5 Key Findings on Advanced Threats

1
WHAT CAN YOU DO? 5 KEY FINDINGS ON ADVANCED THREATS Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices. Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology. 40 % ADVANCED THREATS AND DATA BREACHES ARE ON THE RISE Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses. Many companies are already compromised by advanced threats and don’t even know it. INCREASE OF ADVANCED ATTACKS Large companies saw a 40% increase of advanced attacks in 2014 over the previous year Source: 2015 ISTR Volume 20 CURRENT PREVENTION AND DETECTION METHODS FALL SHORT MORE TECHNOLOGY DOES NOT EQUAL BETTER DETECTION INCIDENT RESPONSE IS TAKING TOO LONG THE COST OF A DATA BREACH IS SIGNIFICANT When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business. Companies are struggling to limit breach impact and contain exposure. Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions. With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it. IT struggles to cope with the massive amounts of incidents, investigating too many false positives. Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late. Breaches cost organizations time to identify, respond and resolve threats. Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all. OF MALWARE WAS VIRTUAL MACHINE AWARE 28% of malware was virtual machine aware in 2014 Source: 2015 ISTR Volume 20 OF VICTIMS DISCOVERED DATA BREACHES THEMSELVES With all internal discovery methods combined, only 9% of victims discovered data breaches of their own accord Source: 2014 Data Breach Investigations Report, Verizon, 2014 BREACHES TOOK MONTHS TO YEARS TO DISCOVER 66% of breaches took months to years to discover a breach, 3 months to find a breach and 4 months to resolve Source: Verizon DBIR 2013 ORGANIZATIONAL COST OF DATA BREACH IS $5.4 MILLION Source: Ponemon Institute 2013 Cost of a Data Breach Research Report 28 % 9 % 66 % $ 5 . 4 Million IMPLEMENT A UNIFIED ADVANCED THREAT PROTECTION SOLUTION THAT ALLOWS YOU TO: Detect advanced threats with better visibility and intelligence across all your networks, endpoints, and emails Provide the ability to respond to security incidents within minutes and remediate confirmed threats Ease the burden on resources and make it possible for IT, security operations and advanced security teams to protect their business efficiently LEARN MORE ABOUT SYMANTEC ADVANCED THREAT PROTECTION AT symantec.com/advanced-threat-protection Why? Why? Why? Why? Why? Part #21356413 Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Transcript of 5 Key Findings on Advanced Threats

WHAT CAN YOU DO?

5 KEY FINDINGS ON ADVANCED THREATS

Companies are dealing with growth in data and an expanding number of endpoints, servers and mobile devices.Managing disparate solutions and services can result in high costs, inefficient operational processes and mean threats remain undetected across the business. Security can’t afford to rely on organizations’ strained IT resources. Companies need a unified advanced threat protection solution to prevent, detect and remediate threats quickly across their network, endpoint and email without the headache of managing disparate technology.

40%ADVANCED THREATS AND DATA BREACHES ARE ON THE RISE

Cybercriminals are employing stealthy, persistent methods to bypass traditional security defenses.

Many companies are already compromised by advanced threats and don’t even know it.

INCREASE OF ADVANCED ATTACKS

Large companies saw a 40% increase of advanced attacks

in 2014 over the previous yearSource: 2015 ISTR Volume 20

CURRENT PREVENTION AND DETECTION METHODS FALL SHORT

MORE TECHNOLOGY DOES NOT EQUAL BETTER DETECTION

INCIDENT RESPONSE IS TAKING TOO LONG

THE COST OF A DATA BREACH IS SIGNIFICANT

When current prevention methods fail, the time it takes to detect and respond to threats have significant impact to the business.

Companies are struggling to limit breach impact and contain exposure.

Data is often not connected to and aware of what is happening inside different parts of the environment and coming from disparate vendor solutions.

With all the data to sift through, companies are trying to determine where to spend their time. Many companies today are already compromised and don’t even know it.

IT struggles to cope with the massive amounts of incidents, investigating too many false positives.

Companies need a better way to correlate all the data from the external and internal threat intelligence so they can react quickly and identify and address their most severe incidents before it’s too late.

Breaches cost organizations time to identify, respond and resolve threats.

Investment in multiple technologies can be expensive and result in having to hire more staff to manage it all.

OF MALWARE WAS VIRTUAL MACHINE AWARE

28% of malware was virtual machine aware in 2014

Source: 2015 ISTR Volume 20

OF VICTIMS DISCOVERED DATA BREACHES

THEMSELVESWith all internal discovery methods combined, only

9% of victims discovered data breaches of their own accord

Source: 2014 Data Breach Investigations Report, Verizon, 2014

BREACHES TOOK MONTHS TO YEARS TO DISCOVER66% of breaches took months to years to discover a breach,

3 months to find a breach and 4 months to resolve

Source: Verizon DBIR 2013

ORGANIZATIONAL COST OF DATA BREACH

IS $5.4 MILLION

Source: Ponemon Institute 2013 Cost of a Data Breach Research Report

28%

9%

66%

$5.4Million

IMPLEMENT A UNIFIED ADVANCED THREAT PROTECTION SOLUTION THAT ALLOWS YOU TO:

Detect advanced threats with better visibility and intelligence

across all your networks, endpoints, and emails

Provide the ability to respond to security incidents

within minutes and remediate confirmed threats

Ease the burden on resources and make it possible for IT,

security operations and advanced security teams to

protect their business efficiently

LEARN MORE ABOUT SYMANTEC ADVANCED THREAT PROTECTION AT

symantec.com/advanced-threat-protection

Why?

Why?

Why?

Why?

Why?

Part #21356413Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Generated at: Thu Oct 8 12:02:06 2015