Sophos

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

$760,000

$760,000 is the average cost of cleaning up a ransomware attack when you add in all the remediation and lost revenue.

Credential theft

33% of organizations suffering a cloud security incident had their cloud account credentials stolen

4 in 10

4 in 10 IT managers that say prioritizing improved efficiency is on their to-do list for the year.

48%

48% of IT managers that say they plan to incorporate human-led threat hunts within the next year to identify attacker activity that may not be detected by security tools.

51%

51% of IT managers that admit they were hit by ransomware last year and the cybercriminals succeeded in encrypting their data 73% of the time.

62%

62% of cyberattacks affect SMBs

65%

65% of IT managers say they use an MSP, either exclusively or in tandem with in-house resources.

Cloud security breaches

66% of organizations using public cloud have been breached due to a security misconfiguration

Cloud security incidents

70% of organizations using public cloud suffered a security incident in the last 12 months.

71%

71% of IT managers who are using the public cloud that admit they had a security incident in the last year. The need for information, advice and protection for cloud environment has never been greater.

75%

75% of malware is unique to a single organization

How long are deal registrations valid for?

90 days

Cloud security confidence

96% of organizations are concerned about their current level of cloud security

What is Rapid Response

A lightning fast service that investigates active threats in an organization which is in the throes of an active attack

Apart from a comprehensive IT solution, which of the following is a key component to defend yourself against attacks?

A strong IT team

Predictive Prevention

AI everywhere Anti-ransomware Anti-exploit

Prioritized Risk

AI-prioritized threat hunting Guided recommendations and response

Where was Sophos founded?

Abingdon (Oxford), UK

Optimized Profitability

Accelerate your business and be responsive to the needs of today's cybersecurity buyer: -Powerful platform for cross-sell and upsell -Lucrative margin-retention opportunities with deal registration discounts for new and growing business -MSP revenue multiplier

Engineer

Aimed at technical individuals the Engineer courses enable students to learn how to demo our core products, including Central Endpoint and Server and XG Firewall. The courses include simulations which allow students to interact with the products in a safe environment and get further exposure to their functionality.

Central Management

All security products managed from same console Reduced time on security management, alert/log review, incident response RMM/PSA integration APIs for customers, partners, vendors

Enterprise detection

Anomalies in behavior, applications, network traffic Enterprise threat hunting Prioritized alerts and actions Live discover and response

Anti-exploit

Anti-exploit programs provide an additional layer of security by blocking the techniques attackers use. Anti-exploit technology stops threats before they become an issue by recognizing and blocking common malware delivery techniques, thus protecting endpoints from unknown threats and zero-day vulnerabilities.

The Engineer Certification is a prerequisite to which other technical certification?

Architect Technician

Advanced Adversary Mitigations

As attackers have increasingly focused on techniques beyond malware in order to move around systems and networks as a legitimate user, Intercept X detects and prevents attackers from gaining a presence and remaining undetected on a victims' networks. Intercept X uses a range of techniques to do this including credential theft prevention, code cave utilization detection and APC protection.

$761,106

Average remediation cost

13 hours

Average time that the most significant threat was in the organization's environment before it was detected

What are the advantages of Sophos EDR vs. the competion?

Award winning solution, built on the strongest protection, single agent and console (all of the above)

Which of the below are Core Products?

Central Device Encryption Central Intercept X Advanced XG Firewall

Match the accreditation with the Architect certifications required to achieve it

Central Endpoint and Server Accreditation - 2 x Central Endpoint & Server Architects

Which of the following Intercept X features prevents attackers from gaining access and remaining undetected on a network?

Code cave utilization Credential Theft prevention APC protection

Which of the below are benefits of Intercept X?

Combines a series of technologies to protect against a range of threats Employs deep learning to enable Sophos to detect unknown malware

84%

Companies with cybersecurity insurance

64%

Companies with cybersecurity insurance that covers ransomware

For brand new Sophos customers, what is the first step which they must do as part of the on boarding process?

Create a Sophos Central account

What are the top problems which version 10 is solving?

Critical application performance protection from ransomware and threats lack of visibility into encrypted traffic

Cryptojacking

Crypto mining + hijacking Cumulative electricity costs Reduced computing power Reputational and regulatory issues

Cryptoguard

CryptoGuard is a signature-less system that analyzes software in real time and shuts down processes attempting to encrypt documents maliciously. The system stores copies of potentially exposed files in a separate location for safekeeping while assessing executables, and automatically reverts documents impacted by a ransomware attack to their pre-encrypted state. It is a great protector against ransomware.

What is the biggest concern for people using cloud services?

Data security

Cloud data security

Data security is the biggest concern facing organizations who use cloud services

What does the Advanced tier of MTR provide that Standard does not?

Deeper threat hunting Several more ways for organizations to communicate directly with the MTR team

EDR

EDR (endpoint detection and response) is an add on to Intercept X that allows for the detection and investigation of suspicious activity with AI-driven analysis. It allows customers to add expertise rather than headcount by replicating the skills of hard-to-find analysts. You can learn more about EDR in the EDR module.

Endpoint Detection and Response

Endpoint detection and response (EDR) is a specific type of security focusing on endpoint devices. It is often described as the use of a central data repository to observe and analyze endpoint vulnerabilities and work toward stronger endpoint threat response.

Trusted Partnership

Expand your security expertise with best-in-class support, helping you engage and win: -Dedicated pre- and post-sales technical teams -Competitive intelligence, product and threat training -Channel sales and marketing resources to ensure success

Exploit Prevention

Exploit prevention stops the techniques used in file-less, malware-less and exploit-based attacks. While there are millions of pieces of malware and thousands of software vulnerabilities waiting to be exploited, there are only a handful of exploit techniques attackers rely on as part of the attack chain, by taking away the tools hackers love to use Intercept X stops zero-day attacks before they can get started.

True or False: Sophos EDR can be licensed as a stand-alone product.

False

True or False: Sophos only provides products to protect businesses.

False

True or false: Attackers can use limitless numbers of exploit techniques as part of the attack chain making stopping zero-day attacks almost impossible.

False

True or false: Up-to-date anti-virus protection is enough to stop cybersecurity threats

False

What are the key benefits of Sophos EDR?

For IT operator and threat hunting, managed as a stand-alone product, add expertise, not headcount, built on the strongest protection

Cybersecurity Evolved

Give your customers the best protection against modern threats with next-gen cybersecurity. -Broadest set of award-winning products -Integrated together in a synchronized-security system -Powered by AI and managed in the cloud

51%

Hit by ransomware last year

Which of the following questions would help uncover management pain?

How many vendors are they using for IT security? What is taking the most of their time with IT security?

What does the new SSL inspection feature do?

Increases processing speeds by up to 2x previous XG versions Allows for simple and flexible policies Supports TLS 1.3

Anti-ransomware

Intercept X provides advanced protection technologies that disrupt the whole attack chain. For example deep learning predictively prevents attacks, and CryptoGuard rolls back unauthorized encryption of file in seconds.

Deep Learning Technology

Intercept X transforms from a reactive to a predictive approach to protect against both known and never-seen-before threats. While many products claim to use machine learning, deep learning consistently outperforms other machine learning models for malware detection.

Which of the following was found to be the most common threat vector?

It varies by country

What is changing in the new program?

MSP Multiplier Deal Registration Incumbency

Which of the products listed below is a fully managed service providing expertise in threat hunting, detection, and response?

MTR

MTR

MTR (Managed Threat Response) is another add-on to Intercept X which provides 24/7 threat hunting, detection and response capabilities delivered by an expert team as a fully-managed service. MTR fuses machine learning technology and expert analysis for improved threat hunting and detection, deeper investigation of alerts and targeted actions to eliminate threats. You can learn more about MTR in the MTR module.

Machine Learning

Machine learning is a a subset of AI (Artificial Intelligence) involved in the creation of algorithms which can modify itself without human intervention. Deep learning is the evolution of Machine Learning where there are numerous layers of algorithms, each providing a different interpretation to the data it feeds on. This network of algorithms, called neural networks, allows for data to be processed more accurately and quicker than through Machine Learning alone.

Deal registration is available for:

New business Existing customer upgrading

Sophos Partner Program

Optimized Profitability Trusted Partnership Cybersecurity Evolved

Which of the following was found to be the most common threat type?

Phishing

Types of Threats

Portable Executables (malware) Potentially Unwanted Applications (PAU) Active Adversary Techniques Ransomware Exploits and File-less Attacks

Shared Intelligence

Predictive and adaptive intelligence across user, apps, devices, data Real-time analysis and response Integrate and interpret threat feeds

What are the primary objectives of a cyber security system?

Protect Detect Respond

Which of the following are tasks that you can do in the Sophos Partner Portal?

Register a deal Access Marketing Tools and Resources Manage leads Access Training and Certification

What type of renewals are eligible for incumbency discounts?

Renewals of the same Core Product to the same customer

Which of the below certifications is required for all accreditations?

Sales Consultant

Which of the following are Sophos Certifications?

Sales Consultant Engineer Architect Technician

Sophos Core Products

Sophos Central XG Firewall Intercept X Endpoint Detection Response (EDR) Managed Threat Response (MTR) Cloud Optics Sophos Home Sophos OEM

24%

Success rate of criminals in encrypting their victim's data

Match the accreditation with the Architect certifications required to achieve it

Synchronized Security Accreditation - 1 x Central Endpoint & Server Architect AND 1 x XG Firewall Architect

Automated response

Synchronized security Automated incident response, network access, threat removal Breach prevention by blocking lateral movement

True or False: A non-incumbent partner can submit a deal registration for an upgrade

True

True or False: Intercept X has the ability to be more predictive in the protection it provides rather than providing reactive protection

True

True or False: Sophos Central is a single management console that allows customers to manage all their Sophos products from one place.

True

True or False: Sophos XG Firewall provides cloud sandboxing.

True

True or False: The majority of malware is unique to a single organization

True

True or False: platinum partners require at least one Certified Technician certification

True

True or false: MTR is a human-led service.

True

26%

Victims who paid the ransom and got the data back

Match the accreditation with the Architect certifications required to achieve it

XG Firewall Accreditation - 2 x XG Firewall Architect

Technician

allow students to learn how to provide first-level support to their customers.

Architect

allows students to get a deeper understanding of the products and how to deploy them at customer sites include lab work which allow students to get their hands on the product and navigate around guided work to reinforce the knowledge of the product theory.

Traditional

combination of signatures and heuristics

Sophos Sales Consultant

covers how to sell our core set of products, XG Firewall, Intercept X, EDR and MTR along with a deeper dive into our Partner Program.

Unmatched Efficiency

enables you to optimize IT resources and security; delivered through central management, shared intelligence, and prioritized risk

Phishing

fake electronic messages to gain sensitive information: username, password, birthday, social security, driving license; aims to steal personal or company data, sell the data illegally, use the data to commit crime

Unmatched Protection

fewer security incidents to respond to; delivered through predictive prevention, enterprise detection, and automated response

79%

organizations who agree that recruiting people with the right cyber security skills is a challenge

17%

organizations who don't know how long the threat was in their environment before it was found

20%

organizations who don't know how the most significant attack to hit them got into their organization

80%

organizations who wish they had a stronger team in place to detect, investigate, and respond to security incidents

Server Lockdown

prevents unauthorized programs running on servers and receive notifications if attempts are made to tamper with critical files

Simple deployment for mixed estates

rapid deployment across cloud, on-premises, and virtual servers, even in multi-cloud and mixed server environments

Ransomware

scrambled data + decryption key + $$ malware, phishing emails,

Centralized management

see and manage all servers from one console whether they are in the cloud, on-premise or virtual

Exploits

vulnerability - bug that causes software to behave in a way that causes reduced security abuse vulnerabilities implant malware, get foothold in network, investigate data to steal


संबंधित स्टडी सेट्स

Comma Splices and Fused Sentences (run ons)

View Set

Chapter 62: Musculoskeletal Trauma and Orthopedic Surgery (Lewis)

View Set

numbers 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20 which number is missing from the title

View Set

EMERGENCY! YOUR FIRST AID ANSWERS

View Set

Unit 3 - Arithmetic Sequence Quiz

View Set

Week 15Theo Chocolate's objective to operate business in a way that provides wide ranging benefits to the community is an example of:

View Set