Your Mission: Identify & Eliminate Cyber Attacks
-
Upload
enterprise-management-associates -
Category
Technology
-
view
70 -
download
1
description
Transcript of Your Mission: Identify & Eliminate Cyber Attacks
loss of intellectual property
loss of financial data
compliance penalties and fines
lost customer confidence
lost revenue
loss of customer data
70%
60%
50%
40%
30%
20%
10%
0%
YourMission
IDENTIFY AND ELIMINATE CYBER ATTACKS.
Should your mission fail , the business will suffer
Zero-day attacks
Advanced targeted
attacks (ATA) Unidentified malware
Advanced persistent threat (APT)
It is your responsibility to find the THREATS – don’t find out from a service
provider, partner, auditor or other third party
0 10 20 30 40 50 60
57%
54%
45%
37%
30%
25%
23%
19%
5%
5%
Advanced persistent threats
Root kits
SQL and code injection
Clickjacking
Watering hole attacks
Registration spamming
Login attacks
Contact form on comment spam
Cross -site scripting
Other
Situation Report
Source: Ponemon Live Threat Intelligence Report, 2013
Source:Ponemon Live Threat Intelligence report 2013
78% of respondents rate traditional tools such as SIEM, IDS, IAM and
Firewalls between 1 and 6 (out of 10) for their effectiveness in delivering
threat intelligence.
78%
57% say the intelligence currently available to their enterprises is often
too stale to enable them to grasp and understand the strategies,
motivations, tactics and location of attackers.
57%
69% of organizations are not fully confident they could detect
an important security issue before it had a
significant impact.
69%
Don't operate in the dark
63% of compromise victims werenotified by an external entity.
63%
You need Real-Time Actionable Intelligence to succeed in your mission.
EMA research indicates that just 38% of organizations have deployed Advanced Security Analytics (ASA) systems.
of organizations conduct research manually
of organizations find it too difficult to distinguish legitimate from malicious activity
of organizations are unable to consistently prioritize response based onrelative potential impact to theorganization
55% 41%
41%
55%
43%
43%
0
10
20
30
40
50
60
Organizations that utilize enabling technologies providing actionable intelligence are 7x more
successful in stopping security exploits(Ponemon Live Threat Intelligence report 2013)
Lower Resolution Cost
Leverage Machine Learning to adapt to new threats.
Mitigate New Attacks
97% of organizations that are users of actionable security intelligence believe live intelligence has made their
security defense stronger
100Source: Ponemon Live Threat Intelligence Report, 2013
Action within 60 seconds of an incident can reduce the resolution cost of a
breach by an average of 40%.
100
40%
Source: Ponemon Live Threat Intelligence Report, 2013
60seconds
$
Engage Infection Verification Pack and Integrate with Firewalls, IPS defenses to accelerate threat mitigation response. Cyphort Customer Evaluations show response times improve by as much as 75%.
47% of companies regard machine learning tools as a key data source for security analysis.
Engage Static and Behavioral inspection using multiple evaluation technologies.
Monitor and Analyze all network communications ANYWHERE IN YOUR ENVIRONMENT with NO APPLIANCE COSTS using virtual machine technology.
Automatically analyze and correlate events with Live Actionable Intelligence to prioritize and neutralize threats by risk rating.
Reduce Resolution Time
www.cyphort.com
Was the company unable to stop a security exploit because of outdated or insufficient intelligence?
YesNo
Unsure
Source: EMA Data Driven Security Report, 2014
Source: Mandiant 2013 Security Gap Report
Source: Ponemon Live Threat Intelligence Report, 2013
http://www.cyphort.com/technology
http://www.cyphort.com/technology
is your best chance for to Accomplish your Mission
Source: EMA Data Driven Security Research, 2014
97%
Time is of the EssenceAct Now!
Real-TimeActionable Intelligence
Real-Time Actionable Intelligence
Source: EMA Data Driven Security Research, 2014
Contact to get a glimpse of ourdetection technology with free online malwarescanning service at http://www.cyphort.com/infographic
38%62%others
28% Greater than Expected Value
67% Expected Value
95% of those organizationsachieved equal or greater
value than expected.Deployed Advanced
Security Analytics
6% Lower than Expected Value
Identify Compromised Systems
Source: Ponemon Live Threat Intelligence Report, 2013