5 Key Findings on Advanced Threats Info graphic1. $5.4Million
40%
5KEYFINDINGSON ADVANCED THREATS
Cybercriminals are employing stealthy,
persistent methods to bypass traditional
security defenses.
Many companies are already compromised
by advanced threats and don’t even know it.
Large companies saw a 40%
increase of advanced attacks
in 2014 over the previous year
INCREASE OF
ADVANCED ATTACKS
ADVANCED THREATS
AND DATA BREACHES
ARE ON THE RISE
Source: 2015 ISTR Volume 20
Why?
When current prevention methods fail, the
time it takes to detect and respond to threats
have significant impact to the business.
Companies are struggling to limit breach
impact and contain exposure.
OF MALWARE WAS
VIRTUAL MACHINE AWARE
CURRENT PREVENTION
AND DETECTION
METHODS FALL SHORT
Source: 2015 ISTR Volume 20
Why?
Data is often not connected to and aware of
what is happening inside different parts of
the environment and coming from disparate
vendor solutions.
With all the data to sift through, companies
are trying to determine where to spend their
time. Many companies today are already
compromised and don’t even know it.
With all internal discovery
methods combined, only 9%
of victims discovered data
breaches of their own accord
OF VICTIMS DISCOVERED
DATA BREACHES
THEMSELVES
MORE TECHNOLOGY
DOES NOT EQUAL
BETTER DETECTION
Source: 2014 Data Breach Investigations Report,” Verizon, 2014
Why?
IT struggles to cope with the massive
amounts of incidents, investigating too
many false positives.
Companies need a better way to correlate
all the data from the external and internal
threat intelligence so they can react quickly
and identify and address their most severe
incidents before it’s too late.
66%
of breaches took months
to years to discover a breach,
3 months to find a breach and
4 months to resolve
BREACHES TOOK MONTHS
TO YEARS TO DISCOVER
INCIDENT RESPONSE
IS TAKING TOO LONG
Source:: Verizon DBIR 2013
66%
Why?
Breaches cost organizations time to
identify, respond and resolve threats.
Investment in multiple technologies can be
expensive and result in having to hire more
staff to manage it all.
ORGANIZATIONAL
COST OF DATA BREACH
IS $5.4 MILLION
THE COST OF A
DATA BREACH
IS SIGNIFICANT
Source: Ponemon Institute 2013 Cost of a Data Breach Research Report
Part #21356413
Why?
28%
9%
LEARN MORE ABOUT SYMANTEC
ADVANCED THREAT PROTECTION AT
symantec.com/advanced-threat-protection
IMPLEMENT A UNIFIED ADVANCED THREAT
PROTECTION SOLUTION THAT ALLOWS YOU TO:
WHAT CAN YOU DO?
Detect advanced threats with
better visibility and intelligence
across all your networks,
endpoints, and emails
Provide the ability to respond to
security incidents within minutes
and remediate confirmed threats
Ease the burden on resources
and make it possible for IT,
security operations and
advanced security teams to
protect their business efficiently
ADVANCING SECURITY.
Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, Norton, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names
may be trademarks of their respective owners.
28% of malware was virtual
machine aware in 2014
Companies are dealing with growth in
data and an expanding number of
endpoints, servers and mobile devices.
Managing disparate solutions and services can result in high costs,
inefficient operational processes and mean threats remain undetected
across the business. Security can’t afford to rely on organizations’
strained IT resources. Companies need a unified advanced threat
protection solution to prevent, detect and remediate threats quickly
across their network, endpoint and email without the headache of
managing disparate technology.