TOGETHER, WE
RESPOND
FASTER
CYBERSEC 2019
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Post on/ | 2019/01/17 11:Thursday
Kenneth Lo, Senior Product Manager, Version 2 Limited (ESET Taiwan Exclusive Distributor)
The ransomware attack method has changed from a blind attack with a personal focus to an attack method for designing and disseminating a specific enterprise. Kenneth Lo ( Senior Product Manager / Version 2 ) according to Gartner's 2015 Adaptive Security Architecture, most Taiwanese companies focus their resources on defense and detection, and rarely pay attention to the importance of forecasting and response.
Version 2【 ESET Dynamic Threat Defense 】, imported cloud sandbox analysis technology, integrated endpoint computer and mail/file server, can instantly detect the security threats, when confirmed, will immediately enter each endpoint computer to find a fairly hash value The files are deleted and removed to avoid further harm to the enterprise.
In addition, Version 2【 ESET Threat Intelligence Service 】can implement the prediction mechanism in Gartner's self-adjusting security architecture. There are three applications. The first is to synchronize the newly discovered virus hash value and Botnet IP to SIEM through data exchange. , firewalls, etc., so that they can accurately find the security threat; the second is the active early warning, some targeted attacks, proactive warning to the relevant industry customers; the third is the sample submission, the enterprise will detect the security threats uploaded Analysis of the security threat intelligence service platform can be used to understand the source and method of the security attack.
In the era of threatening and attacking retreading, enterprises must establish a continuous security defense framework to keep up with the latest attack information, adjust the defense structure at any time, and implement security in a more labor-saving way.