Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
14 March 2018
����������-���
We Live In A World Where Current Tools Force Security Teams To Play By Old Rules
Device Centric | Not Integrated | Not Automated | Force Lots Of Manual Effort | Unable To Adapt
3 2016 Verizon Data Breach Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf
THE DATA DEMONSTRATE THE CHALLENGE
92% of Compromises happen within Minutes
93% of Compromises take Days, Weeks or Monthsto Discover.
DETECT & RESPOND IS NOT KEEPING PACE WITH THE ACCELERATION & SOPHISTICATION OF ATTACK
SECURITY OPERATIONS’ ABILITY TO
THIS IS NOT THE PROBLEM
5
Ransomware surge source: https://www.icsalabs.com/todays-hottest-threatsVerizon Data Breech Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdfSymantec Internet Security Threat Report: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdfCyber security Statistics and Facts: http://expandedramblings.com/index.php/cybersecurity-statistics/4 cybersecurity stats that will blow you away: http://www.fool.com/investing/2016/11/13/4-cybersecurity-stats-that-will-blow-you-away.aspxOctober 2016 Cyber Attack Statistics: http://www.hackmageddon.com/2016/11/16/october-2016-cyber-attacks-statistics/
16% Of all cyber incidents
last year according
to Verizon
12,000% Increase in ransomware attempts measured by ICSA Labs Q4 2015 – Q3 2016
95% Of all Web Application Attacks
Are Financially Motivated
according to Verizon
$6.5 millionAverage cost of a data breach
$154 Estimated average cost per
stolen record in a data
breach
1.3 millionAverage number of identities
exposed per breach
according to symantec
36%Annual Increase in malware variants
$2.1 trillionExpected cost of handling cyberattacks globally by 2019 according to Lloyd’s & Juniper Research
43%Data breaches caused
internally according to Intel
52%Percent of companies
expecting a successful
cyberattack in the next year
according to CyberEdge Group 55%Of Attacks Are Made Up Of Malware, Account Hijacking
& Targeted Attacks according to hackmageddon.com
WannaCry
Petya
GoldenEye
Spectre DoublePulsar
FalsePositivesFalseNegatives
Too Many
Alerts
EternalBlue
Meltdown
IT IS THE NOISE THAT HIDES THE PROBLEM
IT IS DETECTION WITHOUT
UNDERSTANDING
IT IS INSIGHT WITHOUT
ACTION
IT IS TIME FOR SECURITY OPERATIONS TO TRANSFORM
WHAT IF SECURITY OPERATIONS’
EFFECTIVENESS & EFFICIENCY
COULD INCREASE
BY 10 TO 20 TIMES?
20X BIGGER!
The Fidelis ADR Platform
Agents
HIGHLIGHTS
• Complete Visibility Broad & Deep Across Network & Endpoints
• Automated Detection Across A Universe Of Detectors, Intelligence & Analytics
• Automated Response From Investigation Through Validation, Correlation, Expulsion & Custom Workflows
• Deception to lure attackers into Decoy, deceive, analyze and protect.
Operational ThreatIntelligence
COLLECTOR
HISTORICAL ANALYTICS & HUNTING METABASE
FIDELISNETWORK™
RESPONSE AUTOMATION & ANALYTICS
ENGINE
FIDELISENDPOINT™
Sensors
FIDELISDECEPTION™
Data TheftProtection
Advanced Malware
Protection
Network Security Analytics
network endpoint
CCTV
CCTV
1
2
3
45
deception
Intelligent Deception
Security Visibility
Assets and Network decoys, lures, sophisticated data-traps
Asset profiling, Anomaly detection, Forensics, Threat
analysis. Learning TTPs andKill-Chain analysis
Traffic Analysis
C2 channels , Shadow IT, Data exfiltration, Internet Comm.
13
WE PREVENTATTACKERS
FROMACHIEVING
THEIRMISSION …by creating a world where attackers
have no place left to hide.
Reduce time to Detection and Response…
Questions?
Thank You!
Terence HeahRegional Sale Manager | APACM: (65) 8299 2029E: [email protected]