Be In It To Win It: Why You Should Be Selling WatchGuard Endpoint .

1m ago
1.75 MB
23 Pages
Last View : 29d ago
Last Download : n/a
Upload by : Kaleb Stephen

Be in it to Win it: Why you should be sellingWatchGuard Endpoint Security SolutionsCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Agenda for today Our evolution as Endpoint Security vendorWhat makes us different?EDR? Why do organizations need it?Product offer and the Value PropositionFrom “trust everything” to Zero-Trust and Threat HuntingHow YOU winCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Our evolution as anEndpoint Security Vendor2007First in cloud-based scanningReleased the first 100% cloudbased malware analysis tool2012100% Cloud Security2020WatchGuard acquired Panda SecurityPartners and customers can now benefitfrom advanced endpoint threat detectionand response fueled by modern AIcapabilities, behavior profiling techniquesand cutting-edge security eventcorrelation, as well as additionaloperational benefits such as centralizedmanagement across network andendpoint security.First vendor to move the entireportfolio to the cloud2015EPP EDR releasedFirst vendor to release a fullyintegrated single agent EPP and EDR2016Market Guide for EDRPanda Security was included inthe Gartner Market Guide for EDR2017EPP EDR over MSSPanda Security released the Threat HuntingService completely embedded in EDR2019Customer Choice 2019Panda Security was namedCustomer Choice 2019 by GartnerPeer Insights for EDR solutionsCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

What makes us different? We have developed a Zero-Trust Application Service to reducethe UNKNOWNOur mission is to reduce the number of security incidents toZEROWe provide our customers endpoint data that competitors arenot even collectingOur complementary SOC model enables larger organizations tointroduce Forensic ToolsWe transformed the traditional Threat Detection approach into aThreat Hunting ServiceCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Copyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

What is Endpoint Detection andResponse (EDR)? Endpoint Detection and Response (EDR) platforms are acategory of endpoint security tools, built to provideendpoint visibility and used to detect and respond to cyberthreats and exploits. Gartner’s Senior Analyst Anton Chuvakin defined the termin 2013 as “tools that are primarily focused on detectingand investigating suspicious activities (and traces ofsuch) on hosts/endpoints”.Copyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Why do organizations need an EDR? They provide an accurate firsthand view of ahacking operation as it unfolds (and traces ofsuch)Critical forensics information, including processactions, file access, network events andconfiguration changes are collected frommanaged endpointsEDR solutions were built to provide completevisibility to endpoints and servers, monitor andspot abnormal behaviors that indicate maliciousactivity.Copyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

What are the essential elements of an EDR?Enabling detectionCross-correlating dataacross multiplesources/environmentsCombining whitelistingwith behavioral analysisObserving endpointactivity withoutinterferingEmpowering incidentremediation andforensics investigationEnabling effectivecleanup and remediationCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedWorking with yourantivirus

Our propositionCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

WatchGuard Endpoint Security SolutionsNext-Generation Antivirus (EPP)WatchGuard EPP EPP CapabilitiesAdvanced Endpoint Security (EDR)WatchGuard EDR EDR Capabilities Zero-Trust Application & Threat Hunting ServicesWorkstations, laptops,servers and virtualinstancesWindows (Intel &ARM), Linux, macOS(Intel & ARM) andAndroidInside/outsidenetwork, branchoffices and remoteworkersCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedAdvanced Endpoint Security (EPP EDR)WatchGuard EPDR EPP EDR Capabilities Zero-Trust Application & Threat Hunting ServicesWatchGuard CloudEndpoint Security Management Visibility License tracking

Single Lightweight AgentSIEMFeederData Control Integration with corporate SIEM platformsDetails and context of all endpoint activityCEF, LEEF, Syslog and Kafka supportInventory and PII file classificationReal-time PII monitoringDelete PII in filesFull Encryption Patch Management Microsoft and 3rd party applications patchingEnd-of-Life application managementPatch rollback and Windows Update service controlOn-demand or scheduled patching tasksAdvanced Reporting Tool WatchGuard EPDR Panda Adaptive Defense 360 Protection against sophisticated targeted attacksDetection of unknown exploitsVirtual patching for unsupported systemsMachine Learning and Deep LearningZero-Trust Application ServiceContainment and Remediation featuresThreat Hunting Service Preconfigured & customizable dashboards, reports and alertsDashboards, widgets, and predefined queries for security KPIsKPIs for vulnerable applications, access data and files, shadow filesRaw data from: endpoint operations, network connections, data access,processesEndpoint data retention: 12 monthsWatchGuard EPP Panda Endpoint Protection Plus Copyright 2020. WatchGuard Technologies, Inc. All Rights ReservedManaged Full Disk Encryption with BitLockerCentralized management of recovery keysCentralized encryption policiesEncryption dashboards, widgets and reportingAnti-malware and HIPS protectionManaged Endpoint FirewallDevice ControlHardware/software inventoryWeb browsing monitoring and filtering

WatchGuard TORAUTHENTICATIONENDPOINTPROTECTIONSimplify Every Aspect of Security DeliveryCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Value proposition WatchGuard empowers Partners to deliver exceptionalcustomer value through a combination of innovative serviceoriented products, enablement, and purchasingprograms that complement more comprehensive IT solutionsbuilt to meet customer needs:––––––––Complexity reduction,Secured everywhere,Analytics and visibility,Monitoring internal security to understand external threats,Protecting business-critical systems,Defend endpoints from advanced threats,Increase efficiency with deep-sight data analysis,Lighten security administration footprint.Copyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Matching your profile and the value propositionStraightforward solutions for partnerswho focus on volumeOur more complex solutions for partners with astrong focus on service deliverySolutions for partners who deliver managedsecurity services to their customersEndpoint ProtectionNext-Gen Endpoint ProtectionEndpoint Detection and ResponseManaged Detection and ResponsePanda Endpoint Protection PlusWatchGuard EPPWeb Access ControlAdaptive Defense / Adaptive Defense 360WatchGuard EDR / WatchGuard EPDRPatch ManagementEndpoint Detection and ResponseFull Disk EncryptionAdvanced Reporting ToolThreat HuntingPatch ManagementSystems ManagementSystems ManagementMobile Device ProtectionSIEMFeederData AnalyticsDevice ControlData Protection (GDPR-centric)CyberSOC ServicesCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedManaged EDR Services

“Trust everyone, run everything” Pre-ExecutionMalware signaturesURL ReputationHeuristicsDeny-list rulesetsVENDOR KNOWLEDGEAnomalous behavior detectedExecution Live or Sandbox execution Based on behavior (ML, AI,VENDOR TECHNOLOGYother technologies) Good vs. BadPost ExecutionPartiallyRecoveredrecoveredCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedLostMachine Learning, AI o otrastecnologías pueden no decidirlo suficientemente rápido y esposible que se requiera unareversion (rollback)VENDOR SERVICES

From “Trust Everyone” to “Trust No One”VENDOR KNOWLEDGE Malware signaturesURL ReputationHeuristicsDeny-list rulesetsPre-ExecutionVENDOR TECHNOLOGY Live or Sandbox execution Based on behavior (ML, AI, othertechnologies) Good vs. BadAnomalous ication ClassificationCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedMalwareZERO-TRUSTAPPLICATION SERVICEVENDOR SERVICESMachine Learning, AI or other technologiesmay not decide fast enough, and rollbackmay be requiredPartiallyRecoveredrecoveredLostPost ExecutionThreat HuntingExecution monitoring

Our unique protection model. ResultsMALWARE-BASED INFECTIONS ESCALATED TO OUR LABS PER MONTH 2014-2020Analysts move from reactively responding tocompromised customers to proactively notifyingthem about suspicious activity in their endpointsCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved“The Zero-Trust Application Service can drasticallyreduce the threat surface of endpoints.”Gartner Magic Quadrant for EPP, 2018.

Threat Hunting Service LotL (Living-off-the-Land) and fileless attacks are a growingconcern: they are more difficult to detect and make it easier forcybercriminals to attack stealthily Hacker detection Find attackers using Living-off-the-Land techniques Lateral movements Compromised credentials Identification of malicious employees User behavior modeling New or improved IoAs produced to block before damage Our Cybersecurity Team continuously monitors endpoint activity inreal time in the form of event telemetry (12 months). In case of a validated breach, the Cybersecurity Team notifies thecustomerCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

WatchGuard Endpoint Protection ModelWatchGuard EPPSignatures (local, cloud)PREEXECUTIONCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedSignatures (local, cloud)Signatures (local, cloud)HeuristicsHeuristicsURL ReputationURL ReputationContext & Behavior AnalysisEXECUTIONPOSTEXECUTIONWatchGuard EDR WatchGuard EPDRZero Trust Security ModelZero Trust Security ModelZero-Trust Application ServiceZero-Trust Application ServiceMachine Learning and AIMachine Learning and AIAdvanced Threat ProtectionAdvanced Threat ProtectionZero Trust Security ModelZero Trust Security ModelContext & Behavior AnalysisContext & Behavior AnalysisAnti-exploits & Virtual PatchingAnti-exploits & Virtual PatchingThreat Hunting ServiceDisinfectionThreat Hunting ServiceContainment andRemediation featuresContainment andRemediation featuresThreat Hunting ServiceThreat Hunting Service

How you win Stop ransomware TODAY with a high security postureGet an “endpoint security team” with Service-as-a-FeatureIdentify and automate incident remediationMitigate time spent on vulnerability and threat research toprioritize patchesReduce the number of agents deployed (including EPP, EDR,SW/HW inventory, full disk encryption, patching)Deliver real-time insights into day-to-day application, userand network activityCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

The differentiationUnified SecurityPlatformZero-TrustApp ServiceA single pane of glassfor security delivery &lightweight endpointagentPrevent, detect andrespond to known andunknown advancedthreats without addedcost or complexityCopyright 2020. WatchGuard Technologies, Inc. All Rights ReservedSimplicityFlexibility andExtensibilityEasy and straightforwardto configure, deploy, andcentrally manageA single agent for acomplete range ofproducts/modules thatallow scaling as partnersand customers grow

22Q&ACopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

23Thank youCopyright 2020. WatchGuard Technologies, Inc. All Rights Reserved

Microsoft and 3rd party applications patching End-of-Life application management Patch rollback and Windows Update service control On-demand or scheduled patching tasks Full Encryption Managed Full Disk Encryption with BitLocker Centralized management of recovery keys Centralized encryption policies

Related Documents:

Note: The functionality of PC-Adapter USB is integrated in STEP 7 V5.5. PID Self-Tuner STEP 7 V5.4 STEP 7 V5.5 Product Name Version Order Number Win 2000 SP4 Win XP SP2 Win XP SP3 Win 2003 SP1 Win 2003 SP2 Vista Vista SP1 Win XP SP3 Win 2003 SP2 Win 7 PID Self-Tuner (FBs)

Habit 4: Think Win-Win Personal Win-win is the habit of perscnal leadership. Win-win is the habit of seeking mutual benefit. This thinking begins with a commitment to explore all options until a mutual satisfactory solution is reached, or to make no deal at all. Retention System. Win-win is the

carla h Pittsburg KS US Instant Win--iPod Touch 8GB Lisa M Danbury CT US Instant Win--iPod Touch 8GB Jaime G Chula Vista CA US Instant Win--iPod Touch 8GB shannon B Olathe KS US Instant Win--Sony Bloggie HD Camcorder 8GB 1080p - 13.0 MP - Helene C Sterling CO US Instant Win--iPod Touch 8GB Anthony S Chambly QC CA Instant Win--Sony Bloggie HD .

and Boris wins the match (probability p w), or loses the match (probability 1 p w). (i) Using the total probability theorem and the sequential description of Fig. 1.1(a), we have P(Boris wins) p2 w 2p (1 p)p . The term p2 wcorresponds to the win-win outcome, and the term 2p (1 p)p corre-sponds to the win-lose-win and the lose-win-win .

Caliber options: 204 Ruger 222 Rem 223 Rem 22-250 Rem 243 Win 260 Rem 7mm-08 Rem 308 Win 6.5 Creedmoor 25-06 Rem 6.5x55 SE 270 Win 30-06 Sprg 7mm Rem Mag 300 Win Mag 270 Win Short Mag 300 Win Short Mag 3.0 - 3.2 KG 510 570 620 MM 3 / 4 ROUNDS L AVAILABLE

Larry C.’s Chess Challenges . GM Larry Christiansen . Solutions on p. 46. 1. 2. 3. Black to move and win. Black to move and win. White to move and win. 4. 5. 6. White to move and win. White to move and win. White to move and win. Chess Trivia: Second Careers ! Nathan Smolensky . Match the

This document supports installing an optional solid state disk drive (SSD) on Tektronix 5/6 Series MSO instruments. Refer to . Installation instructions 5/6 Series MSO Option SUP5-WIN, SUP6-WIN, SUP6B-WIN, SUP6B-LNX Upgrade Kit Installation Instructions 8. 5. Push down on and tighten the thumb screw to attach the SSD to the chassis.

13535436 Norton 360 2.0/ Win 79.95 12067403 Norton Antivirus 11.0/Mac 49.95 14131314 Norton Antivirus 2009/Win 39.95 10514879 Norton Confidential/Win 49.95 13517991 Norton Ghost 14.0/Win 69.95 12608434 Norton Internet Security 2008/Win 69.95 14125628 Norton

Thinks Win-Win. While students are encouraged to use these characteristics at school, please reinforce them at home as well. 7 habits of happy kids: habit 4 Think Win Win- Everyone Can Win This week we’re focusing on Habit 4. It teaches students that everyone can be a winner. To th

work/products (Beading, Candles, Carving, Food Products, Soap, Weaving, etc.) ⃝I understand that if my work contains Indigenous visual representation that it is a reflection of the Indigenous culture of my native region. ⃝To the best of my knowledge, my work/products fall within Craft Council standards and expectations with respect to

college of business at a large state university in Pennsylvania. The result of their cooperation led to a win/win situation for all participants. The first win was the termination of the disruption and the second win was the student’s improv

Marvel United using different combinations of Challenges, Heroes, and Villains. Challenge yourself and try to tick as many boxes as you can! Basic Achievements - Win a game in S.H.I.E.L.D. Solo Mode. - Win a game with 2 Players. - Win a game with 3 Players. - Win a game with 4 Players. -

7 Habits Signature 4.0 7 minutes Dr. Stephen R. Covey explains how to succeed in your personal and professional relationships through win-win thinking. Create a win-win culture where everyone feels they are benefiting. Communicate i

Chance to win locker & towel service. Chance to win the free CycleFit class. Free fountain drink coupon. Chance to win the free lunch for four. Wanted my opinion heard. Chance to win the IPOD Touch. Help IU. Usually complete surveys when asked

Classified - Confidential COCA-COLA REAL MAGIC INSTANT WIN GAME & SWEEPSTAKES Official Rules NO PURCHASE REQUIRED TO ENTER OR WIN. 1. Eligibility: The Coca-Cola Real Magic Instant Win Game & Sweepstakes (the “Promotion”) is open only to legal residents of the

Oracle, SQL Server, and Informix Warehouse and Content Management improvements DB2 Evolution IBM DB2 Family Hosts DB2 UDB for OS/390 DB2 for VSE & VM DB2 UDB for AS/400 Personal OS/2 Win 95, 98 Win NT/2000 Linux Enterprise - Extended AIX Linux Win NT/2000 Solaris HP-UX NUMA-Q Workgroup Linux Win NT/2000 OS/2 AIX Solaris HP-UX Enterprise OS/2 .

Jan 11, 2020 · 223 REM 5.56 NATO 243 WIN 270 WIN 350 LEGEND 7mm REM MAG 308 WIN 30-06 SPRG 300 WIN MAG 6.5 CREEDMOOR 600 BOLT LIFT PROVIDES SCOPE CLEARANCE SEE PAGE 53 FOR DETAILS SEE SPECIFICATIONS IN TABLE ON PAGE 49 Our flagship bolt-action hunting rifle – now with Thompson/Center’s Generation II

Lesson 4: Stop and Think Win/Win This template can be used for creating a sign. Have students color the “Stop” sign and the “Think” sign. Cut out the rectangle, including both signs. Fold the rectangle in half so “Stop” is on one side and “Think” on the other. Put a tongu

4 Habit 4 of a RIM Program Think Win-Win ACCOUNTABILITY Accountability . Framework . Create accountability throughout the enterprise . Accountability Framework is a partnership – a win-win; arming the business with guidance, tools, re

Aug 07, 2012 · Habit Habit 4: Think Win-Win 4 Think Win-Win. Private Victory to Public Victory The Emotional Bank Account Deposits . PowerPoint Presentation Author: Jody Karr