SecurityEmpowers
Business
For More Information:
www.bluecoat.com/ATPlifecycle
Advanced Threat ProtectionA unified defense is required to securely empower the business
Lifecycle Defense
engthen hold
Zero-DayThreats AdvancedTargeted
tacks
InitialIntrusion
OutboundConnectionInitiated
Deployment
AdwareUnknown
MalwareSpyware
Testdetecti Rootkits
PhishingAttacks
Exploits
Bootkits
Infrast
targetResearchBuild onAcquire
Find andOrganize Accomplices
DefineTargetCover Tracks
and remainundetected
Ex trate
dataADVANCED PERSISTENT THREATSADVANCED TARGETED ATTACKSZERO-DAY THREATSUNKNOWN MALWARE
Ongoing OperationsDetect & ProtectBlock All Known Threats
STAGE
1
Incident ContainmentAnalyze & Mitigate
Novel Threat Interpretation
STAGE
2
ADVANCED THREAT PROTECTION
STAGE
3Incident Resolution
Investigate & Remediate Breach
Threat Profiling & Eradication
GLOBALINTELLIGENCENETWORK
LIFECYCLE DEFENSE
THE IMPACT OF ADVANCED THREATS TO YOUR ORGANIZATION
Average time to discover anadvanced persistent threat for amalicious breach
Average time to resolution for amalicious breach
DAYS DAYS80 123
The
Pos
t Bre
ach
Boo
m re
sear
ch, P
onem
on In
stitu
te N
= 3,
529
in 8
cou
ntrie
s.
The average total organizational cost of a data breach
$5.4mMeasured in US$ For country = US, 2013 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2013
THE LIFECYCLE DEFENSE UNIQUELY DELIVERS:Threat Spectrum Protection: The integrated defense targets all three types of threats targetingenterprises: Known, Unknownand Latent.
Threat Intelligence Sharing: Closed loop feedback automaticallyshares intelligence with other systemsin the lifecycle defense to inoculatethe organization from future attacks.
Protection Efficiency: Intelligence sharing and theconversion of unknown threats intoknown threats transfers protection tothe web gateway and reduces burdenon other defenses in the network.