the three waves of security innovation - balbix · 2020-04-21 · the three waves of security...

1
THE THREE WAVES OF SECURITY INNOVATION WAVE 1 WAVE 2 WAVE 3 1988: Robert Morris introduces the first computer worm, effectively shutting down the early Internet 2000: The Melissa and ILOVEYOU viruses infect tens of millions of PCs, causing email systems around the globe to fail 1989: First firewall, packet filters, developed by DEC 1991: Symantec releases first version of Norton Anti-Virus EARLY INTERNET FIREWALLS & ANTI-VIRUSES Attack Vectors to Monitor: Limited THE RISE OF MOBILE & CLOUD APT, NEXT GEN FIREWALLS & END POINT SOLUTIONS Attack Vectors to Monitor: Hundreds THE ERA OF INFINITE DATA, AI & IoT NEW APPROACHES: CONTEXTUAL, AI-BASED, PROACTIVE Attack Vectors to Monitor: Millions 2009: Palo Alto Networks launches next generation firewall containing application awareness, full stack visibility, extra-firewall intelligence, and upgrade paths 2013: Yahoo suffers the largest data breach in history, affecting 3B user accounts Trend toward visbility and control of managed assets, primarily reactive response 2009: FireEye coins the term “Advanced Persistent Threat” in response to polymorphic viruses The rise of cloud and mobile create millions of new entry points. Deployment of new end point technology increases New attack vectors exponentially and continually increasing and evolving New malware samples range from 30K to 50K per day More than 200,000 new malware samples released per day 2017: Equifax breach exposes financial information of 143M consumers. KRACK and BlueBorne exploit WiFi and bluetooth on billions of devices Sophisticated adversaries launch precision targeted attacks that rely on demographics and psychographics Balbix is security for the Third Wave. Using specialized AI and deep learning for continuous inventory and monitoring of the attack surface, Balbix BreachControl™ offers predictive assessment of breach risk, a prioritized list of mitigation actions, and prescriptive fixes to avoid breaches and increase cyber resilience. IoT compromises increasing. The top three botnet kits — Andromeda, Gamarue and Wauchos — estimated to be responsible for compromising more than a million devices a month THIS IS NOT A HUMAN SCALE PROBLEM ANYMORE LEARN MORE AT BALBIX.COM

Upload: others

Post on 17-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THE THREE WAVES OF SECURITY INNOVATION - Balbix · 2020-04-21 · THE THREE WAVES OF SECURITY INNOVATION WAVE1 WAVE2 WAVE3 1988: Robert Morris introduces the first computer worm,

T H E T H R E E WAV E S O F

SECURITY INNOVATION

WAVE

1

WAVE

2

WAVE

3

1988: Robert Morris introduces the first computer worm,

e�ectively shutting down the early Internet 2000: The Melissa and ILOVEYOU

viruses infect tens of millions of PCs, causing email systems around the globe to fail

1989: First firewall, packet filters, developed by DEC

1991: Symantecreleases first version of Norton Anti-Virus

EARLY INTERNETFIREWALLS & ANTI-VIRUSES

Attack Vectors to Monitor: Limited

THE RISE OF MOBILE & CLOUDAPT, NEXT GEN FIREWALLS & END POINT SOLUTIONS

Attack Vectors to Monitor: Hundreds

THE ERA OF INFINITE DATA, AI & IoTNEW APPROACHES: CONTEXTUAL, AI-BASED, PROACTIVE

Attack Vectors to Monitor: Millions

2009: Palo Alto Networks launches next generation

firewall containing application awareness, full stack visibility,

extra-firewall intelligence, and upgrade paths

2013: Yahoo su�ers the largest data breach in history, a�ecting 3B user accounts

Trend toward visbility and control of managed assets, primarily reactive response

2009: FireEye coins the term “Advanced Persistent Threat”

in response topolymorphic viruses

The rise of cloud and mobile create millions of new entry points.

Deployment of new end point technology increases

New attack vectors exponentially and continually increasing and evolving

New malware samples range from 30K to 50K per day

More than 200,000 new malware samples released per day

2017: Equifax breach exposes financial information of 143M consumers. KRACK and BlueBorne exploit WiFi and bluetooth on billions of devices

Sophisticated adversaries launch precision targeted attacks that rely on demographics and psychographics

Balbix is security for the Third Wave. Using specialized AI and deep learning for continuous inventory and monitoring of the attack surface, Balbix BreachControl™ o�ers predictive assessment of breach risk,

a prioritized list of mitigation actions, and prescriptive fixes to avoid breaches and increase cyber resilience.

IoT compromises increasing.The top three botnet kits —Andromeda, Gamarue and Wauchos — estimated to be responsible forcompromising more thana million devices a month

THIS IS NOT A HUMAN SCALE PROBLEM ANYMORE

LEARN MORE AT BALBIX.COM