simultaneous vulnerability and threat monitoring
DESCRIPTION
Organizations continue to struggle with process of detecting security anomalies and containing cyber threats. This infographic illustrates the challenge in the context of a four-phase approach for optimizing defenses and incident response. This model from Tenable Network Security builds upon automated and comprehensive asset discover and the simultaneous detection of vulnerabilities and threats. Learn more at www.tenable.com/dartTRANSCRIPT
Sources:http://www.vmware.com/�les/pdf/smb/Expand-Your-Virtual-Infrastructure-With-Con�dence-And-Control.pdfhttp://www.cxounplugged.com/wp-content/uploads/2012/11/BYOD_Infographic.pngwww.cioinsight.com/security/slideshows/shadow-it-growing-footprint.html
http://www.bloomberg.com/news/2014-04-11/millions-of-android-devices-vulnerable-to-heartbleed-bug.htmlhttp://www.washingtonpost.com/news/morning-mix/wp/2014/09/26/shellshock-bug-a�ects-macs-and-many-other-internet-connected-devices/https://ics-cert.us-cert.gov/sites/default/�les/Monitors/ICS-CERT_Monitor_%20Jan-April2014.pdf
71% growth in virtual infrastructure over 5 years
65% of employees not satisfied with virtual machine security V
IRTU
AL
59% of employees use personal device for job
46% BYODs are unmanaged M
OBILE
49% businesses useunapproved SaaS apps
???cannot tell who is accessing unapproved SaaS apps and leaking data
CLO
UD
Network devices vulnerable to Heartbleed
90MInternet-facing machines exposed to Shellshock
70%Vulnerabilities in SCADA devices are exploitable remotely
87%
C Y B E R
C A T C H
C A T C HB EE
F O RT H E
Y O U
Y
A T T A C K E R S
Best Practices
For Vulnerability & Threat Monitoring
The challenge: Not all network assets are known or managed
The challenge: Suspicious activity in endpoints and network tra�c goes undetected
The challenge: Many Internet-facing systems have exploitable vulnerabilities
The challenge: Takes too long to discover and respond to breaches
Uncertainty Resolved with Continuous MonitoringDiscover Assets, Assess Vulnerabilities, Report Threats & Take Action. Learn More: tenable.com/dart
Discover Assets
Automatically discover all assets using network and endpoint footprints
Assess Vulnerabilities
Reduce attack surface by prioritizing vulnerabilities
Take Action
Respond to vulnerabilities and threats before a breach occurs
Report Threats
Provide actionable analytics to identify known and unknown threats
56Mpayment cards stolen
PAYMENT CARDS
145Mcustomers’ data stolen
ONLINE RETAIL
83Mcustomers’ data stolen
FINANCIAL