Título de portada NIVEL 2 and Panda Security

Collaboration between Deloitte and Panda Security 3 What is Ransomware? 1,445,000 Ransomware is a type of malicious IT programme that restricts access to certain


Texto en PDF


Anti-Ransomware services
and Panda Security
Título de portada NIVEL 1
Título de portada NIVEL 2
Subtítulo de portada NIVEL 1 (Fechas)
Subtítulo de portada NIVEL 2
2
Content
What is Ransomware?03
Trends and evolution 05
Our goal 07
Technology 08
Endpoint Adaptive Defense deployment09
Immediate response: Cyber Incident Response10
Collaboration between Deloitte and Panda Security
3
What is Ransomware?
1,445,000
Ransomware is a type of malicious IT
programme that restricts access to certain
parts or �les of the infected system, and
requests a ransom in exchange for their
release. Some types of ransomware
encrypt �les in the operating system,
rendering the device unusable and
coercing the user to pay the ransom.
Exponential growth
This became popular in Russia and its use
has become more and more widespread
internationally. In recent months we have
experienced massive and worrying attacks
such as Wannacry and Petya.
In 2016, more than 1,445,000
users (including companies) across
the world became victims of this
type of malware.
4
Trends and
evolution
Before, Ransomware was mainly focused
on the domestic sphere. After evolving to
the encryption of disks, ma�as began to
emerge, attacking and extorting money
from companies and doubling the volume of
attacks on companies in 2016.
Ransomware Discoveries
Source: Backtrack Academy
Gpcoder
Reveton
2005
2012
2013
2014
2015
2016
Urausy
Kovter
Browlock
Linkup
TeslaCrypt
Coinvault
Cryptvault
Pclock
Troldesh
Threat Finder
Encryptor Raas
Hidden Tear
CryptoApp
ORX Locker
LockDroid
LowLevel404
Cryptin�nite
Mabouia OSX POC
Unix.Ramsomcrypt
Power Worm
DMA-Locker
Radamant
Gomasom
Vaultcrypt
Chimera-Locker
Ramsom32
Locky
CryptoJocker
Umbercrypt
Hydracrypt
Nanolocker
LeChi�re
Magic
Vipasana
Hi Buddy
73v3n
Magic
Job Cryptor
PayCrypt
KeRanger
GinX
XRTN
Dumb
Tox
Pacman
Slocker
Onion
CTB-Locker Citron
TorrentLocker
VirLock
SinoLocker
ZeroLocker
Nymaim
Cryptowall
1T
2T
3T
4T
1T
2T
3T
4T
1T
2T
3T
4T
1T
Cryptolocker2015
BandaChor
Simplolocker
5
Collaboration between Deloitte and Panda Security
Lortok
0,42%
Aura
0,65%
Locky
0,65%
Others
2,41%
Mor
1,56%
Teslacrypt
48,81%
CTB-Locker
21,61%
Classi�cation
of the most
representative
current
ransomware
Scatter
8,66%
Cryakl
7,13%
CryptoWall
5,21%
Shade
2,91%
6
Panda Security and Deloitte EMEA have
reached a collaborative agreement to deploy
a managed security service using Adaptive
Defense technology.
The services built around this technology are the following:
Software
deployment
Adaptive Defense software’s
centralised and automatic
deployment.
Adaptive Defense
Management
Keeping the product up-to-date
is vital, not only from a version
point of view, but also taking
the continuous evolution of the
other software of the protected
endpoint into consideration.
Reduction of the total amount
of incidents through learning
about the nature of each one,
guaranteeing optimal device
functioning.
Control of results and certainty
that everything is working
correctly.
Cyber Incident
Response (CIR)
C.I.R aims to manage the
situation to limit damage and
allow business operations to
return to normal as quickly as
possible.
Our objective is to cooperate, in structure and
methodology between Panda Security and Deloitte EMEA.
An example of this is Deloitte's own use
of Panda Security’s Anti-Ransomware
Endpoint (Adaptive Defense) for all
employees in the Spanish Firm.
Our goal
7
Collaboration between Deloitte and Panda Security
Adaptive Defense
Technology
Based on
signature �les
Only detects
known malware
Only noti�es when it
discovers something
known to be malicious
Based on behavioural intelligence

(Big Data + Machine Learning)
Prevention,
detection and
remediation
Detailed forensic
information,
security audit
and real-times alerts
Total visibility of
endpoint activity
Protects against all types of
threats: known and unknown
malware, APTs, �le-free attacks
and any malicious behaviour
A Managed Service
that continuously
monitors, registers
and classi�ed 100% of
active processes,
even
if they are apparently
reliable
Stops malware when it enters
the endpoint, but does not
monitor its activity
Does not provide
attack information
Basic
protection
Traditional
Antivirus
Adaptive
Defense
Vs.
Endpoint Detection
and Response
monitoring, analysis and
categorisation 100% of active
processes in all endpoints in the
corporate network. Certifying all
applications in execution.
Dynamic Exploit
Detection
its anti-exploit technology neutralises
the attack as soon as an exploitation
attempt is detected in a trusted
application, identifying known and
unknown exploits.
Malware Intelligence
Platform
the correlation of data con�gures
a security intelligence system
capable of revealing patterns of
malicious behaviour to get ahead of
the threats.
100%
99.98%
0.02%
Panda Adaptive Defense is an advanced managed cyber security
service based on three principles: continuous monitoring of the
endpoint, classi�cation of 100% of the active processes thanks to
Big Data and Machine Learning technologies, and behaviour analysis
carried out by expert technicians.
Known
Goodware
Unknown
Goodware
Unknow

Malware
Threat Hunters
(Analysts)
Known
Malware
8
Collaboration between Deloitte and Panda Security
9
Endpoint Adaptive Defense
deployment
As a �rst point at the beginning of the Anti-Ransomware
service provision, Deloitte will o�er the deployment of the
Panda Adaptive Defense solution in company devices (in close
coordination with their own team).
ASSOCIATED SERVICES
Software
update
Software
update
Software implementation
Software implementation
Scanning
Scanning
Update, deployment
and implementation
Immediate response:
Cyber Incident Response
Collaboration between Deloitte and Panda Security
10
The aim of C.I.R is to manage the situation, limit the
damage and allow business operations to return to normal
as quickly as possible.
ASSOCIATED SERVICES
Our service provides capabilities to identify,
contain and minimise the risk when
faced with this type of incident, as well as
measures to prevent this from happening
again.
The casuistry of this type of incidents could
be, for example


Security incident management


Forensic analysis


Malware analysis


Shell scripting, perl, Python or other
programming.


Revision of systems


Revision of logs
Cyber Incident Response
24/7/365
154
Immediate
phone call
In 154 countries
Our team will o�er immediate answers
and will help you to face the crisis.
Our specialists provide the necessary
knowledge and tools to determine
what has happened and how to resolve
it.
11
CIR is an advanced
service, prepared to
respond to security
incidents, regardless
of the cause. This
represents an organised
way to manage security
breaches, attacks or
incidents.
Collaboration between Deloitte and Panda Security
For further information, please visit www.deloitte.es
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of
referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description
challenges. Deloitte’s more than 225,000 professionals are committed to making an impact that matters.
related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services.
professional adviser. No entity in the Deloitte Network shall be
responsible for any loss whatsoever sustained by any person who relies on this communication.
© 2016. For information, contact Deloitte, S.L.
Designed and produced by the Communications, Brand and Business Development department, Madrid.
Collaboration between Deloitte and Panda Security
Collaboration between Deloitte and Panda Security
Endpoint Detection and Responsemonitoring, analysis and categorisation 100% of active processes in all endpoints in the corporate network. Certifying all applications in execution.Dynamic Exploit Detectionits anti-exploit technology neutralises the attack as soon as an exploitation attempt is detected in a trusted application, identifying known and unknown exploits.Malware Intelligence Platformthe correlation of data con�gures a security intelligence system capable of revealing patterns of malicious behaviour to get ahead of the threats.100%99.98%0.02%
Panda Adaptive Defense is an advanced managed cyber security service based on three principles: continuous monitoring of the endpoint, classi�cation of 100% of the active processes thanks to Big Data and Machine Learning technologies, and behaviour analysis carried out by expert technicians.
Known GoodwareUnknown Goodware
MalwareThreat Hunters (Analysts)Known Malware
Adaptive Defense TechnologyBased on signature �lesOnly detects known malwareOnly noti�es when it discovers something known to be maliciousBased on behavioural intelligence(Big Data + Machine Learning)
Detailed forensic information, security audit and real-times alertsTotal visibility of endpoint activityProtects against all types of threats: known and unknown malware, APTs, �le-free attacks and any malicious behaviour
A Managed Servicethatontinuouslyactive processeseven if they are apparentlyreliablePrevention,detectionremediationStops malware when it enters the endpoint, but does not monitor its activityDoes not provide attack informationBasic protection
Traditional
AntivirusAdaptiveDefenseVs.

Documentos PDF asociados:

Título de portada NIVEL 2 and Panda Security
Osito Panda En El Rio PDF Download - bistro913.com
Huella de Carbono y Mercados - awsassets.panda.org
Panda Adaptive Situación Defense 360 y Systems Management
Un Panda Entre Libros Laurann Dohner Serie Vlg
CMSClient Instructions - Unifore Security
- USER GUIDE - Information Security
What is FICA? - Social Security Administration
¿Qué es VoIP? - IP Voice, Data, Video & Security
Security Clearance, Suitability/Fitness, and Credentialing ...
DMS GENSER Message Security Classifications, Categories ...
Security Exam Study Guide - gamediators.org
Internet-Scale analysis of AWS Cognito Security
A BPMN Extension for the Modeling of Security Requirements ...
Contract: Security Systems and Solutions Group: 77201
Schedule of Social Security Benefit Payments 2019
Medicare - The United States Social Security Administration
Work History Report - Social Security Administration
Manual De Un Ciso Chief Information Security Officer
DRAFT Cyber Security Incident Reporting and Response Planning
Guía del usuario de Cisco Router and Security Device Manager
portada 5.fh 19/9/02 21:23 Pagina 1 - fib.upc.edu
INTRODUCCION A LA ECONOMÍA - Portada
COL (Presentar pantalla con portada del TEG)
APRENDIZAJE - CAPITULO PORTADA
Teoría Cognoscitiva - Portada
portada curvas ok.pdf 12/3/08 13:41:35 - researchgate.net
Libro de Practicas de la Ley del Tiempo con portada
BIOLOGÍA - Portada. Universidad de Navarra
001-002 Portada MALAGA PRIV - asisa.es
Portada del Libro de Datos de Jack--
LAS 21 LEYES IRREFUTABLES DEL LIDERAZGO - Portada
HERGOM PORTADA CATALOGO - Inicio
El frontispicio o portada, antecedente en imágenes
portada Apoyo Nutricional - chospab.es
CAPÍTULO 10 - Portada Portal Canek
LA FILOSOFÍA HOMEOPÁTICA DE KENT - Portada
Introducción a W - Portada. Universidad de Navarra
El modelo dialectico - IZARGAIN-portada
portada. - Seminario Iberoamericano de Estudios ...