Sie sind auf Seite 1von 30

Disrupting the Revolution of

Cyber-Threats with Revolutionary


Security
TODAY, YOU ARE EXPERIENCING A

REVOLUTION
OF CYBER-THREATS
Sophistication

2003–2004 2005–present 2012–beyond


Targeting
Addressing the threats requires a new approach:

RUIN THE ATTACKERS BREAK THE ATTACK ELIMINATE THE


ECONOMIC MODEL PLAYBOOK VECTORS OF ATTACK

Security from the inside out – beyond bigger walls


Windows 10 Security Approach

Identity Protection Information Protection Device Protection


Identity
Protection
shhh!
SHARED
SECRETS

Easily mishandled or lost


(Hint: The user is the problem)
Internet username and password

THE SITES WE 1 Bank


.com

USE ARE A
WEAK LINK
Social
User .com

Network
.com

LOL
.com

2
1 Obscure
.com
Bad Guy
High-value assets

LIMITED USE
OF MFA
CREATES Most network resources

WEAK LINKS
UN/Password

User
Hello Rick
WINDOWS
HELLO
Fingerprint Iris Facial
FIDO ALLIANCE

Board level members


Information
Protection
BitLocker data protection

Protects data when a device is lost or


stolen using full disk encryption
Provides single sign on and protection
from cold boot attacks
Easy to deploy and manageable at scale
Excellent integration, performance, and
reliability
In process for FIPS 140-2 certification
$240
87% 58% PER
RECORD

…of senior managers admit to


Have accidentally sent sensitive Average per record cost of a data
regularly uploading work files to a
information to the wrong person1 breach across all industries2
personal email or cloud account1

1Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013
2HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012
DEVICE DATA LEAK SHARING
PROTECTION SEPARATION PROTECTION PROTECTION

Containment Prevent
unauthorized apps
BYOD separation
from accessing
data
HOW OTHERS ARE FILLING THE GAP:
PAIN POINTS
Device
Protection
MICROSOFT CONFIDENTIAL – Internal Use Only
Windows desktop can be locked down
to only run trusted apps, just like many
mobile OS’s (e.g.: Windows Phone)

Untrusted apps and executables,


Device Guard such as malware, are unable to run

Hardware Rooted Resistant to tampering by an


App Control administrator or malware

Requires devices specially configured


by either the OEM or IT

Requires Windows Enterprise edition


Threat
Analysis
200+ 76% $500B $3.5M
The median # of days that of all network intrusions are The total potential cost of The average cost of a data
attackers reside within a due to compromised user cybercrime to the global breach to a company
victim’s network before credentials economy
detection
Detect threats fast Adapt as fast as Focus on what is Reduce the fatigue
with Behavioral your enemies important fast of false positives
Analytics using the simple
attack timeline

No need to create rules or policies, ATA continuously learns from the The attack timeline is a clear, efficient, Alerts only happen once suspicious
deploy agents or monitoring a flood of organizational entity behavior (users, and convenient feed that surfaces the activities are contextually
security reports. The intelligence needed devices, and resources) and adjusts right things on a timeline, giving you aggregated, not only comparing the
is ready to analyze and continuously itself to reflect the changes in your the power of perspective on the entity’s behavior to its own behavior,
learning. rapidly-evolving enterprise. “who-what-when-and how” of your but also to the profiles of other
enterprise. It also provides entities in its interaction path.
recommendations for next steps

Das könnte Ihnen auch gefallen