Find us @Gartner Security & Risk Management Summit 2018



Find us @Gartner Security & Risk Management Summit 2018

The only Challenger in Endpoint Protection Platforms

Join us in London at the Gartner Security & Risk Management Summit 2018 and explore our all-new enterprise portfolio.

September 10-11
InterContinental London - The O2

London, UK
Booth PL 1

And receive a complimentary copy of the Gartner Magic Quadrant for Endpoint Protection Platforms.

30 years
of cybersecurity innovation

13
R&D centers worldwide

110 million
users protected

Built & owned
by cybersecurity experts

About Gartner Security & Risk Management Summits 2018

The summit will provide the latest information on new threats and emerging technologies such as AI, machine learning, analytics and Blockchain - while helping you address the ongoing shortage of skilled staff. Find out more information about your nearest event https://www.gartner.com/events/calendar/sec.jsp.

ESET Presentation

 Tony Anscombe

Malware of mass destruction, hype, myth or reality?

As cyber-criminals, nation states, agencies and individuals hone their efforts to attack businesses, public services and infrastructure, the threat landscape has become a battlefield of so many participants that it is becoming difficult to identify their motivation. Join this session to understand the new criteria that you should consider when selecting a security partner to address these threats.


Presented by
Tony Anscombe

Focusing on the challenge of cyberthreats

SUPPLY CHAIN ATTACKSADVANCED PERSISTENT THREATSFILE-LESS ATTACKSRANSOMWAREEXPLOITSCYBERWARFARE

Focusing on the challenge of cyberthreats

Cyberwarfare

Black-hat hackers can go to great lengths to infiltrate a specific target.

Industroyer, with its destructive, targeted and highly advanced nature, was one of the recent examples of such behavior, going after crucial and unprotected industrial control systems (ICS). ESET technologies are able to detect and block similar threats before they can inflict harm.

ESET 'Single Pane of Glass' Solutions


ESET Endpoints
include a market verified stack of multiple protection layers, which together effectively protect against all attack vectors.


ESET Enterprise Inspector constantly monitors what is happening in the network and allows security teams to define their own “safety net” criteria to identify attacks or suspicious behavior. When an alarm is triggered, it gives the team power to stop it. The team can define various criticality levels, and also trigger automatic generation of alert notification, to set your company at “high alert” in case of a pending attack.

Advanced Persistent Threats (APT)

Sednit, Turla, BlackEnergy, TeleBots & Lazarus.

These are only a few of the highly skilled and dangerous hacking groups ESET has been tracking during our 30 years of existence. Using this experience and intelligence, our experts built technologies that are able to identify and detect activity of these cybercriminals and thus protect clients from potential damage.

ESET 'Single Pane of Glass' Solutions


ESET Dynamic Threat Defense
allows analysis of never before seen files in a secure and always up-to-date Cloud Sandboxing environment, where all ESET technologies (including our advanced Augur Machine Learning engine) are employed to determine the behavior of the sample, thus preventing suspicious files from entering the network.


ESET Enterprise Inspector is programmed by ESET experts to identify suspicious behavior and to enable security experts to tailor the detection to their specific needs. This unique approach makes ESET products stand out from the competition.

File-less attacks

Many malware families are trying to avoid security solutions by never dropping a file on the targeted machine.

ESET is ready for such threats, as its Advanced Memory Scanner is designed to stop attackers precisely at the moment when they reveal their true malicious intentions – in the memory.

ESET 'Single Pane of Glass' Solutions


ESET Endpoints
include a market verified stack of multiple protection layers, optimized against different attack vectors. Advanced Memory Scanner and UEFI scanner are the tools protecting you against file-less attacks.


ESET Enterprise Inspector gives visibility into all scripts executed in the network, helping you to identify when file-less attacks were conducted to further strengthen your security policies.

Exploits

Nowadays, highly experienced attackers look for security vulnerabilities and craft specialized tools that help them push malware through such loopholes.

In 2017, an ESET research team detected an attack attempt by Sednit group that tried to use two zero-day exploits to infect one of the French election candidate’s campaign with their reconnaissance tool. Exploit Blocker technology mitigates similar risks by monitoring typically exploited applications for anomalies and blocking exploitation techniques.

ESET 'Single Pane of Glass' Solutions


ESET Endpoints
include a market verified stack of multiple protection layers, optimized against different attack vectors. Exploit blocker, included in all ESET Windows Endpoint & Server security products, helps to detect exploitation techniques and protect against using them. It´s a generic approach which is also effective against not-publicly-disclosed exploits.


ESET Enterprise Inspector gives visibility into what happens in the network, helping to identify attacks against exploits, or commonly vulnerable applications. Our rule-based mechanism allows you to monitor critical assets (applications) in your network to clearly identify any suspicious activity.

Ransomware

As WannaCry was invading hundreds of thousands of businesses around the world, ESET clients had no reason to worry.

Their endpoints were protected thanks to ESET’s network attack protection module, which successfully blocked the EternalBlue exploit used to spread the malicious code.

ESET 'Single Pane of Glass' Solutions


ESET Endpoints
include a market verified stack of multiple protection layers, optimized against different attack vectors. Although most ransomware infections are stopped by the use of ESET Live Grid, our DNA detections, we also have other layers that assist. Network attack blocker was the technology that stopped WannaCry infections before they entered machines. And ESET's newly added Ransomware Shield helps to identify ransomware-like behavior and stops it effectively.


ESET Enterprise Inspector helps to identify which files have been affected by ransomware, so it allows retrospective “back to the root analysis” helping to determine the root cause of the attack.


ESET Dynamic Threat Defense helps to stop ransomware attacks before they enter the environment. It allows automatic submission and replication of mail attachments to ESET Cloud Sandboxes, where we simulate the behavior to determine the true intentions of the file included.

Supply Chain Attacks

Advances of technologies have also brought an increase in the number of large-scale cyber operations with destructive consequences. Most recently, Petya has shown that a supply chain ransomware put together from multiple malware families can use advanced tactics and put tens of thousands of business computers out of order for weeks. Thanks to ESET’s research, we came to understand the mechanisms of that infection as well as the zero-day exploit that was at the beginning of the widespread infection. Our multi-layered technology can detect such intrusions and help companies to stay more secure.

ESET 'Single Pane of Glass' Solutions


ESET Endpoints
include a market verified stack of multiple protection layers, optimized against different attack vectors by technologies such as ESET Live Grid and Network Attack Protection.


ESET Dynamic Threat Defense helps to stop supply chain attacks before they enter the environment. It allows automatic submission and replication of mail attachments to ESET Cloud Sandboxes, where we simulate the behavior to determine the true intentions of the file included.


ESET Enterprise Inspector helps to identify which files have been affected by supply chain ransomware, so it allows retrospective “back to the root analysis” helping to determine the root cause of the attack.

Meet Us at the Gartner Summit 2018

Learn more about our custom-fit enterprise portfolio and chat with ESET cybersecurity experts at the time which works for you.

Visit our booth and you will get the chance to win a drone DJI Spark.

This promotion is solely covered by ESET, Gartner is not affiliated with the activity.*

Gartner positions ESET as a Challenger in the 2018 Magic Quadrant for Endpoint Protection Platforms


Gartner analysts base their positioning on the completeness of vision and ability to execute. We believe their evaluation confirms our trust in ESET’s technology and our ambition to reach the top of our industry.


Gartner, Inc., Magic Quadrant for Endpoint Protection Platforms, Ian McShane, Avivah Litan, Eric Ouellet, Prateek Bhajanka, 24 January 2018. Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

*While Gartner is hosting the Gartner Security & Risk Management event, Gartner is not in any way affiliated with ESET or this promotion, the selection of winners or the distribution of prizes. Gartner disclaims all responsibility for any claims that may arise hereunder.