to combat threats in rapidly changing organizations...to combat threats in rapidly changing...

1
FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 / 408.321.6300 / 877.FIREEYE (347.3393) / [email protected] fireeye.com © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. INFO.MVX.EN-US.112016 LEARN MORE www.fireeye.com/network Organizations can minimize the risks of costly cyber breaches with the right network security solution. FOUR REQUIREMENTS OF NETWORK SECURITY 1 3 OUTCOMES FROM THE IDEAL NETWORK SECURITY SOLUTION CONSISTENT LEVEL OF PROTECTION ACROSS LOCATIONS AND DEVICES 1 ALERT TO FIX IN MINUTES 2 OPERATIONALLY COST EFFICIENT 3 Identify and build the right network security solution for your needs RAPID INCIDENT RESPONSE 2 REAL TIME DETECTION AND BLOCKING Network Security to Combat Threats in Rapidly Changing Organizations 320 DAYS Cybercriminals evade traditional security solutions, break into organizations and stay undetected for months. 2 80% Malware is targeted and often used only once 3 making signature- and policy-based defenses ineffective. MALWARE USED ONCE +80% ALERTS Most alerts are unreliable 4 and generated in numbers that overwhelm security teams, slowing response to critical incidents. $4M The average cost of a data breach is significant. 1 Breach attempts are evasive, stealthy, frequent and costly. THREAT LANDSCAPE Migration to public cloud increases Internet traffic by 40%. All this traffic must be inspected for threats. Non-Windows devices supported by 96% of organizations 5 today are often not as well protected as Windows devices. +40% 96% 40% Adoption of direct-to-Internet links by 40% of branches 6 increases exposure to attacks outside the strongly protected headquarters. Business-driven IT transformation expands the organizational attack surface. IT TRANSFORMATION 5 JAMF Software (2015). "2015 Survey. Managing Apple Devices in the Enterprise." 6 IDC (February 2016). "Communication Service Provider Adoption of SD-WAN Technology and Its Impact to MPLS VPN Services." 1 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.” 2 Mandiant Consulting (2016). "M-Trends 2016." 3 Joshua Goldfarb (September 19, 2016). "Detection Innovations." 4 Ponemon Institute LLC (January 2015). "The Cost of Malware Containment." INTELLIGENCE-LED SECURITY SCALABLE AND FLEXIBLE DEPLOYMENT MODELS 4

Upload: others

Post on 05-Jun-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: to Combat Threats in Rapidly Changing Organizations...to Combat Threats in Rapidly Changing Organizations 320 DAYS Cybercriminals evade traditional security solutions, break into organizations

FireEye, Inc.1440 McCarthy Blvd. Milpitas, CA 95035 / 408.321.6300 / 877.FIREEYE (347.3393) / [email protected]

fireeye.com

© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. INFO.MVX.EN-US.112016

LEARN MORE www.fireeye.com/network

Organizations can minimize the risks of costly cyber breaches with the right network security solution.

FOUR REQUIREMENTS OF NETWORK SECURITY

1

3

OUTCOMES FROM THE IDEAL NETWORK SECURITY SOLUTION

CONSISTENT LEVEL OF PROTECTION ACROSS LOCATIONS AND DEVICES1 ALERT TO FIX

IN MINUTES2 OPERATIONALLY COST EFFICIENT3

Identify and build the right network security solution for your needs

RAPID INCIDENT RESPONSE

2

REAL TIME DETECTION AND BLOCKING

Network Security to Combat Threats in Rapidly Changing Organizations

320 DAYS

Cybercriminals evade traditional security solutions, break into organizations and stay undetected for months.2

80%

Malware is targeted and often used only once3 making signature- and policy-based defenses ineffective.

MALWARE USED ONCE +80% ALERTS

Most alerts are unreliable4 and generated in numbers that overwhelm security teams, slowing response to critical incidents.

$4M

The average cost of a data breach is significant.1

Breach attempts are evasive, stealthy, frequent and costly.THREAT LANDSCAPE

Migration to public cloud increases Internet traffic by 40%. All this traffic must be inspected for threats.

Non-Windows devices supported by 96% of organizations5 today are often not as well protected as Windows devices.

+40% 96% 40%Adoption of direct-to-Internet links by 40% of branches6 increases exposure to attacks outside the strongly protected headquarters.

Business-driven IT transformation expands the organizational attack surface.IT TRANSFORMATION

5 JAMF Software (2015). "2015 Survey. Managing Apple Devices in the Enterprise."6 IDC (February 2016). "Communication Service Provider Adoption of SD-WAN Technology and Its Impact to MPLS VPN Services."

1 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.”2 Mandiant Consulting (2016). "M-Trends 2016."3 Joshua Goldfarb (September 19, 2016). "Detection Innovations."4 Ponemon Institute LLC (January 2015). "The Cost of Malware Containment."

INTELLIGENCE-LED SECURITY

SCALABLE AND FLEXIBLE DEPLOYMENT MODELS

4