Upload
doantuyen
View
215
Download
2
Embed Size (px)
Citation preview
1 Confidential | © A10 Networks, Inc.
Overcoming the Industry’s
INSECURITY COMPLEX
Neil Wu Becker
Vice President
Of Worldwide Marketing
& Communications
2 Confidential | © A10 Networks, Inc.
Generating Security Investment ROI by Putting
Culture First, Technology Second
5 Confidential | © A10 Networks, Inc.
The biggest threat for a
company is between the
chair and the keyboard
11 Confidential | © A10 Networks, Inc.
of all attacks are
multi-vector attacks
Source: BT, 2014
75% Based on 640 interviews with IT decision makers
in large organizations (1000+ employees) In 11
countries across the world. Range of sectors
finance retail and public
12 Confidential | © A10 Networks, Inc.
Vectors Media/Entertainment Service
7
300 Gbps
Q2 2014
Vectors Educational
Institutions
XOR Botnet
2
150+ Gbps attack
Q4 2015
Gambling Site
100 Gbps
Q2 2014
Vectors 5
Multi-Vector Attacks Are Here
16 Confidential | © A10 Networks, Inc.
Cyber Threats Hidden in SSL Traffic
Sources: Sandvine Internet Phenomena Report “Security Leaders Must Address Threats From Rising SSL Traffic,” 2013
50% 80% of Internet
traffic will be
encrypted
by 2016
of attacks will use
encryption to
bypass controls
by 2017
of organizations
with firewalls, IPS,
or UTM do not
decrypt SSL traffic
67%
19 Confidential | © A10 Networks, Inc.
The biggest threat for a
company is between the
chair and the keyboard
20 Confidential | © A10 Networks, Inc.
The biggest asset for a
company is between the
chair and the keyboard