SlideShare a Scribd company logo
loss of intellectual property
loss of financial data
compliance penalties and fines
lost customer confidence
lost revenue
loss of customer data
70%
60%
50%
40%
30%
20%
10%
0%
Your
MissionIDENTIFY AND ELIMINATE CYBER ATTACKS.
Should your mission fail, the
business will suffer
Zero-day attacks
Advanced targeted
attacks (ATA) Unidentified malware
Advanced persistent
threat (APT)
It is your responsibility to find the THREATS –
don’t find out from a service
provider, partner, auditor or other third party
0 10 20 30 40 50 60
57%
54%
45%
37%
30%
25%
23%
19%
5%
5%
Advanced persistent threats
Root kits
SQL and code injection
Clickjacking
Watering hole attacks
Registration spamming
Login attacks
Contact form on comment spam
Cross -site scripting
Other
Situation Report
Source:Ponemon Live Threat Intelligence Report,2013
Source:Ponemon Live
Threat Intelligence report 2013
78% of respondents rate traditional
tools such as SIEM, IDS, IAM and
Firewalls between 1 and 6 (out of 10)
for their effectiveness in delivering
threat intelligence.
78%
57% say the intelligence currently
available to their enterprises is often
too stale to enable them to grasp
and understand the strategies,
motivations, tactics and location of
attackers.
57%
69% of organizations are not
fully confident they could detect
an important security issue
before it had a
significant impact.
69%
Don't operate in the dark
63% of compromise victims were
notified by an external entity.
63%
You need Real-Time
Actionable Intelligence to
succeed in your mission.
EMA research indicates that just 38% of organizations have deployed
Advanced Security Analytics (ASA) systems.
of organizations
conduct research
manually
of organizations
find it too difficult
to distinguish legitimate
from malicious activity
of organizations are
unable to consistently
prioritize response based on
relative potential impact to the
organization
55% 41%
41%
55%
43%
43%
0
10
20
30
40
50
60
Organizations that utilize enabling technologies
providing actionable intelligence are 7x more
successful in stopping security exploits
(Ponemon Live Threat Intelligence report 2013)
Lower Resolution Cost
Leverage Machine
Learning to adapt to
new threats.
Mitigate New Attacks
97% of organizations that are users of actionable
security intelligence believe live intelligence has made their
security defense stronger
100Source:Ponemon Live Threat Intelligence Report,2013
Action within 60 seconds of an incident
can reduce the resolution cost of a
breach by an average of 40%.
100
40%
Source:Ponemon Live Threat Intelligence Report,2013
60seconds
$
Engage Infection Verification
Pack and Integrate with
Firewalls, IPS defenses to
accelerate threat mitigation
response. Cyphort Customer
Evaluations show response
times improve by
as much as 75%.
47% of companies regard
machine learning tools as a
key data source for security
analysis.
Engage Static and Behavioral
inspection using multiple
evaluation technologies.
Monitor and Analyze all network
communications ANYWHERE IN
YOUR ENVIRONMENT with NO
APPLIANCE COSTS using virtual
machine technology.
Automatically analyze and correlate events with Live
Actionable Intelligence to prioritize and neutralize
threats by risk rating.
Reduce
Resolution Time
www.cyphort.com
Was the company unable to stop a security exploit
because of outdated or insufficient intelligence?
Yes
No
Unsure
Source:EMA Data Driven
Security Report,2014
Source:Mandiant 2013 Security
Gap Report
Source:Ponemon Live Threat
Intelligence Report,2013
http://www.cyphort.com/technology
http://www.cyphort.com/technology
is your best chance for
to
Accomplish your Mission
Source:EMA Data Driven Security
Research,2014
97%
Time is of the EssenceAct Now!
Real-Time
Actionable Intelligence
Real-Time Actionable Intelligence
Source:EMA Data Driven Security Research,2014
Contact to get a glimpse of our
detection technology with free online malware
scanning service at http://www.cyphort.com/infographic
38%
62%
others
28% Greater than
Expected Value
67% Expected
Value
95% of those organizations
achieved equal or greater
value than expected.
Deployed Advanced
Security Analytics
6% Lower than Expected Value
Identify Compromised
Systems
Source:Ponemon Live Threat
Intelligence Report,2013

More Related Content

Your Mission: Identify & Eliminate Cyber Attacks

  • 1. loss of intellectual property loss of financial data compliance penalties and fines lost customer confidence lost revenue loss of customer data 70% 60% 50% 40% 30% 20% 10% 0% Your MissionIDENTIFY AND ELIMINATE CYBER ATTACKS. Should your mission fail, the business will suffer Zero-day attacks Advanced targeted attacks (ATA) Unidentified malware Advanced persistent threat (APT) It is your responsibility to find the THREATS – don’t find out from a service provider, partner, auditor or other third party 0 10 20 30 40 50 60 57% 54% 45% 37% 30% 25% 23% 19% 5% 5% Advanced persistent threats Root kits SQL and code injection Clickjacking Watering hole attacks Registration spamming Login attacks Contact form on comment spam Cross -site scripting Other Situation Report Source:Ponemon Live Threat Intelligence Report,2013 Source:Ponemon Live Threat Intelligence report 2013 78% of respondents rate traditional tools such as SIEM, IDS, IAM and Firewalls between 1 and 6 (out of 10) for their effectiveness in delivering threat intelligence. 78% 57% say the intelligence currently available to their enterprises is often too stale to enable them to grasp and understand the strategies, motivations, tactics and location of attackers. 57% 69% of organizations are not fully confident they could detect an important security issue before it had a significant impact. 69% Don't operate in the dark 63% of compromise victims were notified by an external entity. 63% You need Real-Time Actionable Intelligence to succeed in your mission. EMA research indicates that just 38% of organizations have deployed Advanced Security Analytics (ASA) systems. of organizations conduct research manually of organizations find it too difficult to distinguish legitimate from malicious activity of organizations are unable to consistently prioritize response based on relative potential impact to the organization 55% 41% 41% 55% 43% 43% 0 10 20 30 40 50 60 Organizations that utilize enabling technologies providing actionable intelligence are 7x more successful in stopping security exploits (Ponemon Live Threat Intelligence report 2013) Lower Resolution Cost Leverage Machine Learning to adapt to new threats. Mitigate New Attacks 97% of organizations that are users of actionable security intelligence believe live intelligence has made their security defense stronger 100Source:Ponemon Live Threat Intelligence Report,2013 Action within 60 seconds of an incident can reduce the resolution cost of a breach by an average of 40%. 100 40% Source:Ponemon Live Threat Intelligence Report,2013 60seconds $ Engage Infection Verification Pack and Integrate with Firewalls, IPS defenses to accelerate threat mitigation response. Cyphort Customer Evaluations show response times improve by as much as 75%. 47% of companies regard machine learning tools as a key data source for security analysis. Engage Static and Behavioral inspection using multiple evaluation technologies. Monitor and Analyze all network communications ANYWHERE IN YOUR ENVIRONMENT with NO APPLIANCE COSTS using virtual machine technology. Automatically analyze and correlate events with Live Actionable Intelligence to prioritize and neutralize threats by risk rating. Reduce Resolution Time www.cyphort.com Was the company unable to stop a security exploit because of outdated or insufficient intelligence? Yes No Unsure Source:EMA Data Driven Security Report,2014 Source:Mandiant 2013 Security Gap Report Source:Ponemon Live Threat Intelligence Report,2013 http://www.cyphort.com/technology http://www.cyphort.com/technology is your best chance for to Accomplish your Mission Source:EMA Data Driven Security Research,2014 97% Time is of the EssenceAct Now! Real-Time Actionable Intelligence Real-Time Actionable Intelligence Source:EMA Data Driven Security Research,2014 Contact to get a glimpse of our detection technology with free online malware scanning service at http://www.cyphort.com/infographic 38% 62% others 28% Greater than Expected Value 67% Expected Value 95% of those organizations achieved equal or greater value than expected. Deployed Advanced Security Analytics 6% Lower than Expected Value Identify Compromised Systems Source:Ponemon Live Threat Intelligence Report,2013