollback to a known<br />

good state when<br />

an attack occur<br />

rollback includes<br />

restoring files encrypted<br />

by ransomware<br />

The AME Group 2020


WHY UPGRADE<br />

1<br />

REDUCE YOUR RISK<br />

Traditional Anti-Virus Does NOT Work Against Todays Threats<br />

2<br />

CONTROL YOUR ENDPOINT DEVICES<br />

Identify Rogue Devices, Ensure Clean Devices, Segment Devices with Policy<br />

3<br />

SAVE MONEY<br />

Avoid Ransomware Payments, Device Replacement and Repair<br />

4<br />

SAVE TIME<br />

Faster Endpoint Performance, Faster Remediation to Last<br />

Known Good State, Reduce Downtime, Get Back to Work<br />

The AME Group 2020


Cost to Return to Normal<br />

25% of 40 devices = 10 devices<br />

10 Devices x 1 hour to remediate @ $160/hour = $1,600<br />

PLUS $1,466 per device ransom<br />

$16,260<br />

Does not include lost sales, productivity, or employee<br />

salaries<br />

The AME Group 2020

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!