Symantec Threat Protection - 5 KEY...
Transcript of Symantec Threat Protection - 5 KEY...
$5.4Million
40%
5 KEY FINDINGSON ADVANCED THREATS
Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses.
Many companies are already compromised by advanced threats and don’t even know it.
Large companies saw a 40% increase of advanced attacksin 2014 over the previous year
INCREASE OFADVANCED ATTACKS
ADVANCED THREATSAND DATA BREACHESARE ON THE RISE
Source: 2015 ISTR Volume 20
Why?
When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business.
Companies are struggling to limit breach impact and contain exposure.
OF MALWARE WAS VIRTUAL MACHINE AWARE
CURRENT PREVENTIONAND DETECTIONMETHODS FALL SHORT
Source: 2015 ISTR Volume 20
Why?
Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions. With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it.
With all internal discovery methods combined, only 9% of victims discovered data breaches of their own accord
OF VICTIMS DISCOVEREDDATA BREACHES
THEMSELVES
MORE TECHNOLOGYDOES NOT EQUALBETTER DETECTION
Source: 2014 Data Breach Investigations Report,” Verizon, 2014
Why?
IT struggles to cope with the massive amounts of incidents, investigating too many false positives.
Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late.
66% of breaches took months to years to discover a breach, 3 months to find a breach and 4 months to resolve
BREACHES TOOK MONTHSTO YEARS TO DISCOVER
INCIDENT RESPONSEIS TAKING TOO LONG
Source:: Verizon DBIR 2013
66%
Why?
Breaches cost organizations time to identify, respond and resolve threats.
Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all.
ORGANIZATIONALCOST OF DATA BREACH
IS $5.4 MILLION
THE COST OF ADATA BREACH IS SIGNIFICANT
Source: Ponemon Institute 2013 Cost of a Data Breach Research Report
Part #21356413
Why?
28%
9%
LEARN MORE ABOUT SYMANTEC ADVANCED THREAT PROTECTION AT symantec.com/advanced-threat-protection
IMPLEMENT A UNIFIED ADVANCED THREATPROTECTION SOLUTION THAT ALLOWS YOU TO:
WHAT CAN YOU DO?
Detect advanced threats with better visibility and intelligence
across all your networks, endpoints, and emails
Provide the ability to respond to security incidents within minutes and remediate confirmed threats
Ease the burden on resources and make it possible for IT,
security operations and advanced security teams to
protect their business efficiently
ADVANCING SECURITY.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names
may be trademarks of their respective owners.
28% of malware was virtual machine aware in 2014
Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices.Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology.