Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
What you see: a deluge of security alerts; support-desk calls; malware-infected machines; hints of external data
transfers; the lingering digital detritus of cyber attacks within your network. These are trailing indicators of an attack, and
they all unfold within the traditional network perimeter.
What you dont see: malicious emails opened off your network; social media accounts impersonating your brand
and surveilling your people; mobile apps that siphon sensitive data from workers personal devices on the go. As the way
we work changes, these have become leading indicators of an attackthe stage where it is most effectively detected
and blocked. And they all happen outside of your network, well beyond the sightline of traditional security tools.
This visibility gap has become one of cybersecuritys most acute and fastest-growing problems. Even as organizations
spend upwards of $100 billion per year1 on the latest tools, cyber attackers keep getting through. Data continues to be
stolen. Breaches keep appearing in the news. And the losses continue to mount.
Todays business transcends the bounds of traditional network perimeters and connected endpoints. It transpires over
email. It flows through social networks. It plays out across all types of mobile devices.
As the modern workforce has moved beyond the network, so have cyber attackers. Thats why todays threats require
seeing beyond the networkinto every channel, every device, everywhere your people, data, and brand are.
Unfortunately, most security tools still focus on the parameter and endpoints. This approach may be somewhat useful for
detecting threats already inside your environment. But it does little to stop them from getting there in the first place. And
worse, it illuminates only the last stage of the attack, leaving you blind to most of the attack lifecycle. Without this insight,
you cant prevent attacks or respond effectively.
About three quarters of breached organizations learn that theyve been attacked through an outside party.2 A
whopping 98% didn't discover the breach until a week after the fact.3 And more than half aren't confident they found
the root cause.4
How organizations learn they've been breached
Law Enforcment
Fraud Detection
80%
Third Party
Internal
60%
40%
20%
0%
2005
2007
2009
2011
2013
2015
In other words, when it comes to one of the most catastrophic events that can happen to a company, most never see
it coming. And many dont know what happened even after the fact.
This paper examines the origins of this visibility gap, its consequences, and how to expand your field of view to better
protect your people, data, and brand.
1 Steve Morgan (Forbes). Worldwide Cybersecurity Spending Increasing to $170 Billion by 2020. March 2016.
2 Verizon. Data Breach Investigations Report. April 2016.
3 Ponemon Institute. "The Post Breach Boom." February 2013.
4 Ibid.
BLIND SPOTS: Why Cybersecuritys Visibility Gap Matters, and How Organizations Can Solve It 3
At the same time, brands are using social media more than ever
to interact with their audiences. But many of those interactions
are hijacked by attackers using similar-looking accounts to
spread malware, promote fraud, and steal credentials.
On the mobile front, dangerous apps downloaded from
rogue marketplaces affect two in five enterprises.9 Lured in
by free clones of popular games and banned apps, users
who download apps from rogue marketplacesand bypass
multiple security warnings in the processare four times more
likely to download an app that is malicious. These apps steal
personal information, passwords, and data.
5 Krebs on Security. Email Attack on Vendor Set Up Breach at Target. February 2014.
6 Proofpoint. Quarterly Threat Summary: Jan-Mar 2016. April 2016.
7 Proofpoint. The Human Factor 2016. February 2016.
8 Proofpoint. Quarterly Threat Summary: Jan-Mar 2016. April 2016.
9 Ibid.
10 Verizon. 2016 Data Breach Investigations Report. April 2016.
11 Ibid.
12 Proofpoint. The State of Social Media Infrastructure. 2014.
13 Proofpoint. Instagram Attack Spotlights Blended Social Media and Email Trend. March 2016.
BLIND SPOTS: Why Cybersecuritys Visibility Gap Matters, and How Organizations Can Solve It
Legitimate Activity
Spam Activity
12AM
10
11
12PM
10
11
Mobile
Bring-your-own device (BYOD) policies have become the norm
in many workplaces. And in those that dont have a formal
BYOD policy, people are bringing their mobile devices anyway.
Mobile-device-management (MDM) vendors have rushed in
to help plug this new security risk. These tools help enforce
security policies, but on their own, they dont determine which
mobile apps are safe and which ones pose risk. These mobile
risks can include:
Account takeover
Leaked data
Hijacked devices
Privacy violations
Adware
Risk to your brand
BLIND SPOTS: Why Cybersecuritys Visibility Gap Matters, and How Organizations Can Solve It 5
1.2%
3.8%
4.0%
Russian Federation
6.9%
19.1%
Germany
Republic of Korea
48.8%
China
Netherlands
4.1%
United States
Hong Kong
2.1%
Japan
Preparing notice documents and other required disclosures to victims and regulators
All of these are more difficult and expensive without the forensics
and insight you get only when you look beyond the network.
Costlier cleanup
Network-only visibility slows the processand in turn raises
the costsof resolving security incidents. Most attacks begin
15 Ponemon Institute. Advanced Threats in Financial ServicesA Study of North America and EMEA. May 2015.
16 Ponemon Institute. Advanced Threats in RetailA Study of North America and EMEA. May 2015.
17 Kelly Jackson Higgins (InformationWeek). "Cost of a Data Breach Jumps By 23%." October 2014.
18 Ponemon Institute. 2015 Cost of Data Breach Study: Global Analysis. May 2015.
BLIND SPOTS: Why Cybersecuritys Visibility Gap Matters, and How Organizations Can Solve It
Email
Our email risk assessment shows you who is being targeted and how (ransomware, credential
phishing, BEC, and so on).
Mobile
Our mobile defense risk assessment shows you what mobile applications your users have on
their phones and what each of those apps is doing.
Social
Our social risk assessment provides a snapshot of all accounts associated with your brands
corporate, unauthorized, and fraudulent.
Data Discover
A Data Discover risk assessment shows you where sensitive data lives within your environment.
To schedule an assessment, visit https://www.proofpoint.com/us/cybersecurity-assessment.
BLIND SPOTS: Why Cybersecuritys Visibility Gap Matters, and How Organizations Can Solve It 7
ABOUT PROOFPOINT
Proofpoint, Inc. (NASDAQ:PFPT), a next-generation cybersecurity company, enables organizations to protect the way their people work
today from advanced threats and compliance risks. Proofpoint helps cybersecurity professionals protect their users from the advanced
attacks that target them (via email, mobile apps, and social media), protect the critical information people create, and equip their
teams with the right intelligence and tools to respond quickly when things go wrong. Leading organizations of all sizes, including over
50 percent of the Fortune 100, rely on Proofpoint solutions, which are built for todays mobile and social-enabled IT environments and
leverage both the power of the cloud and a big-data-driven analytics platform to combat modern advanced threats.
www.proofpoint.com
Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries.
All other trademarks contained herein are property of their respective owners.