31
1 2010 Highlights: Protection Performance New features Agenda

1 2010 Highlights: Protection Performance New features Agenda

Embed Size (px)

Citation preview

Page 1: 1 2010 Highlights: Protection Performance New features Agenda

1

2010 Highlights:

ProtectionPerformanceNew features

Agenda

Page 2: 1 2010 Highlights: Protection Performance New features Agenda

Norton 2010 Products

Page 3: 1 2010 Highlights: Protection Performance New features Agenda

3

Every 3 minutesA crime is committed on the streets of Madrid

Every 3 secondsA crime is committed in the UK

Every 2 minutesA crime is committed on the streets of Berlin

Every 3 secondsA crime is committed on the net

Page 4: 1 2010 Highlights: Protection Performance New features Agenda

Source: Consumer Reports

Will become a victim of cybercrime

Page 5: 1 2010 Highlights: Protection Performance New features Agenda

5

So how do you decide which vendor to trust when many of them score in the high 90s in terms of

effectiveness?

100

0

50

Page 6: 1 2010 Highlights: Protection Performance New features Agenda

6

All known threats

The danger today isn’t in the inactive 99%

99% Actual threat99%

Actual threat1%

All known threats 1%

Page 7: 1 2010 Highlights: Protection Performance New features Agenda

7

A new approach is required

Millions of files around the world.

Most are good. Some are really bad.

Page 8: 1 2010 Highlights: Protection Performance New features Agenda

8

Blacklisting works well here.

Pre

vale

nce

BAD GOOD

Whitelisting works well here.

The bad guys are successful when they make malware unique

Unfortunately neither technique works well for

the tens of millions of files with low prevalence.

Page 9: 1 2010 Highlights: Protection Performance New features Agenda

9

Only Norton Provides a Complete Spectrum of Cloud-based Only Norton Provides a Complete Spectrum of Cloud-based Protection TechnologiesProtection Technologies

9

Signatures in the cloud to mitigate signature growth; also offered by •McAfee•Trend Micro•Panda•Microsoft

White list in the cloud to mitigate false positives; also offered by•Gdata•Kaspersky

WHITELISTNorton Trusted

WHITELISTNorton Trusted

REPUTATIONNorton 2010 with Quorum

REPUTATIONNorton 2010 with Quorum

BLACKLISTNorton InsightBLACKLISTNorton Insight

Detects unknown threats;ONLY available from Norton

Page 10: 1 2010 Highlights: Protection Performance New features Agenda

10

Need a graphic here that shows how the most difficult threats to detect make up that 1-5% difference in effectiveness up to 100%

Reputation analysis turns the tables

Reputation

Heuristics

Signatures

Threats that can be detected by what they

do or by their attributes

Brand new “unique” threats

(Most difficult to detect)

Older, well known threats

Page 11: 1 2010 Highlights: Protection Performance New features Agenda

QUORUM

Norton Protection System

11*Codename

Quorum* (Reputation)Not a replacement technology. Adds vital information that allows all our other techniques to be more effective without sacrificing accuracy.Leverages Norton community of almost 30 million users

Introducing Quorum

Page 12: 1 2010 Highlights: Protection Performance New features Agenda

QUORUMNorton Protection System

12

Introducing Quorum

IPSBlocks at the network layer before the malware ever has the chance to land onthe disk. Checks Quorum for URL reputation.

SignaturesPulse updates deliver them every 5-10 minutes. Signatures are retrieved from the cloud.

MalheurStatic file heuristics. Attributes of the file vs. behavior of the file. Checks Quorum for corroboration.

SONARAdvanced behavioral technology detects malicious intent. Checks Quorum for corroboration.

Download InsightPrevents usersfrom unknowingly infecting themselves. Checks Quorum for file reputation.

Page 13: 1 2010 Highlights: Protection Performance New features Agenda

13

Quorum in action

1

File hash

Good/bad

Confidence

Prevalence

Date first seen

2

3

Collect Data

Calculate Reputation Score(no scanning!)

Submission Servers(automatic)

ReputationServers (real –time)

Page 14: 1 2010 Highlights: Protection Performance New features Agenda

14

Quorum in action

Page 15: 1 2010 Highlights: Protection Performance New features Agenda

”15

We have tested the dynamic (behaviour-based) detection with a few recently released malware samples which are not yet detected by heuristics, signatures or the "in the cloud" features and found that about 80% of them are properly identified and removed … an excellent result.

3rd party validation for Norton 2010

Page 16: 1 2010 Highlights: Protection Performance New features Agenda

16

3rd party validation for Norton 2010

http://www.pcmag.com/image_popup/0,1871,iid=241255,00.asphttp://www.pcmag.com/article2/0,2817,2350316,00.asp

Malware Blocking

The beta version of NIS 2010 is very impressive…And it turned in record-breaking scores in my anti-malware tests.“

Page 17: 1 2010 Highlights: Protection Performance New features Agenda

Overall performance

2010 performance scorecard

Test System: Vista Core Duo, IBM/Leveno A55 ThinkCentre Desktop, Intel Core 2 6300 @1.86GHz, 2GB RAM, WD 250GB Hard drive, running Windows VISTA Ultimate 32bit SP2 OSSource: Passmark Ltd., 08/25/09

TotalPassmark

Points

Page 18: 1 2010 Highlights: Protection Performance New features Agenda

Critical functions

2010 performance scorecard

Test System: Vista Core Duo, IBM/Leveno A55 ThinkCentre Desktop, Intel Core 2 6300 @1.86GHz, 2GB RAM, WD 250GB Hard drive, running Windows VISTA Ultimate 32bit SP2 OSSource: Passmark Ltd., 08/25/09

TotalPassmark

Points

Critical desktop functions:•Booting up the system•Copying files (pictures, videos, docs, etc.) •Installing applications and programs •Downloading files over the Internet •Compressing / decompressing files•Browsing the Internet

Page 19: 1 2010 Highlights: Protection Performance New features Agenda

Scan speed

2010 performance scorecard

Seconds

Test System: Vista Core Duo, IBM/Leveno A55 ThinkCentre Desktop, Intel Core 2 6300 @1.86GHz, 2GB RAM, WD 250GB Hard drive, running Windows VISTA Ultimate 32bit SP2 OSSource: Passmark Ltd., 08/25/09

Page 20: 1 2010 Highlights: Protection Performance New features Agenda

Memory utilization

2010 performance scorecard

MB

Test System: Vista Core Duo, IBM/Leveno A55 ThinkCentre Desktop, Intel Core 2 6300 @1.86GHz, 2GB RAM, WD 250GB Hard drive, running Windows VISTA Ultimate 32bit SP2 OSSource: Passmark Ltd., 08/25/09

Page 21: 1 2010 Highlights: Protection Performance New features Agenda

21

• Helps you see the effect of new programs on your PC

• Easier to assess problem areas

• Can correlate poor performance with activity on the PC including downloads and installs

New technology and features – System Insight

Page 22: 1 2010 Highlights: Protection Performance New features Agenda

22

• Heuristics developed over years of experience

• No training required

• Ready to use out of the box

• Can operate off of spam signatures in the cloud

New technology and features – Anti-Spam

Page 23: 1 2010 Highlights: Protection Performance New features Agenda

23

New technology and features – Identity Safe

Take your profile with you for use on multiple computers

Automatically stores & protects login information across sites

Secure login with a single click

Shares logins acrossFirefox & Internet Explorer

Page 24: 1 2010 Highlights: Protection Performance New features Agenda

24

New technology and features – Safe Web

Trusted visual indicator for more than 4M sites. 2.8B ratings/day

Protects users from bad sites. 100K malicious sites submitted each day.

Helps users see which sites are safe to do business with. 4.8M site reports reviewed/month

Protects consumers from sites that might misuse their personal information.

Page 25: 1 2010 Highlights: Protection Performance New features Agenda

25

Not all “web safety” is created equalNot all “web safety” is created equal

Norton 360 Blacklist

Firefox 2.3 Chrome Blacklist

IE6 / IE7 Blacklist

McAfee Site Advisor Blacklist

NetCraft Blacklist

http://www.ceas.cc/papers-2009/ceas2009-paper-32.pdf

Time (hours)

Det

ectio

n (%

)

Page 26: 1 2010 Highlights: Protection Performance New features Agenda

26

Not all “web safety” is created equalNot all “web safety” is created equal

Norton 360 Blacklist

Firefox 2.3 Chrome Blacklist

IE6 / IE7 Blacklist

McAfee Site Advisor Blacklist

NetCraft Blacklist

“An Empirical Analysis of Phishing Blacklists”Carnegie Mellon UniversityUniversity of Alabama

In hour 0, [the Symantec] blacklist caught as much phish as the others, but in hour 1 it caught 73% of the phish, 2 to 3 times more than the rest of the toolbars. This difference is also statistically significant until 12 hours from the initial test.

http://www.ceas.cc/papers-2009/ceas2009-paper-32.pdf

Page 27: 1 2010 Highlights: Protection Performance New features Agenda

27

Norton 2010: Pricing and availability

• Pricing:

•Norton AntiVirus £39.99

•Norton Internet Security £49.99

• Available on line now and in the shops at the end of the month

Page 28: 1 2010 Highlights: Protection Performance New features Agenda

28

SummarySummary

Still extremely effective and accurateThe bad guys are trying to hide in the long tail, butQuorum turns uniqueness against them

Still fastest and lightest3rd party tests have validated this

Differentiated featuresDownload Insight, Safe Web, and Identity Safemake the value of Norton visible every day, activelyadvising users and helping to keep them safe

Norton 2010 summary

1

3

2

www.norton.com/2010tech

Page 29: 1 2010 Highlights: Protection Performance New features Agenda

29

SummarySummary

Norton 2010 summary

Page 30: 1 2010 Highlights: Protection Performance New features Agenda

30

SummarySummary

QuorumThe bad guys are trying to hide in the long tail, butQuorum turns uniqueness against them

System Insight

Updated Anti-Spam

New Identity Safe features

Online Family.Norton

Norton 2010 summary – what’s new

Page 31: 1 2010 Highlights: Protection Performance New features Agenda

31*Codename

Signatures Pulse updates deliver them every 5-10 minutes. Signatures are retrieved from the cloud.

MalheurStatic file heuristics. Attributes of the file vs. behavior of the file. Checks Quorum for corroboration.

DownloadInsightPrevents usersfrom unknowingly infecting themselves. Checks Quorum for file reputation.

Not a replacement technology. Adds vital information that allows all our other techniques to be more effective without sacrificing accuracy.

Leverages community of almost 30 million users.

SignaturesHeuristicDetection

IPSBlocks at the network layer before the malware ever has the chance to land onthe disk. Checks Quorum for URL reputation.

SONARAdvanced behavioral technology detects malicious intent. Checks Quorum for corroboration.

Quorum*

Download Protection

IntrusionPrevention

BehaviorBlocking