222 80 123 · Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED...

Post on 05-Oct-2020

3 views 0 download

Transcript of 222 80 123 · Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED...

SecurityEmpowers

Business

For More Information:

www.bluecoat.com/ATPlifecycle

Advanced Threat ProtectionA unified defense is required to securely empower the business

Lifecycle Defense

engthen hold

Zero-DayThreats AdvancedTargeted

tacks

InitialIntrusion

OutboundConnectionInitiated

Deployment

AdwareUnknown

MalwareSpyware

Testdetecti Rootkits

PhishingAttacks

Exploits

Bootkits

Infrast

targetResearchBuild onAcquire

Find andOrganize Accomplices

DefineTargetCover Tracks

and remainundetected

Ex trate

dataADVANCED PERSISTENT THREATSADVANCED TARGETED ATTACKSZERO-DAY THREATSUNKNOWN MALWARE

Ongoing OperationsDetect & ProtectBlock All Known Threats

STAGE

1

Incident ContainmentAnalyze & Mitigate

Novel Threat Interpretation

STAGE

2

ADVANCED THREAT PROTECTION

STAGE

3Incident Resolution

Investigate & Remediate Breach

Threat Profiling & Eradication

GLOBALINTELLIGENCENETWORK

LIFECYCLE DEFENSE

THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION

Average cost per lost data record from advanced attack

more than cost from incidents of insider negligence

Average time to discover anadvanced persistent threat for amalicious breach

Average time to resolution for amalicious breach

$ DAYS DAYS

%

222 80 12327

The

Pos

t Bre

ach

Boo

m re

sear

ch, P

onem

on In

stitu

te N

= 3,

529

in 8

cou

ntrie

s.

THE LIFECYCLE DEFENSE UNIQUELY DELIVERS:Threat Spectrum Protection: The integrated defense targets allthree types of threats targetingenterprises: Known, Unknownand Latent.

Threat Intelligence Sharing: Closed loop feedback automaticallyshares intelligence with other systemsin the lifecycle defense to inoculatethe organization from future attacks.

Protection Efficiency: Intelligence sharing and theconversion of unknown threats intoknown threats transfers protection tothe web gateway and reduces burdenon other defenses in the network.