18
. McAfee Confidential Why Traditional Security Fails

Sustainable Threat Defense (Three-Part Series)

  • Upload
    mcafee

  • View
    3.935

  • Download
    8

Embed Size (px)

Citation preview

.

McAfee Confidential

Why Traditional Security Fails

.

McAfee Confidential

Security Obstacles Facing Organizations

Targeted Attacks

Siloed Security Organizations Lack of

VisibilitySeparate organizations utilizing point products, from multiple

vendors, operating in functional silos with no intelligence sharing.

Attacks are becoming more sophisticated, autonomous, and stealthy and are specifically designed to penetrate existing security controls, including security processes and people.

Too much data and not enough intelligence makes visibility into threats challenging. Reactive security infrastructure lacks the timely intelligence needed to identify threats.

2

.

McAfee Confidential 3

Organizations must innovate, operate, and grow with confidence

Fundamental Shifts in Our Digital WorldAn Increasingly Complex Digital Expanse

Mobile | Remote | Corporate

Dispersed Users Device & Data Proliferation

Cloud Bring Your Own ‘Whatever’

Billions of DevicesZettabytes of DataInternet of Things ‘Other People’s Computers’

BYODShadow IT

Consumerization

.

McAfee Confidential 4

Cybersecurity's Labor Shortage EpidemicNot Enough Gray-Matter for a Manual Solution

62%of organizations are currently understaffed*

2Million shortfall of qualified professionals by 2020**

Majority of positions take

3-6 months to fill, and 10% are never filled*

* State of Cybersecurity: Implications for 2015 - ISACA** The 2015 (ISC)2 Global Information Workforce Study - Extrapolation

.

McAfee Confidential

Cybercrime $618.16B(GDP

Sweden $570.59B)

Impact of an Unsustainable Approach

5

$3.79M

The 2015 (ISC)2 Global Information Workforce Study

Cost of Data Breach Study – Ponemon, May 2015

Economic Impact of Cybercrime II – CSIS, June 2014

Finance 98 daysRetail 197 days

Mean Time to Resolve: 2011-15

Mean Time to Detect

Advanced Threats Series – Ponemon, 2015

Annual Global Cost (USD)

Average Cost Per Breach

Within 1 day

33%

20% 3+ weeks

5%

8%

.

McAfee Confidential 6

4 Key Areas of SecurityBusiness and Security Outcomes

Safeguard Vital DataSafe adoption of innovative services.Protect data wherever it lives.Control user-to-cloud interaction.

Rapid LOB provisioning.Consistent policy extension.Maximized agility and utilization.

Fortify Critical Environments

Increased resilience to attacks. Minimized incident

impact. Shift from tactical to

strategic.

Neutralize Emerging Threats

Optimize Security Operations

Compressed decisions and actions. Improved resource output.

Reduced overall complexity.

10100111011010111001001001100110

10101010101001001001111010

10

.

McAfee Confidential 7

Neutralize Emerging Threats: Reducing the Time to Discover and Recover

.

McAfee Confidential 8

Time to Recover

Months -Weeks

Time to Discover

Years - Months

The Fundamental Security Challenge

$$$ Catastrophic Impact $$$

Overwhelmed Security Teams

Threat Volume and

Sophistication

Time to Compromise

Minutes

.

McAfee Confidential

Time to Recover

Minutes

Time to Discover

HoursHours

Business and Security Outcomes

9

$ Minimized Impact $

Optimized Security Teams

Advanced Defenses

Time to Compromise

Months

.

McAfee Confidential 10

Scalable and Sustainable Threat DefenseContinuous, Automated, and Shared Threat Intelligence

Detect – Illuminate low-threshold maneuvering through advanced intelligence and analytics.

Protect – Stop pervasive attack vectors while also disrupting never-before-seen techniques and payloads.

Adapt – Apply insights immediately throughout an integrated security system.

Correct – Improve triage and prioritize response as part of a fluid investigation.

10

.

McAfee Confidential 11

The Right Tools Resolve More RiskAdvanced Protection

Collaborative defenses

Rapid DetectionUnderstand the full picture

Deep VisibilityFacilitate precise actions

Connect isolated componentsImmediate Correction

Decide once and reduce redundancyAutomate Operations

Adapt to Prevent Future

Attacks

.

McAfee Confidential

A Sustainable Defensive Advantage

*Internal Benchmark testing applied to Advanced Malware cyber defense capability.

Applied Integration, Automation, and Orchestration

Resolve more risk, faster, and with fewer resources

Act Rapidly

71% reduction of manual efforts*

Optimize Resources

Over 1000% increase

in handling capacity*

Reduce Complexity

62% reduction of technology sprawl*

.

McAfee Confidential 13

Intelligent Endpoint Threat Defense

.

McAfee Confidential

Intelligent Endpoint Threat Defense

14

Outsmart Attackers

Integrated Threat Defense

Discover and Respond Faster

Immediate Visibility

Drive EfficiencyIncrease Capacity

Reduce Complexity

.

McAfee Confidential 15

Outsmart AttackersWith Integrated Counter Measures

Unified intelligence from Global, organizational, and 3rd-parties

Collaborative protect, detect and correct defenses act as a single adaptive system

Comprehensive coverage against the most pervasive threats

.

McAfee Confidential

Discover and Respond Faster

16

Through Immediate Visibility and Correlated Actions

Deep, continuous visibility and proactive hunting

Prioritize incidents, score risks, and investigate real-time

Interactive response and automated correction

.

McAfee Confidential 17

Drive Efficiency Increase Capacity and Reduce Complexity

Act with precision and speed by executing across the entire organization

Streamline workflows and central visibility, management and automation

Easily evolve security through shared intelligence and an adaptive architecture

.

McAfee Confidential 18

Scalable and Sustainable Threat DefenseSmart, fast and efficient

Detect – Illuminate low-threshold maneuvering through advanced intelligence and analytics.

Protect – Stop pervasive attack vectors while also disrupting never-before-seen techniques and payloads.

Adapt – Apply insights immediately throughout an integrated security system.

Correct – Improve triage and prioritize response as part of a fluid investigation.

18