1
EVOLVING NETWORK SECURITY What primary role does intrusion detection play in your defense in depth strategy? Detect advanced threats 36% Detect compromised hosts 25% Provide telemetry about in/outbound connections Cover endpoints where I can’t deploy agents 21% 18% Top gaps in current network intrusion detection capabilities: Doesn’t detect unknown threats 47% Doesn’t provide enough contextual awareness 37% Doesn’t help with detecting lateral movement 34% Doesn’t provide network visibility 26% What are the top three attacks you would expect to detect in a ‘next-generation intrusion detection platform’? Source: Survey conducted by SC Media, December 2017; reprinted with permission 53% Fileless Malware 46% Credential & Password Compromise 36% Command & Control Detection 36% Lateral Movement 32% File-Based Malware 31% Brute Force Scanning / DDoS BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world’s most sophisticated threats in real time. GET AHEAD OF THE THREAT bluvector.io © 2018 BluVector. All rights reserved.

EVOLVING NETWORK SECURITY€¦ · Detect advanced threats 36% Detect compromised hosts 25% Provide telemetry about in/outbound connections Cover endpoints where I can’t deploy agents

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EVOLVING NETWORK SECURITY€¦ · Detect advanced threats 36% Detect compromised hosts 25% Provide telemetry about in/outbound connections Cover endpoints where I can’t deploy agents

EVOLVING NETWORK SECURITY

What primary role does intrusion detection play in your defense in depth strategy?

Detect advanced threats

36%

Detect compromised hosts

25%

Provide telemetry about in/outbound connections

Cover endpoints where I can’t deploy agents

21%

18%

Top gaps in current network intrusion detection capabilities:

Doesn’t detect unknown threats

47%Doesn’t provide

enough contextual awareness

37%Doesn’t help with detecting lateral

movement

34%Doesn’t provide network visibility

26%

What are the top three attacks you would expect to detect in a ‘next-generation intrusion detection platform’?

Source: Survey conducted by SC Media, December 2017; reprinted with permission

53%Fileless Malware

46%Credential & Password

Compromise

36%Command &

Control Detection

36%Lateral Movement

32%File-Based Malware

31%Brute Force

Scanning / DDoS

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world’s most sophisticated threats in real time.

GET AHEAD OF THE THREATbluvector.io

© 2018 BluVector. All rights reserved.