Carm presentation new logo may 14

33

description

Cyber attacks effects and CARM proposition overview. The presentation includes the relevant information about nowadays target cyber attacks, how they occur and what the post breach remediation platform offered by Exclusive Networks is.

Transcript of Carm presentation new logo may 14

Page 1: Carm presentation  new logo may 14
Page 2: Carm presentation  new logo may 14

CyberAttackRemediation &Mitigation

Page 3: Carm presentation  new logo may 14

YOUR CYBER DEFENCES WILL BE

BREACHED

ITS INEVITABLE!

WHAT WILL YOU DO?

Page 4: Carm presentation  new logo may 14

Decrease the Find 2 Fix …..

Page 6: Carm presentation  new logo may 14

• Unique Integrated Solution with Post Breach capabilities– Defend– Identify– Containment– Rapid Response– Full Forensics

• Combining Best of Breed ‘vendor’ - technologies

• Demonstrable TODAY @ Exclusive Networks

What is

Page 7: Carm presentation  new logo may 14

Benefits

• Improved Visibility & Intelligence• Minimising Organisation Damage– Loss of Intellectual Property– Brand– Reputation– Loss of revenue

• Optimizing IT Resource• Reduce IT Costs • Faster Find-to-Fix and Reduced Time to

Remediation

Page 8: Carm presentation  new logo may 14

Why do we need

• USA – >47,000 known IT security incidents in 2013

(Ref Verizon 2013)

– Average cost of a data leak• $5.5M per organisation (Ref Ponemon Rpt)

• UK IT security incidents – >54 per large organisation pa (Ref PWC 2013)

– Average cost of a data leak• $3.5M (Approx. £2.2M) per large organisation• 65k€ - 110k€ - Small to medium size orgnaisations

(Ref Ponemon Rpt)

• Belgium – 334 ‘serious’ incidents/Month • (ref SERT)

Page 9: Carm presentation  new logo may 14

• Number of devices (endpoints) per user– PCs, Tablets, Smartphone

• BYOD– Consumerisation and choice increases IT

workload• Mobility

– Android based threats to hit 1M in 2013– 30% increase in Mobile Malware in last

6mnths (Fortinet)

• Cloud– Attractive point of entry for a cyber attack

• Applications– App Stores outside of IT control

Source:Execs Guide to 2012 Data Breaches - OSF

The problem is growing !

Page 10: Carm presentation  new logo may 14

• Advanced Persistent Threats (APTs)– Often organisationally driven

• Zero Day exploits– Defending against the

unknown• Polymorphic threats

– Ever changing

Its inevitable that some of these Threats will become

successful ATTACKS!

....and Threats are getting more challenging

Page 11: Carm presentation  new logo may 14

“Consider that by 2020, the United States is projected to have nearly 2,500 manned combat aircraft of all kinds. Of those, nearly 1,100 will be the most advanced fifth generation F-35s and F-22s. China, by contrast, is projected to have no fifth generation aircraft by 2020. And by 2025, the gap only widens. The U.S. will have approximately 1,700 of the most advanced fifth generation fighters versus a handful of comparable aircraft for the Chinese. Nonetheless, some portray this scenario as a dire threat to America's national security.”

2009: China Needs Over 16 Years to Catch Up

Page 12: Carm presentation  new logo may 14

Lockheed USAF F22

Chengdu J-20

2009: China Needs Over 16 Years to Catch Up

Page 13: Carm presentation  new logo may 14

Threats are Commoditising . . . . • Nation v Nation – Cyber Warfare • National Govt – Espionage • Central Govts - Hacktivism• Large, Global Brands . .IP/Robbery • Mid to Large sized Organisations..

Robbery?• You . . . . Burglary

Page 14: Carm presentation  new logo may 14

• Of victims had up-to-date AV

100%

• Of breaches were reported by third parties67%

• Of breaches involved compromised credentials100%

• The median number of days an attacker was on the network229

Source: Mandiant M-Trends 2014 report

Post Breach Facts

Page 15: Carm presentation  new logo may 14

The true cost of breach

• Loss of revenue– From outage, no trading

• Damage to reputation– Negative customer

reaction

• Loss of data– Cost of replacement,

repair and compliance

• Interruption to business– Diverting resources will

delay core activity

• Damage to customer confidence– Loyalty & ongoing business

delayed or lost

• Damage to investor confidence– Valuation can affect credit

limits & increase costs

• Loss of intellectual property– Leadership position lost &

margin impact

• Legal costs– See all the above!!!

Page 16: Carm presentation  new logo may 14

Customer Pain Points• Lack of visibility

– Anomalies, behaviours, performance degradation– Indicators of change

• Sheer volume of Incidents– Lateral spread

• Incident response processes– Speed of response

• Time to remediate– Manpower, skills

• Why did it happen?– Forensics

• Costs• . . . A New Approach is Needed !

Page 17: Carm presentation  new logo may 14

So what is needed?

• A cyber attack ‘early warning system’

• Single Pane of Glass • Rapid defence re-configuration• Better visibility • Actionable intelligence• Learn from our lessons

Page 18: Carm presentation  new logo may 14

CyberAttackRemediation &Mitigation

Page 19: Carm presentation  new logo may 14

meets the NEED• CARM delivers– Real-time monitoring– BIG DATA analysis for abnormality detection– Fast incident evaluation & qualification– Fast incident response determination– Control– Reconfigurable defences

Page 20: Carm presentation  new logo may 14
Page 21: Carm presentation  new logo may 14

`

Page 22: Carm presentation  new logo may 14
Page 23: Carm presentation  new logo may 14

Demonstrable Platforms

Page 24: Carm presentation  new logo may 14

C.A.R.M

What people are saying about

Page 25: Carm presentation  new logo may 14

1 Reseller says…• ‘We talk to our customers about IT security but its

always been a bit of challenge to help them select the right combination of products – CARM provides us with a comprehensive framework to help the customer make the right choices’

• Benefits:– CARM increases our credibility– Stalled conversations can be re-opened– Upsell opportunities in existing accounts– Greater account penetration

Page 26: Carm presentation  new logo may 14

Another says…• ‘The CARM solution enables us to engage with

a much broader audience in the customer’

• Benefits:– Greater account penetration– Upsell opportunities in

existing accounts– Open new doors

Page 27: Carm presentation  new logo may 14

1 Vendor said…• ‘CARM is great – it positions our product and

makes it more compelling & relevant’

• Benefits:– The Exclusive Networks (EN)

channel is more attractive than other routes

– EN Partners gain accelerated sales engagement with vendors

Page 28: Carm presentation  new logo may 14

Another Vendor told us…

• ‘We pitched CARM instead of just our product and created an earlier opportunity!’

• Benefits:– Cross product lead generation– Shorter sales cycle– Broader customer engagement

Page 29: Carm presentation  new logo may 14

VAR Benefits

• Post Breach – big Issue• Addresses a real need – NOW • Good reason for a conversation with customers• Demo facility can be booked • Demonstrate your value to customers

– “We understand your business issues”– ”How/Where does it (product) fit into your network”

• Incremental revenue opportunities • Could be annuity based if sold as a service

Page 30: Carm presentation  new logo may 14

Next Steps• Talk to your customers about CARM• Qualify and arrange a demonstration• Explore their reaction• Evaluate the service and product potential • Create those opportunities with your account

manager

Page 31: Carm presentation  new logo may 14

Next Steps - Materials

http://www.carmsecurity.com

• These PowerPoint slides – make merry• CARM white paper• CARM Info-graphic• CARM videos and canned demonstrations• More to come…

Page 32: Carm presentation  new logo may 14

Summary • Post breach era is here• Not IF but WHEN • Organisations need to address it

– Seen as costly – Too complex – More work in overloaded dept.

• CARM simplifies & automates this– Accelerates – FIND 2 FIX …… 229 days …EBay 90 days +

• Rapid outcomes at reasonable cost • Real-life working platform NOW for demos• It works!!! . . . . .

Page 33: Carm presentation  new logo may 14

So ........