As the cyber threat environment evolves, threat protection must evolve as well. With the emergence of targeted attacks and advanced persistent threats, it is clear that a new approach to cyber security is required. Traditional techniques are simply no longer adequate to secure data against sophisticated cyber attacks.
These cyber attacks have proven their ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. The most likely targets are the companies that have corporate IP and data that offers the cyber criminals the most rewards – financial institutions, healthcare organizations, major retailers and others.
PC World reported an 81% increase in 2011 of advanced, targeted computer hacking attacks, and according to Verizon’s 2012 research findings, there were a staggering 855 cyber security incidents and 174 million compromised records.
According to the 2012 Ponemon study on the costs of cybercrime in the US for 56 large organizations, there are 1.8 successful attacks per organization per week, with the average cybercrime costing organisation about $8.9M per organisation.
Most of these cyber attacks are customised to the target organisations and include a the following features:
With this cyber-criminal activity rapidly on the rise, how can you take effective cyber security measures?
The ideal solution would weave your entire security infrastructure into a customised and adaptable defence approach tuned to your particular environment and particular attackers. It would enable you to not only detect and analyse these attacks, but fight back against your attackers.
Our Custom Defence approach is a specialized threat protection platform that performs network-wide monitoring to detect zero-day malware, malicious communications, and attacker behaviors that are invisible to standard security defenses.
Our solution runs suspect code in a safe, controlled environment that can be optimised for performance and configured to evade hacker techniques that are on the lookout for sandboxing solutions.The resulting analysis enables you to profile the risk, origin, and characteristics of the attack, and uniquely delivers actionable intelligence to help you contain and remediate the attack, then adapt and strengthen your protection against further cyber attacks.
Our solution is the only one which provides a complete lifecycle for dealing with these cyber attacks and targeted threats . In summary the solution: