Beruflich Dokumente
Kultur Dokumente
REVOLUTION
OF CYBER-THREATS
Sophistication
USE ARE A
WEAK LINK
Social
User .com
Network
.com
LOL
.com
2
1 Obscure
.com
Bad Guy
High-value assets
LIMITED USE
OF MFA
CREATES Most network resources
WEAK LINKS
UN/Password
User
Hello Rick
WINDOWS
HELLO
Fingerprint Iris Facial
FIDO ALLIANCE
1Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013
2HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012
DEVICE DATA LEAK SHARING
PROTECTION SEPARATION PROTECTION PROTECTION
Containment Prevent
unauthorized apps
BYOD separation
from accessing
data
HOW OTHERS ARE FILLING THE GAP:
PAIN POINTS
Device
Protection
MICROSOFT CONFIDENTIAL – Internal Use Only
Windows desktop can be locked down
to only run trusted apps, just like many
mobile OS’s (e.g.: Windows Phone)
No need to create rules or policies, ATA continuously learns from the The attack timeline is a clear, efficient, Alerts only happen once suspicious
deploy agents or monitoring a flood of organizational entity behavior (users, and convenient feed that surfaces the activities are contextually
security reports. The intelligence needed devices, and resources) and adjusts right things on a timeline, giving you aggregated, not only comparing the
is ready to analyze and continuously itself to reflect the changes in your the power of perspective on the entity’s behavior to its own behavior,
learning. rapidly-evolving enterprise. “who-what-when-and how” of your but also to the profiles of other
enterprise. It also provides entities in its interaction path.
recommendations for next steps