becoming your customer's security partner in the digital age

58
www.exponential-e.com #digitalsecurity BECOMING YOUR CUSTOMERS’ SECURITY PARTNER IN THE DIGITAL AGE 21 ST SEPTEMBER 2017

Upload: exponentiale

Post on 29-Jan-2018

59 views

Category:

Technology


0 download

TRANSCRIPT

www.exponential-e.com #digitalsecurity

BECOMING YOUR CUSTOMERS’SECURITY PARTNER IN THE DIGITAL AGE

2 1 S T S E P T E M B E R 2 0 1 7

www.exponential-e.com #digitalsecurity

A G E N D A

10:00 - 10:10Welcome and introduction. Alp Kostem - Head of Channel, Exponential-e.

10:10 - 10.30Acceleration of digital transformation in businesses.Jonathan Bridges - Head of Cloud, Exponential-e.

10:30 - 10.50Introducing the Exponential-e Security Portfolio for partners.Jeff Finch - Security Product Manager, Exponential-e.

10.50 - 11.10 Coffee break.

11:10 - 11.30Creating margin, value and advocacy with your customer base. Alp Kostem - Head of Channel, Exponential-e.

11.30 - 11.45Partner campaign: Ransomware - protection at the core for endpoint security. Niall Sheffield - Solution Engineer, SentinelOne.

11.45 - 12.00Q&A.

12.00 - 13:30Networking lunch.

www.exponential-e.com #digitalsecurity

W E L C O M E & I N T R O D U C T I O N

A L P K O S T E M - H E A D O F C H A N N E L

www.exponential-e.com #digitalsecurity

M IS S ION S T AT EMENT

Achieve the status whereby

Exponential-e 3.0 is formally acknowledged

among our peers, competitors & clients as the

most advanced & innovative

business technology enabler in

The World.

A ‘world-class company . . . ’

www.exponential-e.com #digitalsecurity

15 SUCCESSFUL YEARSOF TECHNOLOG Y I NNOVATION

2002First UK company to deliver Internet over

Ethernet.

2004Intelligent

Internet Algorithm for fast connectivity to major

European exchanges.

2006Exponential-e launches

Europe’s first VPLS Network.

2008Launch of

Smart Internet Business Internet Service.

2010Web-based Bandwidth

Management is launched.

2011North America watches the Royal wedding using

Exponential-e technology.

2012Core Network upgrade to 100GigE. Investments in Cloud & Data Centres.

2013Launch of own private Cloud & Data Centre.

2014Desktop-as-a-Service (DaaS)

Launched.

2016Full ICT portfolio and Channel

expansion

2015The London Stock Exchange, Investec

100 & Megabuyte Awards.Data Centre expansion to the Ark.

www.exponential-e.com #digitalsecurity

T R A N S I T I O N I N G E E F R O M 2 . 0 – 3 . 0

3.0Accelerate up the curve to 3.0

2.01.0

www.exponential-e.com #digitalsecurity

A C C E L E R A T I O N O F D I G I T A L T R A N S F O R M A T I O N I N B U S I N E S S .

J O N A T H A N B R I D G E S - H E A D O F C L O U D

www.exponential-e.com #digitalsecurity

By the end of 2017, two-thirds of the CEOs of global 2000 companies will have digital

transformation at centre of corporate strategy.

IDC FutureScape: Worldwide Digital Transformation 2016

Predictions, 2015

ONLY 10%of companies currently

describe themselves as fully digital.

The Economist Intelligence Unit Digital Evolution Report, 2016

47%of companies haven’t

started to embark on digital transformation.

Are Businesses Really Digitally Transforming or Living in Digital

Denial, Progress, 2016

55%of companies without

an existing digital transformation programme say timeframe to

adopt one is a <year.

Are Businesses Really Digitally Transforming or Living in Digital

Denial, Progress, 2016

33%of companies are

developing plans for digital transformation, but won’t execute in next 12 months.

Are Businesses Really Digitally Transforming or Living in Digital

Denial, Progress, 2016

85%of enterprise decision makers feel they have a timeframe of two years to make significant

inroads on digital transformation before

suffering financially and/or falling behind competitors.

Are Businesses Really Digitally Transforming or Living in Digital Denial,

Progress, 2016

Biggest disruptive technologies are Cloud (58%), mobility and collaboration (54%) and data

(52%).

BT CIO Report, 2016

www.exponential-e.com #digitalsecurity

DIGITALTRANSFORMATION

CLOUD ADOPTION

COMPLIANCE& SECURITY

INFORMATION LIFECYCLE MANAGEMENT & DATA

SOVEREIGNTY

NETWORK TRANSFORMATION& VIRTUALISATION

BIG DATA & CLOUD NATIVE APPLICATIONS

DISASTERRECOVERY

HYBRID CLOUD

DIG ITAL TRANSFORMATION

www.exponential-e.com #digitalsecurity

PROMI NENCE OF CLOUD I N D I G I TAL TRANSFORMATION

THINK BACK 10 YEARS…

GENERATION Z: CONNECTED FROM BIRTH BORN MID 1990s TO 2010

AND HOW THE LANDSCAPE HAS SHIFTED…

The biggest disruptive technologies cited by global respondents are the

Cloud (58%), mobility and collaboration (54%) and data (52%).

– BT CIO Report, 2016

www.exponential-e.com #digitalsecurity

CLOUD COMPUTI NGAS A SERVI CE REVENUE ($B )

0

5

10

15

20

25

30

35

40

45

50

2014 2015 2016 2017 2018 2019 2020

PaaS SaaS IaaS

PRI VATE CLOUD ADOPTI ON2016 VS 2015

44%

19%

19%

15%

13%

13%

9%

33%

13%

13%

10%

8%

7%

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

Vmware vSphere / vCenter

OpenStack

Vmware vCloud Suite

Bare-Metal Cloud

Microsoft System Center

CloudStack

Microsoft Azure Pack

2015 2016

CLOUD CHALLENG ES 2016 VS 2015

32%

29%

26%

26%

26%

24%

23%

15%

27%

28%

25%

25%

24%

26%

23%

17%

0% 5% 10% 15% 20% 25% 30% 35%

Lack of resources / expertise

Security

Compliance

Managing multiple Cloud services

Managing costs

Complexity of building a Private Cloud

Governance / Control

Performance

2015 2016

www.exponential-e.com

S E R V I C E S N E E D T O S U P P O R T T H E A N A L Y T I C S L A N D S C A P E S H I F T

#digitalsecurity

DESCRIPTIVE DIAGNOSTIC PREDICTIVE PRESCRIPTIVE

WHAT HAPPENED IN THE PAST?

WHY DID IT HAPPEN?

WHAT WILL HAPPEN?

WHAT WE WILL DO?

www.exponential-e.com #digitalsecurity

TU RNING M O RE D ATA INTO D EEPER INS IGHT

HARNESS DATA

ENABLING DEEPER QUERY

EXPONENTIAL-E ENTERPRISE CLOUD

STORAGE & BACKUP

COMPUTENETWORK &

WAN INTEGRATION

EXPONENTIAL-E PRIVATE CLOUD

STORAGE & BACKUP

COMPUTENETWORK &

WAN INTEGRATION

MANAGEMENT & INTEGRATION SERVICES

• OS Management.

• App Management.

• Remote Access.

PLATFORM AS A SERVICES

• Public Services.

• Exponential-e Private.

• Exponential-e Multi-tenant.

REAL TIME NEAR TIME BATCH

DATA LAKE

AND RICHER INSIGHT

ENGAGING & OPTIMISING

DATA SCIENCE PRACTICE

APPS DEVELOPMENT & REFACTORING PRACTICE

CONSULTING

ETL, DATA QUALITY

ANALYTICS, VISUALISATION, REPORTING

NLP, SEMANTICS, MDM, MACHINE LEARNING

SER

VIC

E M

AN

AG

EMEN

T &

DEL

IVER

Y, S

ECU

RIT

Y, C

LOU

D A

UTO

MA

TIO

N &

BR

OK

ERA

GE

BU

SINESS P

RO

CESS A

UTO

MA

TION

& C

ASE M

AN

AG

EMEN

T

SOFTW

AR

E DEFIN

ED N

ETWO

RK

ING

www.exponential-e.com #digitalsecurity

REL EVEN ACE AN D O PPO RTU N ITY

Scaleable secure, sovereign platforms needed to enable digital transformation within your customers

Whilst SaaS grows, localisation of critical apps, close to end user and DC services, continues to be a desired delivery model

SaaSification of applications, coupled with next generation data services, allowsnew revenue growth, and new routes to market for our partner community

Data services have become more accessible than ever before. No longer are projects high cost and high risk, but low cost and high yield

Simplify & orchestrate applications and business landscapes

Enhanced catalogue of deployable services

Drive customer intimacy and experience, upselling to outcome

centric services

New revenue streams through IaaS, PaaS and SaaS enablement

#digitalsecuritywww.exponential-e.com

DELIVERING

• Seamlessly integrated Cloud-Network Platform.

• Multiple services over one pipe offering superior design versatility.

• Frictionless migration to the Cloud in days not weeks or months - No IP address changes required.

• Platform for secure acceleration of new digital content & applications.

• Own Network delivers 100% Uptime.

• Super low-latency for end-user delight.

• Gold standard Operational Support 24x7.

• Trusted & innovative partner working to international standards - 7 ISOs.

www.exponential-e.com #digitalsecurity

I N T R O D U C I N G T H E E X P O N E N T I A L - E S E C U R I T Y P O R T F O L I O F O R P A R T N E R S

J E F F F I N C H - S E C U R I T Y P R O D U C T M A N A G E R

www.exponential-e.com

Digitalisation Vs Digitisation

www.exponential-e.com

THE DISCUSSION

• Digitisation, Cyber Security and the Boundary

• Digitsation, Cyber Security and the Application

• Encryption, Encryption, Encryption

• AAA

• Direct connectivity with suppliers, partners, customers, and consumers.

• The Endpoint is the weakest link!

• Exponential-e Strategy and where we are going

Confidential

www.exponential-e.com

THE STRATEGY, THE DIRECTION,

THE PARTNERSHIP

• Cyber Security Skills shortage:

• 1-2 million roles unfulfilled by end of 2019(Information Age/intel).

• 40% information cyber security roles unfulfilled in 2016 (ESG Report).

• $1Tr in products and services 2017-21(2nd Annual Cyber Investing Summit).

• Cyber Security budgets 25-30% of total IT Spend (IDC).

• $6Tr is the estimated annual cost to businesses globally of Cyber attacks by 2021.

• Protection of Sensitive Data (64%) and Compliance (57%) two highest profile spending categories for businesses (SANS Institute IT Security Spending Trends).

• The Exponential-e Portfolio has grown

• The Network Edge

• The Transmission

• The Visibility

• The Configuration

• The Service

• The End Point

• Advise, Augment and Support

www.exponential-e.com

CYBER SECURITYWITHIN EXPONENTIAL-E

SOCMONITOR, MANAGE,

ANALYSE, ADVISE

PACKAGES & PROGRAMMES

SALES OVERLAY 1 SALES OVERLAY 2

SOLUTIONS SUPPORT

SECURITY PRODUCTS & SERVICES

NETWORK GRC & TESTING

ENDPOINT CONSULTANCY

SECURITY CONSULTANCY

CONSULTANT 1 CONSULTANT 2

CHARGEABLE RESOURCEOPERATIONS COMPLIANCE

Head of Cyber Security Practice

Confidential

www.exponential-e.com

SOC SERVICES

Cyber Security Incident and Event Monitoring

www.exponential-e.com #digitalsecurity

C R E A T I N G M A R G I N V A L U E A N D A D V O C A C Y W I T H Y O U R C U S T O M E R B A S E

A L P K O S T E M - H E A D O F C H A N N E L

www.exponential-e.com #digitalsecurity

VALUE CREATING INVESTMENT & INNOVATION 2017/18

£5 million• Internet platform to 100GigE• National DWDM• Ark DC Spring Park• SDN (WAN and DC)

£2 million• Sales and Specialists• Customer Portal• UC-One Hub• Skype Cloud PBX gateway

£3 million• Capacity & new builds• Cloud Management

Platform

£1 million• Systems, automation and security• People

NETWORK

CLOUD

UCC

OTHER

www.exponential-e.com #digitalsecurity

INVESTING IN PRODUCTS AND PORTFOLIO

MANAGED SECURITY

• Leading vendors and network integration

• Securing the cloud, securing your business

• Accredited testing and consulting

• SIEM, SOC and managed services

CLOUD EXCELLENCE

• Added options for IaaS

• All-flash high performance storage

• Enterprise-classCo-Location with Ark

• Ensuring peace of mind for mission critical Data Management.

NETWORK EXPANSION

• 40 new PoPs across UK in 2016

• Including Belfast, Edinburgh, Darlington, Norwich, Bath, Canterbury.

• Promotions and planning

EMBRACING SDN

• Improve efficiencies on Network capacity

• Remove barriers for a seamless and secure transition to the cloud

• 3 years of R&D

• SDN-Managed Hosting

www.exponential-e.com #digitalsecurity

DON’T JUST TAKE OUR WORD FOR IT…

"I was always fascinated by one of your company’s missions “Peace-of-Mind-As-A-Service” and we experienced it first hand in the issues we faced last week. You put the

customer first, moved things at a rapid pace and got us back in action by resolving the

issue for our end customer.

L. RavichandranCOO, Tech Mahindra.

“We’ve increased individual clientrevenue FIVE FOLD by adding

Exponential-e’s Cloud services to our portfolio”

Stephen HarteHead of Technology, Opus Technology.

“We have worked with Exponential-e for 5 years and the partnership is based on mutual trust, open dialogue, regular

communication and a common goal”

Matt TorrensDirector, Sprout IT.

www.exponential-e.com #digitalsecurity

M ARGIN O PPO RTU NITY

• Internet• Unified Communication• Online Backup• Colocation

DOOR OPENERS: THE ENABLERS

• WANs• Cloud• VDC• Professional Services• Managed Services

THE OPPORTUNITY

www.exponential-e.com #digitalsecurity

P A R T N E R C A M P A I G N :R A N S O M W A R E - P R O T E C T I O N A T T H E C O R E

F O R E N D P O I N T S E C U R I T Y

N I A L L S H E F F I E L DS O L U T I O N E N G I N E E R , S E N T I N E L O N E

30© 2017 SentinelOne All Rights Reserved. Confidential

RANSOMWARE

NIALL SHEFFIELD

Protection at the core for endpoint security

31© 2017 SentinelOne All Rights Reserved. Confidential

EXCLUSIVE PARTNERSHIP EXPONENTIAL-E & SENTINELONE

SentinelOne is a

certified replacement

for Antivirus

Exponential-e is one

of the UK’s most

accredited providers

The #3 cloud hosting provider

The #1 retailer

The #1 internet television network

The #1 online travel chain

The #2 financial exchange

124 law firms

1 in 3 AIT accountancy firms

800 channel partners

2nd largest hotel group

Partner with world’s leading

companies

32© 2017 SentinelOne All Rights Reserved. Confidential

Endpoints are your organization’s

weakest link.

Endpoint platforms are diverse, and often drift from

standard configuration with frequent exposure to

unsecured networks.

95% OF BREACHES

ORIGINATE AT THE ENDPOINT

Endpoints are primary targets. This

is where sensitivity data lives.

33© 2017 SentinelOne All Rights Reserved. Confidential

AV IS NO MATCH FOR THE

NEW THREAT LANDSCAPE

Malware

Exploits

Live

Attacks

Document-based exploits

Browser-based exploits

Ransomware, trojans,

worms, backdoors

File-less / Memory-based

malware

Script-based: Powershell,

Powersploit, WMI, VBS

Credentials: credential-scraping,

Mimikatz, Tokens

34© 2017 SentinelOne All Rights Reserved. Confidential

390KNew Malicious code

samples per day

(According to AV-Test.org)

(1 Sample = 1 Signature)

TRADITIONAL AV

SOLUTIONS CANNOT KEEP

PACE

35© 2017 SentinelOne All Rights Reserved. Confidential

95%Of Malware types showed up

for less than 30 days

4 out of 5Malware variants lasted less

than 1 week

LEGACY AV VENDORS

CANNOT RESPOND FAST

ENOUGH

36© 2017 SentinelOne All Rights Reserved. Confidential

NGEP OFFERING ARE BASED ON DIFFERENT

PHILOSOPHIES, TECHNOLOGIES

Prevention focused

Includes HIPS, Anti-Exploit,

Application control

CAUTIONS:

Multiple agents, multiple tools

Same AV-related deficiencies

Scan file system and crunch

metadata to predict the

existence of threats

CAUTIONS:

Still limited to file-based

malware

Algorithm requires constant

tuning by experts

Threat detection based on

behavior and/or IOCs, coupled

with mitigation and forensics

CAUTIONS:

No prevention

Requires specialized personnel

operating in SOC capacity

Legacy AV + Add-onsScan-based

Predictive AnalysisEDR

37© 2017 SentinelOne All Rights Reserved. Confidential

Complete Visibility

Into all endpoint activity without any

performance drag

REAL-TIME, UNIFIED ENDPOINT PROTECTION

Advanced Static Prevention +

Dynamic Behavior Detection

To protect against threats across all

major vectors

Fully Automated

Threat mitigation and remediation

Go beyond prevention with a total protection platform. SentinelOne is the only platform that

defends every endpoint against every type of attack, at every stage in the threat lifecycle.

Certified Antivirus

replacement

Visionary

2017 Magic Quadrant for Endpoint Protection Platforms

38© 2017 SentinelOne All Rights Reserved. Confidential

2016 TO 2017

A DRAMATIC LEAP FORWARD

39© 2017 SentinelOne All Rights Reserved. Confidential

MULTI-LAYERED APPROACH ADDRESSES THE

ENTIRE THREAT LIFECYCLES

On ExecutionPre-Execution

Cloud Intelligence +

Whitelisting / Blacklisting

Post-Execution

Mitigation Remediation

Forensics

Dynamic Malware

Detection

Dynamic Exploit

DetectionAdvanced

Static Prevention

11010

101010

11001

40© 2017 SentinelOne All Rights Reserved. Confidential

SENTINELONE ENDPOINT PROTECTION PLATFORM

Dynamic

Whitelisting /

Blacklisting

Cloud

Intelligence

PREVENTION

DETECTIONRESPONSE

360-degree

Attack View

Forensics

Mitigation

Remediation

Rollback

Auto-immunize

Blocked files

& applications

File-based malware

APTs

File-less / Memory-only malware

Exploits & script-based attacks

Common

threats

Nation-grade

APTs

Advanced

Static

Analysis

PRE-EXECUTION POST-EXECUTIONON-EXECUTION

STATIC

PROTECTION

DYNAMIC

PROTECTION

Dynamic

Behavior

Detection

Single Autonomous

Agent

LIGHTWEIGHTMemory Footprint

Single

Management

Console

Cloud

or

On-Premise

Deployment

41© 2017 SentinelOne All Rights Reserved. Confidential

01

Superior Protection Against Advanced

Threats without Performance Overhead

BENEFITS

02

Automated Threat Mitigation at Machine

Speed

03

Visualize Attacks with Real-time Forensics

05

Protect User Endpoints and Data Center

Servers with a Single Platform

06

Manage User Endpoints and Data Center

Servers using a Single Server (or Console)

07

Easily Deployable Across Enterprise-scale

Environment

04

Seamlessly Adapt Against the Latest Threats08

Cut TCO by up to 5x over Multi-solution

Approaches

42© 2017 SentinelOne All Rights Reserved. Confidential

MULTI-SOLUTION VS. UNIFIED APPROACH

Advanced Static Prevention

+ Whitelisting / blacklisting

Pre-Execution

Mitigation

Remediation

Post-Execution

Forensics

Dynamic Malware Detection

Dynamic Exploit Detection

On Execution

Multi-Solution Approach

En

dp

oin

t P

rote

cti

on

Pla

tfo

rm

Unified Approach

Single,

lightweight

agent

Single

management

console

Fewer FTEs

Reduced TCO

Multiple

agents

Multiple

management

consoles

More FTEs

> 4x TCO of

SentinelOne

43© 2017 SentinelOne All Rights Reserved. Confidential

BEST-IN-CLASS NEXT-GEN ENDPOINT PROTECTION

Certified Proven Recognized

Visionary - 2017 MQ

for Endpoint Protection PlatformsThe #3 cloud hosting provider

The #1 retailer

The #1 internet television

network

The #1 online travel chain

The #2 financial exchange

Our customers include:SentinelOne is a certified

replacement for Antivirus

44© 2017 SentinelOne All Rights Reserved. Confidential

PROTECTION FROM RANSOMWARE. WARRANTED

SentinelOne detects and remediates ransomware

attacks AND financially backs its products

With the SentinelOne Cyber Warranty:

Customers will be compensated for any

successful ransomware attack

Up to $1,000 per affected endpoint

Up to $1M total

45© 2017 SentinelOne All Rights Reserved. Confidential

2017 GARTNER MAGIC QUADRANT

FOR ENDPOINT PROTECTION PLATFORMS

46© 2017 SentinelOne All Rights Reserved. Confidential

“…SentinelOne has had stellar growth in the enterprise

EPP market, and expects it to continue for the next

couple of years as it maintains a reputation as a leading

NGAV vendor.”

A Visionary

Gartner 2017 Magic Quadrant Endpoint Protection Platform

Gartner, Magic Quadrant for Endpoint Protection

Platforms,

30 January 2017

Gartner does not endorse any vendor, product or service

depicted in its research publications, and does not advise

technology users to select only those vendors with the

highest ratings or other designation. Gartner research

publications consist of the opinions of Gartner's research

organization and should not be construed as statements of

fact. Gartner disclaims all warranties, expressed or implied,

with respect to this research, including any warranties of

merchantability or fitness for a particular purpose.

A VISIONARY ON

THE GARTNER MQ

47© 2017 SentinelOne All Rights Reserved. Confidential

2016 TO 2017

A DRAMATIC LEAP FORWARD

48© 2017 SentinelOne All Rights Reserved. Confidential

NSS LABS

2017 AEP TEST REPORT

49© 2017 SentinelOne All Rights Reserved. Confidential

SENTINELONE EARNS ‘RECOMMENDED’ RATING

FROM NSS LABS

2017 AEP REPORT HIGHLIGHTS:

100% block rate rating for malware and exploits

across six categories

Leading TCO rating

99.8% security effectiveness rating

50© 2017 SentinelOne All Rights Reserved. Confidential

SENTINELONE EPP: TOP TCO PER PROTECTED

ENDPOINT

51© 2017 SentinelOne All Rights Reserved. Confidential

AV-TEST.ORG

DECEMBER 2016

52© 2017 SentinelOne All Rights Reserved. Confidential

AV-TEST (MACOS) REPORT (DEC 2016)

100% MacOS malware detection

>99% MacOS X PUA

>99% Windows malware detection

0% FPs

6/6 Performance score

53© 2017 SentinelOne All Rights Reserved. Confidential

AV-TEST (MACOS) REPORT (DEC 2016)

LOWEST

PERFORMANCE IMPACT:

242 sec.(for copying 27.3 GB of files

and downloading test files)

54© 2017 SentinelOne All Rights Reserved. Confidential

AV COMPARATIVES

NOVEMBER 2016

55© 2017 SentinelOne All Rights Reserved. Confidential

AV COMPARATIVES TEST REPORT (NOV 2016)

RTTL (AMTSO real-time threat list)

AVC (500 most recent, prevalent samples)

WPDT (real-world testing)

FPs (false positives)

56© 2017 SentinelOne All Rights Reserved. Confidential

AV COMPARATIVES TEST – EXPLOIT PROTECTION

(NOV 2016)

TESTS: 10 RIG EK (Rig-E, Rig-V, Rig standard)

2 Sundown EK

3 Metasploit

1 Powershell Empire

1 Metasploit Macro

1 Locky macro

1 Dridex macro

1 Dridex OLE

57© 2017 SentinelOne All Rights Reserved. Confidential

THANK YOU