simultaneous vulnerability and threat monitoring

1
Sources: http://www.vmware.com/files/pdf/smb/Expand-Your-Virtual-Infrastructure-With-Confidence-And-Control.pdf http://www.cxounplugged.com/wp-content/uploads/2012/11/BYOD_Infographic.png www.cioinsight.com/security/slideshows/shadow-it-growing-footprint.html http://www.bloomberg.com/news/2014-04-11/millions-of-android-devices-vulnerable-to-heartbleed-bug.html http://www.washingtonpost.com/news/morning-mix/wp/2014/09/26/shellshock-bug-affects-macs-and-many-other-internet-connected-devices/ https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_%20Jan-April2014.pdf 71% growth in virtual infrastructure over 5 years 65% of employees not satisfied with virtual machine security VIRTUAL 59% of employees use personal device for job 46% BYODs are unmanaged MOBILE 49% businesses use unapproved SaaS apps ??? cannot tell who is accessing unapproved SaaS apps and leaking data CLOUD Network devices vulnerable to Heartbleed 90M Internet-facing machines exposed to Shellshock 70% Vulnerabilities in SCADA devices are exploitable remotely 87% C Y B E R C A T C H C A T C H B E E F O R T H E Y O U Y A T T A C K E R S Best Practices For Vulnerability & Threat Monitoring The challenge: Not all network assets are known or managed The challenge: Suspicious activity in endpoints and network traffic goes undetected The challenge: Many Internet-facing systems have exploitable vulnerabilities The challenge: Takes too long to discover and respond to breaches Uncertainty Resolved with Continuous Monitoring Discover Assets, Assess Vulnerabilities, Report Threats & Take Action. Learn More: tenable.com/dart Discover Assets Automatically discover all assets using network and endpoint footprints Assess Vulnerabilities Reduce attack surface by prioritizing vulnerabilities Take Action Respond to vulnerabilities and threats before a breach occurs Report Threats Provide actionable analytics to identify known and unknown threats 56M payment cards stolen PAYMENT CARDS 145M customers’ data stolen ONLINE RETAIL 83M customers’ data stolen FINANCIAL

Upload: tenable-network-security

Post on 04-Jul-2015

74 views

Category:

Internet


2 download

DESCRIPTION

Organizations continue to struggle with process of detecting security anomalies and containing cyber threats. This infographic illustrates the challenge in the context of a four-phase approach for optimizing defenses and incident response. This model from Tenable Network Security builds upon automated and comprehensive asset discover and the simultaneous detection of vulnerabilities and threats. Learn more at www.tenable.com/dart

TRANSCRIPT

Page 1: Simultaneous Vulnerability and Threat Monitoring

Sources:http://www.vmware.com/�les/pdf/smb/Expand-Your-Virtual-Infrastructure-With-Con�dence-And-Control.pdfhttp://www.cxounplugged.com/wp-content/uploads/2012/11/BYOD_Infographic.pngwww.cioinsight.com/security/slideshows/shadow-it-growing-footprint.html

http://www.bloomberg.com/news/2014-04-11/millions-of-android-devices-vulnerable-to-heartbleed-bug.htmlhttp://www.washingtonpost.com/news/morning-mix/wp/2014/09/26/shellshock-bug-a�ects-macs-and-many-other-internet-connected-devices/https://ics-cert.us-cert.gov/sites/default/�les/Monitors/ICS-CERT_Monitor_%20Jan-April2014.pdf

71% growth in virtual infrastructure over 5 years

65% of employees not satisfied with virtual machine security V

IRTU

AL

59% of employees use personal device for job

46% BYODs are unmanaged M

OBILE

49% businesses useunapproved SaaS apps

???cannot tell who is accessing unapproved SaaS apps and leaking data

CLO

UD

Network devices vulnerable to Heartbleed

90MInternet-facing machines exposed to Shellshock

70%Vulnerabilities in SCADA devices are exploitable remotely

87%

C Y B E R

C A T C H

C A T C HB EE

F O RT H E

Y O U

Y

A T T A C K E R S

Best Practices

For Vulnerability & Threat Monitoring

The challenge: Not all network assets are known or managed

The challenge: Suspicious activity in endpoints and network tra�c goes undetected

The challenge: Many Internet-facing systems have exploitable vulnerabilities

The challenge: Takes too long to discover and respond to breaches

Uncertainty Resolved with Continuous MonitoringDiscover Assets, Assess Vulnerabilities, Report Threats & Take Action. Learn More: tenable.com/dart

Discover Assets

Automatically discover all assets using network and endpoint footprints

Assess Vulnerabilities

Reduce attack surface by prioritizing vulnerabilities

Take Action

Respond to vulnerabilities and threats before a breach occurs

Report Threats

Provide actionable analytics to identify known and unknown threats

56Mpayment cards stolen

PAYMENT CARDS

145Mcustomers’ data stolen

ONLINE RETAIL

83Mcustomers’ data stolen

FINANCIAL