Your Mission: Identify & Eliminate Cyber Attacks

1
loss of intellectual property loss of financial data compliance penalties and fines lost customer confidence lost revenue loss of customer data 70% 60% 50% 40% 30% 20% 10% 0% Your Mission IDENTIFY AND ELIMINATE CYBER ATTACKS. Should your mission fail, the business will suffer Zero-day attacks Advanced targeted attacks (ATA) Unidentified malware Advanced persistent threat (APT) It is your responsibility to find the THREATS don’t find out from a service provider, partner, auditor or other third party 0 10 20 30 40 50 60 57% 54% 45% 37% 30% 25% 23% 19% 5% 5% Advanced persistent threats Root kits SQL and code injection Clickjacking Watering hole attacks Registration spamming Login attacks Contact form on comment spam Cross -site scripting Other Situation Report Source: Ponemon Live Threat Intelligence Report, 2013 Source:Ponemon Live Threat Intelligence report 2013 78% of respondents rate traditional tools such as SIEM, IDS, IAM and Firewalls between 1 and 6 (out of 10) for their effectiveness in delivering threat intelligence. 78% 57% say the intelligence currently available to their enterprises is often too stale to enable them to grasp and understand the strategies, motivations, tactics and location of attackers. 57% 69% of organizations are not fully confident they could detect an important security issue before it had a significant impact. 69% Don't operate in the dark 63% of compromise victims were notified by an external entity. 63% You need Real-Time Actionable Intelligence to succeed in your mission. EMA research indicates that just 38% of organizations have deployed Advanced Security Analytics (ASA) systems. of organizations conduct research manually of organizations find it too difficult to distinguish legitimate from malicious activity of organizations are unable to consistently prioritize response based on relative potential impact to the organization 55% 41% 41% 55% 43% 43% 0 10 20 30 40 50 60 Organizations that utilize enabling technologies providing actionable intelligence are 7x more successful in stopping security exploits (Ponemon Live Threat Intelligence report 2013) Lower Resolution Cost Leverage Machine Learning to adapt to new threats. Mitigate New Attacks 97% of organizations that are users of actionable security intelligence believe live intelligence has made their security defense stronger 100 Source: Ponemon Live Threat Intelligence Report, 2013 Action within 60 seconds of an incident can reduce the resolution cost of a breach by an average of 40%. 100 40% Source: Ponemon Live Threat Intelligence Report, 2013 60 seconds $ Engage Infection Verification Pack and Integrate with Firewalls, IPS defenses to accelerate threat mitigation response. Cyphort Customer Evaluations show response times improve by as much as 75%. 47% of companies regard machine learning tools as a key data source for security analysis. Engage Static and Behavioral inspection using multiple evaluation technologies. Monitor and Analyze all network communications ANYWHERE IN YOUR ENVIRONMENT with NO APPLIANCE COSTS using virtual machine technology. Automatically analyze and correlate events with Live Actionable Intelligence to prioritize and neutralize threats by risk rating. Reduce Resolution Time www.cyphort.com Was the company unable to stop a security exploit because of outdated or insufficient intelligence? Yes No Unsure Source: EMA Data Driven Security Report, 2014 Source: Mandiant 2013 Security Gap Report Source: Ponemon Live Threat Intelligence Report, 2013 http://www.cyphort.com/technology http://www.cyphort.com/technology is your best chance for to Accomplish your Mission Source: EMA Data Driven Security Research, 2014 97% Time is of the Essence Act Now! Real-Time Actionable Intelligence Real-Time Actionable Intelligence Source: EMA Data Driven Security Research, 2014 Contact to get a glimpse of our detection technology with free online malware scanning service at http://www.cyphort.com/infographic 38% 62% others 28% Greater than Expected Value 67% Expected Value 95% of those organizations achieved equal or greater value than expected. Deployed Advanced Security Analytics 6% Lower than Expected Value Identify Compromised Systems Source: Ponemon Live Threat Intelligence Report, 2013

description

This Enterprise Management Associates (EMA) analyst infographic provides insight into cyber security.

Transcript of Your Mission: Identify & Eliminate Cyber Attacks

Page 1: Your Mission: Identify & Eliminate Cyber Attacks

loss of intellectual property

loss of financial data

compliance penalties and fines

lost customer confidence

lost revenue

loss of customer data

70%

60%

50%

40%

30%

20%

10%

0%

YourMission

IDENTIFY AND ELIMINATE CYBER ATTACKS.

Should your mission fail , the business will suffer

Zero-day attacks

Advanced targeted

attacks (ATA) Unidentified malware

Advanced persistent threat (APT)

It is your responsibility to find the THREATS – don’t find out from a service

provider, partner, auditor or other third party

0 10 20 30 40 50 60

57%

54%

45%

37%

30%

25%

23%

19%

5%

5%

Advanced persistent threats

Root kits

SQL and code injection

Clickjacking

Watering hole attacks

Registration spamming

Login attacks

Contact form on comment spam

Cross -site scripting

Other

Situation Report

Source: Ponemon Live Threat Intelligence Report, 2013

Source:Ponemon Live Threat Intelligence report 2013

78% of respondents rate traditional tools such as SIEM, IDS, IAM and

Firewalls between 1 and 6 (out of 10) for their effectiveness in delivering

threat intelligence.

78%

57% say the intelligence currently available to their enterprises is often

too stale to enable them to grasp and understand the strategies,

motivations, tactics and location of attackers.

57%

69% of organizations are not fully confident they could detect

an important security issue before it had a

significant impact.

69%

Don't operate in the dark

63% of compromise victims werenotified by an external entity.

63%

You need Real-Time Actionable Intelligence to succeed in your mission.

EMA research indicates that just 38% of organizations have deployed Advanced Security Analytics (ASA) systems.

of organizations conduct research manually

of organizations find it too difficult to distinguish legitimate from malicious activity

of organizations are unable to consistently prioritize response based onrelative potential impact to theorganization

55% 41%

41%

55%

43%

43%

0

10

20

30

40

50

60

Organizations that utilize enabling technologies providing actionable intelligence are 7x more

successful in stopping security exploits(Ponemon Live Threat Intelligence report 2013)

Lower Resolution Cost

Leverage Machine Learning to adapt to new threats.

Mitigate New Attacks

97% of organizations that are users of actionable security intelligence believe live intelligence has made their

security defense stronger

100Source: Ponemon Live Threat Intelligence Report, 2013

Action within 60 seconds of an incident can reduce the resolution cost of a

breach by an average of 40%.

100

40%

Source: Ponemon Live Threat Intelligence Report, 2013

60seconds

$

Engage Infection Verification Pack and Integrate with Firewalls, IPS defenses to accelerate threat mitigation response. Cyphort Customer Evaluations show response times improve by as much as 75%.

47% of companies regard machine learning tools as a key data source for security analysis.

Engage Static and Behavioral inspection using multiple evaluation technologies.

Monitor and Analyze all network communications ANYWHERE IN YOUR ENVIRONMENT with NO APPLIANCE COSTS using virtual machine technology.

Automatically analyze and correlate events with Live Actionable Intelligence to prioritize and neutralize threats by risk rating.

Reduce Resolution Time

www.cyphort.com

Was the company unable to stop a security exploit because of outdated or insufficient intelligence?

YesNo

Unsure

Source: EMA Data Driven Security Report, 2014

Source: Mandiant 2013 Security Gap Report

Source: Ponemon Live Threat Intelligence Report, 2013

http://www.cyphort.com/technology

http://www.cyphort.com/technology

is your best chance for to Accomplish your Mission

Source: EMA Data Driven Security Research, 2014

97%

Time is of the EssenceAct Now!

Real-TimeActionable Intelligence

Real-Time Actionable Intelligence

Source: EMA Data Driven Security Research, 2014

Contact to get a glimpse of ourdetection technology with free online malwarescanning service at http://www.cyphort.com/infographic

38%62%others

28% Greater than Expected Value

67% Expected Value

95% of those organizationsachieved equal or greater

value than expected.Deployed Advanced

Security Analytics

6% Lower than Expected Value

Identify Compromised Systems

Source: Ponemon Live Threat Intelligence Report, 2013