Ransomware Defense

Ransomware Defense

Ransomware Defense Fabio Panada, Paolo Carini Consulting Security Engineer Cisco Security The Evolution of Ransomware Variants The confluence of easy and effective encryption, the popularity of exploit kits and phishing, and a willingness for victims to pay have caused an explosion of ransomware variants. Locky Cryptowall 73V3N Keranger CRYZIP First commercial TeslaCrypt Fake Petya PC Android phone Cryptolocker Teslacrypt 3.0 Cyborg Antivirus Redplus Teslacrypt 4.0 Virlock Teslacrypt 4.1 Lockdroid SamSam Reveton 1989 2001 2005 2006 2007 2008 2012 2013 2014 2015 2016 Worm type ransomware CryptoDefense Koler GPCoder QiaoZhaz Reveton Kovter Tox Cerber Ransomlock Simplelock Cryptvault Radamant Cokri DMALock Hydracrypt Bitcoin CBT-Locker Chimera Rokku network launched TorrentLocker Hidden Tear Jigsaw Dirty Decrypt Virlock Lockscreen Powerware Cryptorbit CoinVault Teslacrypt 2.0 Cryptographic Locker Svpeng Urausy Ransomware is a Massive Market $1B $209M 1000% Size of the $209M in YoY growth of 1000% ransomware market Q1 CY2016 since CY2015 – $1B and growing Demo Architectural Force Multiplier Cisco Protects from the Network to the Endpoint to the Cloud Email Security Umbrella On Promise or In the Cloud Security from the cloud Blocks 99% of Spam, 1 in 1 million Blocks 95% of threats before they false positive rate cause damage Next-Gen Firewall AMP Prioritizes threats See a threat once, block it Automates response everywhere Improved malware protection Most effective solution for known and Fully integrated management emerging advanced threats ISE + Stealthwatch Web Security Network as a Sensor Block web communication to infected and Enforcer sites and files Cisco Ransomware Defense Solution Solution to Prevent, Detect and Contain ransomware attacks Cisco Ransomware Defense Solution is not a silver bullet, and not a guarantee. It does help to: • Prevent ransomware from getting into the network where possible • Stop it at the systems before it gains command and control • Detect when it is present in the network • Work to contain it from expanding to additional systems and network areas • Performs incident response to fix the vulnerabilities and areas that were attacked This solution helps to keep business operations running with less fear of being taken hostage and losing control of critical systems • With this offer, you will: • Gain valuable information on your network including critical attacks • Reduce risk and make security a growth engine for your business • This offer is valid through December 29th, 2016 in Austria, Belgium, Denmark, Finland, France, Germany, Ireland, Italy, Luxemburg, Netherlands, Norway, Spain, Sweden, Switzerland and United Kingdom. • For more information and to request a Threat Scan POV, go to www.cisco.com/go/threatscanpov .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us