encrypted trafficgo.sentinelone.com/rs/327-mnm-087/images/threats and encrypted... · 2018-04-10...

1
Encrypted Traffic: The Blind Spot Most network traffic today is encrypted. While encryption improves privacy, it blocks security products from traffic inspection. It lets attackers hide their activities in the encrypted traffic and apply phishing and data exfiltration techniques. Our research with 500 global business leaders shows that phishing continues to be a significant problem. End users are the most vulnerable in the enterprise attack surface. 66% experienced ransomware originating from a phishing email or social network link 44% experienced drive-by-downloads from a compromised website click The Problem How Does SentinelOne Solve the Problem? SentinelOne Deep Visibility is an automated EDR capability that provides encrypted traffic visibility. SentinelOne’s unified agent enables visibility without changes to network topography or certificates. Threat hunting data is much richer with the ability to see more, including phishing attempts and data leakage across all assets and users. Automated watch lists allow findings to be instantly tabulated for SOC analysts to be more efficient and save time. FEATURE SPOTLIGHT + 1 855 868 3733 [email protected] + 1 855 868 3733 [email protected] Global IT Systems Administrator Industry Services Role Security and Risk Management Firm Size 500M - 1B USD Last Update April 10, 2018 From deployment, to monitoring, and mitigating threats, this endpoint has gone above and beyond and allows me to sleep at night http://bit.ly/s1-servi1 Reviewer Profile

Upload: others

Post on 09-Aug-2020

10 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: Encrypted Trafficgo.sentinelone.com/rs/327-MNM-087/images/Threats and encrypted... · 2018-04-10  · The Blind Spot Most network traffic today is encrypted. While encryption improves

Encrypted Traffic: The Blind Spot

Most network traffic today is encrypted. While encryption improves privacy, it blocks security

products from traffic inspection. It lets attackers hide their activities in the encrypted traffic and

apply phishing and data exfiltration techniques.

Our research with 500 global business leaders shows that phishing continues to be a significant

problem. End users are the most vulnerable in the enterprise attack surface.

● 66% experienced ransomware originating from a phishing email or social network link

● 44% experienced drive-by-downloads from a compromised website click

The Problem

How Does SentinelOne

Solve the Problem?

SentinelOne Deep Visibility is an automated EDR capability that provides encrypted traffic visibility.

SentinelOne’s unified agent enables visibility without changes to network topography or certificates.

Threat hunting data is much richer with the ability to see more, including phishing attempts and data

leakage across all assets and users. Automated watch lists allow findings to be instantly tabulated for

SOC analysts to be more efficient and save time.

FEATURE SPOTLIGHT

+ 1 855 868 [email protected]+ 1 855 868 [email protected]

Global IT Systems Administrator

Industry Services

Role Security and Risk Management

Firm Size 500M - 1B USD

Last Update April 10, 2018

From deployment, to monitoring, and mitigating threats, this endpoint has gone above and beyond and allows me to sleep at night

http://bit.ly/s1-servi1

Reviewer Profile