Transcription
MARKET RESEARCH,SECURITY CHALLENGES &ESET SOLUTIONSMichal Jankech, Principal Product Manager, ESET HQ
Michal JankechPrincipal Product Manager
User Research
User ResearchCo-DesignMarket Research Usability Testing BETAUserPartnerFeedback FeedbackAnalytics Telemetry
Enterprise Research2017-2019
ties4%Telco2%Services2%
5 000 - 10 00015%2 000 - 5 00028%1 000 - 2 00018%10 000 - 20 00022%20 000 4% 1 00013%
AdministratorsOther EmployeesCompaniesUser PersonasServed PersonasOrganizational Personas
AdministratorsSophisticated AdministratorBasic Administrator
Sophisticated Administrator Lead by CISO Motivated, capable, eager to improve Formal teams and roles Wants to automate & integrate Likes and utilizes ESET capabilities
Basic Administrator Small, informally organized teams Often leads IT-Security Limited time, motivation and abilities Wants help and fire & forget behavior Struggles with complexity
Other EmployeesCISOTypical EmployeeEmpowered Employee
Chief Information Security Officer Key factor on many decisions Often established IT Security Sets the direction for adv. teams Passive user of ESMC Interested in reports & auditing
Typical Employee Limited rights on the computer Minimal knowledge about IT Security Majority of employees Security should be invisible
Empowered Employee Permissive company culture Technical users such as developers Semi-managed systems Has and sometimes uses admin access Benefits from some control
CompaniesTop-down CorporationDecentralized Organization
Top-down Corporation Typical hierarchical structure Clear responsibilities Centralized decision-making Administrators have control
Decentralized Organization Different regions with autonomy Consensus-focused culture Sometimes hierarchical structure Top-level decisions serve as guidance Applies to both use and purchase
Top challenges
What our customers percieve as „the challenge“ ?RansomwareTargeted attacks & hackingDiversified landscapeLack of network visibility &pressure on operational effectivenessEmployee misbehaviorLack of workforce
Cloud Sandbox(Dynamic ThreatDefense)Stops ransomwareupon entrySignature-lessdetection(RansomwareShield)EDR (EnterpriseInspector)Post attackdetection ofransomwareBehavior-basedprevention focusing behaviorRansomwareon changes insystem and content(what was changed, when,and how – and by what /whom)
Targeted Attacks & HackingMulti-layeredprevention(UEFI Scanner, ExploitBlocker, AMS)CentralizedReduce theattack surface management2FA for all admins(EEI & EDTDMap the holes and & ESMC)install patchesFinding the needle in ahaystack approach
Diversified LandscapeAt least one mac isalways in there(management /designer)Linux is gainingmomentumin government & ICS(SCADA)Centralizedmanagement withsoftware / hardwareasset managementESMC – providing software /hardware inventory for allplatforms with advancedfiltering
Lack of network visibility&Reportingpressure onHardware/softwareoperational effectivenessData consolidation& Notificationsinventory solutions focusingon reducing IT(sec)workloads(All data in onesystem – ESMC details in purposebuilt systems(EDTD / EEI))
Web control, time-based blockingDevice control, time-based blockingEmployeemisbehaviorReports (about potentiallyharmful activity)EDR with customization & UEBA (Enterpriseinspector rules, focusing on employee behavior(what they really do))
ConsultLackCoooperateof workforceOutsourceDeploymentServicesHelp to deployand setupproperlyThreat HuntingHelp to identifymalicious activitywhen neededThreatIntelligenceHelp to providesecurity context
How ESET helps?
By products .ESET ThreatIntelligenceESET EnterpriseInspectorESET Endpoint 7& Server ProductsESET DynamicThreat DefenseESET SecurityManagement Center
. That Fits Gartner CARTA frameworkESETThreatPREDICTIntelligenceESET EnterpriseRESPONDInspectorESETEndpoint7PREVENT& Server ProductsESETDynamicDETECTThreat CenterASSESMENT
Key takeaways?Next week: Upgrade your security product to the latest version Collect inventory across ALL your environment (software, hardware,appliances)Next three months: Consider enabling 2FA for all users with admin rights (stolen passwordis still responsible for 80% of all breaches) Develop a “Threat Feed” to cross-reference CVEs against yourinventory build a dashboard using the three data feeds
Useful linksVulnerability data feeds: MitreCVE Data Feed: https://cve.mitre.org/cve/data feeds.html NIST National Vulnerability Database (NVD):https://nvd.nist.gov/vuln/data-feeds Microsoft KB info: on.aspx?id 36982Check if your e-mail and password was not involved in a data breach https://haveibeenpwned.com/
Thank you!Questions?
/ESET@ESET#ESETDay esetglobal
MARKET RESEARCH, SECURITY CHALLENGES & ESET SOLUTIONS Michal Jankech, Principal Product Manager, ESET HQ