Advanced Threat Protection Lifecycle Infographic

1
Security Empowers Business For More Information: www.bluecoat.com/ ATPlifecycle Advanced Threat Protection A unified defense is required to securely empower the business Lifecycle Defense engthen hold Z ero-Day Threats Advanced Targeted tacks Initial Intrusion Outbound Connection Initiated Deployment Adware Unknown Malware Spyware Test detecti Rootkits Phishing Attacks Exploits Bootkits Infrast target Research Build on Acquire Find and Organize Accomplices Define Target Cover Tracks and remain undetected Ex trate data ADVANCED PERSISTENT THREATS ADVANCED TARGETED ATTACKS ZERO-DAY THREATS UNKNOWN MALWARE Ongoing Operations Detect & Protect Block All Known Threats STAGE 1 Incident Containment Analyze & Mitigate Novel Threat Interpretation STAGE 2 ADVANCED THREAT PROTECTION STAGE 3 Incident Resolution Investigate & Remediate Breach Threat Profiling & Eradication GLOBAL INTELLIGENCE NETWORK LIFECYCLE DEFENSE THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION Average time to discover an advanced persistent threat for a malicious breach Average time to resolution for a malicious breach DAYS DAYS 80 123 The Post Breach Boom research, Ponemon Institute N= 3,529 in 8 countries. The average total organizational cost of a data breach $ 5.4 m Measured in US$ For country = US, 2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013 THE LIFECYCLE DEFENSE UNIQUELY DELIVERS: Threat Spectrum Protection: The integrated defense targets all three types of threats targeting enterprises: Known, Unknown and Latent. Threat Intelligence Sharing: Closed loop feedback automatically shares intelligence with other systems in the lifecycle defense to inoculate the organization from future attacks. Protection Efficiency: Intelligence sharing and the conversion of unknown threats into known threats transfers protection to the web gateway and reduces burden on other defenses in the network.

Transcript of Advanced Threat Protection Lifecycle Infographic

Page 1: Advanced Threat Protection Lifecycle Infographic

SecurityEmpowers

Business

For More Information:

www.bluecoat.com/ATPlifecycle

Advanced Threat ProtectionA unified defense is required to securely empower the business

Lifecycle Defense

engthen hold

Zero-DayThreats AdvancedTargeted

tacks

InitialIntrusion

OutboundConnectionInitiated

Deployment

AdwareUnknown

MalwareSpyware

Testdetecti Rootkits

PhishingAttacks

Exploits

Bootkits

Infrast

targetResearchBuild onAcquire

Find andOrganize Accomplices

DefineTargetCover Tracks

and remainundetected

Ex trate

dataADVANCED PERSISTENT THREATSADVANCED TARGETED ATTACKSZERO-DAY THREATSUNKNOWN MALWARE

Ongoing OperationsDetect & ProtectBlock All Known Threats

STAGE

1

Incident ContainmentAnalyze & Mitigate

Novel Threat Interpretation

STAGE

2

ADVANCED THREAT PROTECTION

STAGE

3Incident Resolution

Investigate & Remediate Breach

Threat Profiling & Eradication

GLOBALINTELLIGENCENETWORK

LIFECYCLE DEFENSE

THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION

Average time to discover anadvanced persistent threat for amalicious breach

Average time to resolution for amalicious breach

DAYS DAYS80 123

The

Pos

t Bre

ach

Boo

m re

sear

ch, P

onem

on In

stitu

te N

= 3,

529

in 8

cou

ntrie

s.

The average total organizational cost of a data breach

$5.4mMeasured in US$ For country = US, 2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013

THE LIFECYCLE DEFENSE UNIQUELY DELIVERS:Threat Spectrum Protection: The integrated defense targets all three types of threats targetingenterprises: Known, Unknownand Latent.

Threat Intelligence Sharing: Closed loop feedback automaticallyshares intelligence with other systemsin the lifecycle defense to inoculatethe organization from future attacks.

Protection Efficiency: Intelligence sharing and theconversion of unknown threats intoknown threats transfers protection tothe web gateway and reduces burdenon other defenses in the network.