1
$ 5 . 4 Million 40 % 5 KEY FINDINGS ON ADVANCED THREATS Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses. Many companies are already compromised by advanced threats and don’t even know it. Large companies saw a 40% increase of advanced attacks in 2014 over the previous year INCREASE OF ADVANCED ATTACKS ADVANCED THREATS AND DATA BREACHES ARE ON THE RISE Source: 2015 ISTR Volume 20 Why? When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business. Companies are struggling to limit breach impact and contain exposure. OF MALWARE WAS VIRTUAL MACHINE AWARE CURRENT PREVENTION AND DETECTION METHODS FALL SHORT Source: 2015 ISTR Volume 20 Why? Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions. With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it. With all internal discovery methods combined, only 9% of victims discovered data breaches of their own accord OF VICTIMS DISCOVERED DATA BREACHES THEMSELVES MORE TECHNOLOGY DOES NOT EQUAL BETTER DETECTION Source: 2014 Data Breach Investigations Report,” Verizon, 2014 Why? IT struggles to cope with the massive amounts of incidents, investigating too many false positives. Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late. 66 % of breaches took months to years to discover a breach, 3 months to find a breach and 4 months to resolve BREACHES TOOK MONTHS TO YEARS TO DISCOVER INCIDENT RESPONSE IS TAKING TOO LONG Source: : Verizon DBIR 2013 66 % Why? Breaches cost organizations time to identify, respond and resolve threats. Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all. ORGANIZATIONAL COST OF DATA BREACH IS $5.4 MILLION THE COST OF A DATA BREACH IS SIGNIFICANT Source: Ponemon Institute 2013 Cost of a Data Breach Research Report Part #21356413 Why? 28 % 9 % LEARN MORE ABOUT SYMANTEC ADVANCED THREAT PROTECTION AT symantec.com/advanced-threat-protection IMPLEMENT A UNIFIED ADVANCED THREAT PROTECTION SOLUTION THAT ALLOWS YOU TO: WHAT CAN YOU DO? Detect advanced threats with better visibility and intelligence across all your networks, endpoints, and emails Provide the ability to respond to security incidents within minutes and remediate confirmed threats Ease the burden on resources and make it possible for IT, security operations and advanced security teams to protect their business efficiently ADVANCING SECURITY. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 28% of malware was virtual machine aware in 2014 Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices. Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology.

Symantec Threat Protection - 5 KEY FINDINGSthreat-protection.symantec.com/assets/ATP_Awareness_SR-081315-final-2.pdf · Companies need a unified advanced threat protection solution

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Symantec Threat Protection - 5 KEY FINDINGSthreat-protection.symantec.com/assets/ATP_Awareness_SR-081315-final-2.pdf · Companies need a unified advanced threat protection solution

$5.4Million

40%

5 KEY FINDINGSON ADVANCED THREATS

Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses.

Many companies are already compromised by advanced threats and don’t even know it.

Large companies saw a 40% increase of advanced attacksin 2014 over the previous year

INCREASE OFADVANCED ATTACKS

ADVANCED THREATSAND DATA BREACHESARE ON THE RISE

Source: 2015 ISTR Volume 20

Why?

When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business.

Companies are struggling to limit breach impact and contain exposure.

OF MALWARE WAS VIRTUAL MACHINE AWARE

CURRENT PREVENTIONAND DETECTIONMETHODS FALL SHORT

Source: 2015 ISTR Volume 20

Why?

Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions. With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it.

With all internal discovery methods combined, only 9% of victims discovered data breaches of their own accord

OF VICTIMS DISCOVEREDDATA BREACHES

THEMSELVES

MORE TECHNOLOGYDOES NOT EQUALBETTER DETECTION

Source: 2014 Data Breach Investigations Report,” Verizon, 2014

Why?

IT struggles to cope with the massive amounts of incidents, investigating too many false positives.

Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late.

66% of breaches took months to years to discover a breach, 3 months to find a breach and 4 months to resolve

BREACHES TOOK MONTHSTO YEARS TO DISCOVER

INCIDENT RESPONSEIS TAKING TOO LONG

Source:: Verizon DBIR 2013

66%

Why?

Breaches cost organizations time to identify, respond and resolve threats.

Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all.

ORGANIZATIONALCOST OF DATA BREACH

IS $5.4 MILLION

THE COST OF ADATA BREACH IS SIGNIFICANT

Source: Ponemon Institute 2013 Cost of a Data Breach Research Report

Part #21356413

Why?

28%

9%

LEARN MORE ABOUT SYMANTEC ADVANCED THREAT PROTECTION AT symantec.com/advanced-threat-protection

IMPLEMENT A UNIFIED ADVANCED THREATPROTECTION SOLUTION THAT ALLOWS YOU TO:

WHAT CAN YOU DO?

Detect advanced threats with better visibility and intelligence

across all your networks, endpoints, and emails

Provide the ability to respond to security incidents within minutes and remediate confirmed threats

Ease the burden on resources and make it possible for IT,

security operations and advanced security teams to

protect their business efficiently

ADVANCING SECURITY.

Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names

may be trademarks of their respective owners.

28% of malware was virtual machine aware in 2014

Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices.Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology.