Average annual cost of security incidents



Similar documents
ForeScout CounterACT. Continuous Monitoring and Mitigation

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Vulnerability. Management

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

TRIPWIRE NERC SOLUTION SUITE

QRadar SIEM 6.3 Datasheet

High End Information Security Services

Ecom Infotech. Page 1 of 6

IBM QRadar Security Intelligence April 2013

Cyber Security An Exercise in Predicting the Future

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Enterprise Security Solutions

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

I ve been breached! Now what?

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

End-user Security Analytics Strengthens Protection with ArcSight

How To Improve Your Network Security

How To Protect Your Cloud From Attack

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Trend Micro. Advanced Security Built for the Cloud

SANS Top 20 Critical Controls for Effective Cyber Defense

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

SecureVue Product Brochure

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Boosting enterprise security with integrated log management

ControlFabric Interop Demo Guide

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Defending Against Data Beaches: Internal Controls for Cybersecurity

1 Introduction Product Description Strengths and Challenges Copyright... 5

Clavister InSight TM. Protecting Values

Continuous Network Monitoring

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

The Value of Vulnerability Management*

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Concierge SIEM Reporting Overview

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Trend Micro Cloud Security for Citrix CloudPlatform

Securing OS Legacy Systems Alexander Rau

Whitepaper. A Blueprint for Pervasive Network Security. How to accelerate continuous visibility, control intelligence, and policy-based response.

Nine Network Considerations in the New HIPAA Landscape

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

The Cloud App Visibility Blindspot

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

The Critical Security Controls: What s NAC Got to Do with IT?

Cybersecurity: What CFO s Need to Know

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Speed Up Incident Response with Actionable Forensic Analytics

Best Practices to Improve Breach Readiness

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Total Cloud Protection

Anatomy of a Data Breach Why Breaches Happen and What to Do About It

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Automated Protection on UCS with Trend Micro Deep Security

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Securing Remote Vendor Access with Privileged Account Security

IBM Security Intelligence Strategy

Verve Security Center

BIG SHIFT TO CLOUD-BASED SECURITY

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Securing SharePoint 101. Rob Rachwald Imperva

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Redefining Incident Response

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

IBM Security IBM Corporation IBM Corporation

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Risk Analytics for Cyber Security

Understanding Vulnerability Management Life Cycle Functions

How To Create Situational Awareness

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Proactive Vulnerability Management Using Rapid7 NeXpose

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Privilege Gone Wild: The State of Privileged Account Management in 2015

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Q1 Labs Corporate Overview

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Securing your IT infrastructure with SOC/NOC collaboration

Transcription:

Breaches reported Annual number of data breaches Average annual cost of security incidents Among companies with revenues over $1 billion Regulatory mandates 900 800 700 600 500 400 300 200 100 0 2011 2012 2013 2014 $3.9 million 2013 $5.9 million 2014 SOX HIPAA NERC PCI NIST HITECH Source: Identity Theft Resource Center Source: 2015 Global State of Information Security Survey, PwC 2015 ForeScout Technologies, Page 2

The Home Depot 53 million email addresses and 56 million credit cards Attackers used stolen vendor credential to access critical systems 21m government employees identities stolen OPM did not maintain a comprehensive inventory of servers, databases and network devices Cyber attack could cost as much as $100 million Disabled the antivirus in the target machines without detection 80m customer records stolen Suspicious administrator activity went unnoticed for months Attackers exploit 76 Million Households vulnerable affected endpoints, easily Hackers move took over across a remote server big the bank failed to properly update flat networks 44 percent of known breaches came from vulnerabilities that 11m customers medical are 2 to and 4 years financial old data stolen HP Cyber Risk Report 2015 Premera s network security procedures were inadequate 2015 ForeScout Technologies, Page 3

Less than 10% of new devices connecting to the corporate environment will be manageable through traditional methods Number of unmanaged devices is exploding By 2020: 20+ Billion Unmanaged Connected Devices Dec 2014: Within two years, 90% of all IT networks will have an IoT-based security breach Unmanaged Devices 2010 2012 2014 2016 2018 2020 Managed Devices Source: Gartner, BI Intelligence, Verizon, ForeScout 2015 ForeScout Technologies, Page 4

Fragmented security lets attackers in FIREWALL SIEM ATD VA ENDPOINT PATCH EMM Security products are silos. Human beings are needed to compensate for Average lack of automation. time to contain a cyber attack is 31 days SecOps teams are overwhelmed and cannot respond in timely fashion. 70 to 90 percent of all malicious incidents could have been prevented or found sooner if existing logs and alerts had been monitored Verizon Data Breach Investigations Report Ponemon Institute 2014 Global Report on the Cost of Cyber Crime 2015 ForeScout Technologies, Page 5

ForeScout Solution 2015 ForeScout Technologies, Page 6

Managed Unmanaged Agentless Continuous Computing Devices DIRECTORIES PATCH SIEM Devices Applications Antivirus out-of-date Vulnerability Broken agent ATD VA EMM IoT Visible with OTHER Visible Not Visible 2015 ForeScout Technologies, Page 7

Policy-driven Automated Users Endpoints Existing IT 2015 ForeScout Technologies, Page 8

Share context Automate workflows ControlFabric Open APIs 2015 ForeScout Technologies, Page 9

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 10

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 11

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 12

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 13

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices 2015 ForeScout Technologies, Page 14

1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices 2015 ForeScout Technologies, Page 15

Real-time visibility No gaps No agents Broad range of responses User Endpoint Existing IT systems Information sharing and automation Reduce security fragmentation Speed incident response 2015 ForeScout Technologies, Page 16

2015 ForeScout Technologies, Page 17