catch cyber attackers before they catch you
TRANSCRIPT
Sources:http://www.vmware.com/�les/pdf/smb/Expand-Your-Virtual-Infrastructure-With-Con�dence-And-Control.pdfhttp://www.cxounplugged.com/wp-content/uploads/2012/11/BYOD_Infographic.pngwww.cioinsight.com/security/slideshows/shadow-it-growing-footprint.html
http://www.bloomberg.com/news/2014-04-11/millions-of-android-devices-vulnerable-to-heartbleed-bug.htmlhttp://www.washingtonpost.com/news/morning-mix/wp/2014/09/26/shellshock-bug-a�ects-macs-and-many-other-internet-connected-devices/https://ics-cert.us-cert.gov/sites/default/�les/Monitors/ICS-CERT_Monitor_%20Jan-April2014.pdf
71% growth in virtual infrastructure over 5 years
65% of employees not satisfied with virtual machine security V
IRTU
AL
59% of employees use personal device for job
46% BYODs are unmanaged M
OBILE
49% businesses useunapproved SaaS apps
???cannot tell who is accessing unapproved SaaS apps and leaking data
CLO
UD
Network devices vulnerable to Heartbleed
90MInternet-facing machines exposed to Shellshock
70%Vulnerabilities in SCADA devices are exploitable remotely
87%
C Y B E R
C A T C H
C A T C HB EE
F O RT H E
Y O U
Y
A T T A C K E R S
Best Practices
For Vulnerability & Threat Monitoring
The challenge: Not all network assets are known or managed
The challenge: Suspicious activity in endpoints and network tra�c goes undetected
The challenge: Many Internet-facing systems have exploitable vulnerabilities
The challenge: Takes too long to discover and respond to breaches
Uncertainty Resolved with Continuous MonitoringDiscover Assets, Assess Vulnerabilities, Report Threats & Take Action. Learn More: tenable.com/dart
Discover Assets
Automatically discover all assets using network and endpoint footprints
Assess Vulnerabilities
Reduce attack surface by prioritizing vulnerabilities
Take Action
Respond to vulnerabilities and threats before a breach occurs
Report Threats
Provide actionable analytics to identify known and unknown threats
56Mpayment cards stolen
PAYMENT CARDS
145Mcustomers’ data stolen
ONLINE RETAIL
83Mcustomers’ data stolen
FINANCIAL