Advanced Threat Protection Lifecycle Infographic

Post on 15-May-2015

5.241 views 0 download

Tags:

Transcript of Advanced Threat Protection Lifecycle Infographic

SecurityEmpowers

Business

For More Information:

www.bluecoat.com/ATPlifecycle

Advanced Threat ProtectionA unified defense is required to securely empower the business

Lifecycle Defense

engthen hold

Zero-DayThreats AdvancedTargeted

tacks

InitialIntrusion

OutboundConnectionInitiated

Deployment

AdwareUnknown

MalwareSpyware

Testdetecti Rootkits

PhishingAttacks

Exploits

Bootkits

Infrast

targetResearchBuild onAcquire

Find andOrganize Accomplices

DefineTargetCover Tracks

and remainundetected

Ex trate

dataADVANCED PERSISTENT THREATSADVANCED TARGETED ATTACKSZERO-DAY THREATSUNKNOWN MALWARE

Ongoing OperationsDetect & ProtectBlock All Known Threats

STAGE

1

Incident ContainmentAnalyze & Mitigate

Novel Threat Interpretation

STAGE

2

ADVANCED THREAT PROTECTION

STAGE

3Incident Resolution

Investigate & Remediate Breach

Threat Profiling & Eradication

GLOBALINTELLIGENCENETWORK

LIFECYCLE DEFENSE

THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION

Average time to discover anadvanced persistent threat for amalicious breach

Average time to resolution for amalicious breach

DAYS DAYS80 123

The

Pos

t Bre

ach

Boo

m re

sear

ch, P

onem

on In

stitu

te N

= 3,

529

in 8

cou

ntrie

s.

The average total organizational cost of a data breach

$5.4mMeasured in US$ For country = US, 2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013

THE LIFECYCLE DEFENSE UNIQUELY DELIVERS:Threat Spectrum Protection: The integrated defense targets all three types of threats targetingenterprises: Known, Unknownand Latent.

Threat Intelligence Sharing: Closed loop feedback automaticallyshares intelligence with other systemsin the lifecycle defense to inoculatethe organization from future attacks.

Protection Efficiency: Intelligence sharing and theconversion of unknown threats intoknown threats transfers protection tothe web gateway and reduces burdenon other defenses in the network.