222 80 123 · Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED...

1
Security Empowers Business For More Information: www.bluecoat.com/ ATPlifecycle Advanced Threat Protection A unified defense is required to securely empower the business Lifecycle Defense engthen hold Z ero-Day Threats Advanced Targeted tacks Initial Intrusion Outbound Connection Initiated Deployment Adware Unknown Malware Spyware Test detecti Rootkits Phishing Attacks Exploits Bootkits Infrast target Research Build on Acquire Find and Organize Accomplices Define Target Cover Tracks and remain undetected Ex trate data ADVANCED PERSISTENT THREATS ADVANCED TARGETED ATTACKS ZERO-DAY THREATS UNKNOWN MALWARE Ongoing Operations Detect & Protect Block All Known Threats STAGE 1 Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED THREAT PROTECTION STAGE 3 Incident Resolution Investigate & Remediate Breach Threat Profiling & Eradication GLOBAL INTELLIGENCE NETWORK LIFECYCLE DEFENSE THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION Average cost per lost data record from advanced attack more than cost from incidents of insider negligence Average time to discover an advanced persistent threat for a malicious breach Average time to resolution for a malicious breach $ DAYS DAYS % 222 80 123 27 The Post Breach Boom research, Ponemon Institute N= 3,529 in 8 countries. THE LIFECYCLE DEFENSE UNIQUELY DELIVERS: Threat Spectrum Protection: The integrated defense targets all three types of threats targeting enterprises: Known, Unknown and Latent. Threat Intelligence Sharing: Closed loop feedback automatically shares intelligence with other systems in the lifecycle defense to inoculate the organization from future attacks. Protection Efficiency: Intelligence sharing and the conversion of unknown threats into known threats transfers protection to the web gateway and reduces burden on other defenses in the network.

Transcript of 222 80 123 · Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED...

Page 1: 222 80 123 · Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED THREAT PROTECTION STAGE 3 Incident Resolution Investigate & Remediate Breach Threat

SecurityEmpowers

Business

For More Information:

www.bluecoat.com/ATPlifecycle

Advanced Threat ProtectionA unified defense is required to securely empower the business

Lifecycle Defense

engthen hold

Zero-DayThreats AdvancedTargeted

tacks

InitialIntrusion

OutboundConnectionInitiated

Deployment

AdwareUnknown

MalwareSpyware

Testdetecti Rootkits

PhishingAttacks

Exploits

Bootkits

Infrast

targetResearchBuild onAcquire

Find andOrganize Accomplices

DefineTargetCover Tracks

and remainundetected

Ex trate

dataADVANCED PERSISTENT THREATSADVANCED TARGETED ATTACKSZERO-DAY THREATSUNKNOWN MALWARE

Ongoing OperationsDetect & ProtectBlock All Known Threats

STAGE

1

Incident ContainmentAnalyze & Mitigate

Novel Threat Interpretation

STAGE

2

ADVANCED THREAT PROTECTION

STAGE

3Incident Resolution

Investigate & Remediate Breach

Threat Profiling & Eradication

GLOBALINTELLIGENCENETWORK

LIFECYCLE DEFENSE

THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION

Average cost per lost data record from advanced attack

more than cost from incidents of insider negligence

Average time to discover anadvanced persistent threat for amalicious breach

Average time to resolution for amalicious breach

$ DAYS DAYS

%

222 80 12327

The

Pos

t Bre

ach

Boo

m re

sear

ch, P

onem

on In

stitu

te N

= 3,

529

in 8

cou

ntrie

s.

THE LIFECYCLE DEFENSE UNIQUELY DELIVERS:Threat Spectrum Protection: The integrated defense targets allthree types of threats targetingenterprises: Known, Unknownand Latent.

Threat Intelligence Sharing: Closed loop feedback automaticallyshares intelligence with other systemsin the lifecycle defense to inoculatethe organization from future attacks.

Protection Efficiency: Intelligence sharing and theconversion of unknown threats intoknown threats transfers protection tothe web gateway and reduces burdenon other defenses in the network.