SlideShare a Scribd company logo
1 of 10
Download to read offline
Actionable Threat Intelligence. Now.
Leading the Automation and Threat Information Sharing Industry
BrightPoint Security
Prescriptive Threat Intelligence and Predictive Insight
Leveraging Communities
For Faster Protection.
BrightPoint. Outsmarting the Bad Guys, Together.
2
In the Dark
3
Worm
Trojan
Malware
Web
Attacks
Botnet
DDOS
Ransom ware
Spam
Botnet Forum Activity
Worm
Zero day
Trojan
Trojan
Spam
Zero day
Forum Activity
DDOS
Root kit
Virus
Botnet
DDOS
Botnet
Root kit
Virus
Botnet
Torrent Usage
Zero day
Spam
Phishing
Botnet
Botnet
Trojan
DDOS DDOS
Torrent Usage
Worm
Virus
Spam Ransom ware
Malware
Phishing
Worm
DDOS
Botnet
Malware
Root kit
198.20.70.114
md5:760c35a80d
758f032d02cf4db
12d3e55
Sources:;PWC 2014; Verizon Data Breach Report 2014
Attack Complexity and Impact Growing
4
Attack Velocity Increasing
75%
79%
Challenge Up, Confidence Down
of CISOs believe their job is more
challenging than 2 years ago
Victim 1 to Victim 2 in 24 hours.
Victim 2 to 3 in only 1 hour
Immediate, Prescriptive, Predictive Intelligence
5
Threat Intelligence
Command Platform
Detect
Prevent Analyze
Intelligence Powered By Your Digital Ecosystem
6
•  Ajay Nigam, Products
•  Jill Kyte, Marketing
Experienced Security Leadership Scaling Business
•  Anne Bonaparte, CEO
•  Rich Reybok, Engineering
7
BrightPoint Security
•  Real Time Threat Intelligence Relevance and Context
–  Automation and enrichment delivers enterprise-centric relevance and context
•  Predictive Insight and Prescriptive Response
–  Risk-prioritized prescriptive response and predictive insight for proactive defense
•  Unique Insights From Digital Ecosystems, Supply Chains and Peers
–  Granular policy-based control for secure bi-directional threat intelligence sharing
•  Differentiated, Patented, Scalable Federated Architecture and Solution
–  Built by and for security practitioners - easy to deploy, independent, extensible
•  Experienced Team Scaling the Business
–  Key partnerships and customers, expanding roadmap, building momentum
8
Machine Learning + Human Intelligence
9
BrightPoint. Outsmarting the Bad Guys, Together.
Actionable Threat Intelligence. Now.
www.BrightPointSecurity.com

More Related Content

What's hot

5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeCrowdStrike
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 

What's hot (20)

5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Cyber Crime - Who do you call?
Cyber Crime - Who do you call?Cyber Crime - Who do you call?
Cyber Crime - Who do you call?
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
News Bytes - December 2012
News Bytes - December 2012News Bytes - December 2012
News Bytes - December 2012
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 

Viewers also liked

GSN Digital - Leveraging Games as a Powerful Marketing Medium
GSN Digital - Leveraging Games as a Powerful Marketing MediumGSN Digital - Leveraging Games as a Powerful Marketing Medium
GSN Digital - Leveraging Games as a Powerful Marketing MediumFutureM
 
Your business depends your customers - keeping them in the loop
Your business depends your customers - keeping them in the loop Your business depends your customers - keeping them in the loop
Your business depends your customers - keeping them in the loop Mahesh Paolini-Subramanya
 
Barb Brightpoint All Points
Barb Brightpoint All PointsBarb Brightpoint All Points
Barb Brightpoint All Pointsedenbj
 
The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)Keika20
 
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.Julie Hansen
 
Miva Presentation | The 2nd Annual eCommerce Expo South Florida
Miva Presentation | The 2nd Annual eCommerce Expo South FloridaMiva Presentation | The 2nd Annual eCommerce Expo South Florida
Miva Presentation | The 2nd Annual eCommerce Expo South FloridaRand Internet Marketing
 
Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Todd Merrill
 
Springbot 2014 - A Year in Review
Springbot 2014 - A Year in ReviewSpringbot 2014 - A Year in Review
Springbot 2014 - A Year in ReviewAinsley Akam
 
Increase your Service Advantage: Innovations in Agent Hiring
Increase your Service Advantage: Innovations in Agent HiringIncrease your Service Advantage: Innovations in Agent Hiring
Increase your Service Advantage: Innovations in Agent HiringHireIQ Solutions, Inc.
 
Springbot | 2nd Annual eCommerce Expo South Florida
Springbot |  2nd Annual eCommerce Expo South Florida Springbot |  2nd Annual eCommerce Expo South Florida
Springbot | 2nd Annual eCommerce Expo South Florida Rand Internet Marketing
 
Video blog post samples
Video blog post samplesVideo blog post samples
Video blog post samplesJoel W. King
 
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...JouleX
 
$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki
$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki
$10,000 Phantom App & Playbook Contest - F5 and Cisco MerakiJoel W. King
 
VoIP applications and the Cloud - Where gen_fsm really shines
VoIP applications and the Cloud - Where gen_fsm really shines VoIP applications and the Cloud - Where gen_fsm really shines
VoIP applications and the Cloud - Where gen_fsm really shines Mahesh Paolini-Subramanya
 

Viewers also liked (20)

GSN Digital - Leveraging Games as a Powerful Marketing Medium
GSN Digital - Leveraging Games as a Powerful Marketing MediumGSN Digital - Leveraging Games as a Powerful Marketing Medium
GSN Digital - Leveraging Games as a Powerful Marketing Medium
 
Media brix report_20122
Media brix report_20122Media brix report_20122
Media brix report_20122
 
Staq (short)
Staq (short)Staq (short)
Staq (short)
 
Your business depends your customers - keeping them in the loop
Your business depends your customers - keeping them in the loop Your business depends your customers - keeping them in the loop
Your business depends your customers - keeping them in the loop
 
Barb Brightpoint All Points
Barb Brightpoint All PointsBarb Brightpoint All Points
Barb Brightpoint All Points
 
The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)The White Legacy--Generation 4, College (Part 2)
The White Legacy--Generation 4, College (Part 2)
 
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.
Are Your Brand's Ads Seen On Facebook? Here's How To Ensure They Will Be.
 
Ari
AriAri
Ari
 
Miva Presentation | The 2nd Annual eCommerce Expo South Florida
Miva Presentation | The 2nd Annual eCommerce Expo South FloridaMiva Presentation | The 2nd Annual eCommerce Expo South Florida
Miva Presentation | The 2nd Annual eCommerce Expo South Florida
 
Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis Predictive Analytics from Emotional Analysis
Predictive Analytics from Emotional Analysis
 
Epiphyse
EpiphyseEpiphyse
Epiphyse
 
Springbot 2014 - A Year in Review
Springbot 2014 - A Year in ReviewSpringbot 2014 - A Year in Review
Springbot 2014 - A Year in Review
 
7.9.15 webinar
7.9.15 webinar7.9.15 webinar
7.9.15 webinar
 
Increase your Service Advantage: Innovations in Agent Hiring
Increase your Service Advantage: Innovations in Agent HiringIncrease your Service Advantage: Innovations in Agent Hiring
Increase your Service Advantage: Innovations in Agent Hiring
 
Springbot | 2nd Annual eCommerce Expo South Florida
Springbot |  2nd Annual eCommerce Expo South Florida Springbot |  2nd Annual eCommerce Expo South Florida
Springbot | 2nd Annual eCommerce Expo South Florida
 
Video blog post samples
Video blog post samplesVideo blog post samples
Video blog post samples
 
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...
Reducing Energy Consumption from the Core to the Edge: The JouleX and Cisco E...
 
$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki
$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki
$10,000 Phantom App & Playbook Contest - F5 and Cisco Meraki
 
Introduction to HireIQ Solutions
Introduction to HireIQ SolutionsIntroduction to HireIQ Solutions
Introduction to HireIQ Solutions
 
VoIP applications and the Cloud - Where gen_fsm really shines
VoIP applications and the Cloud - Where gen_fsm really shines VoIP applications and the Cloud - Where gen_fsm really shines
VoIP applications and the Cloud - Where gen_fsm really shines
 

Similar to Leading Automation and Threat Sharing with Prescriptive Intelligence

PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfrsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfRichard Smiraldi
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking IJECEIAES
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityHeritageCyberworld
 

Similar to Leading Automation and Threat Sharing with Prescriptive Intelligence (20)

PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Cybersecurity -Terms.
Cybersecurity -Terms.Cybersecurity -Terms.
Cybersecurity -Terms.
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Understing the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot securityUndersting the mirai botnet and the impact on iot security
Understing the mirai botnet and the impact on iot security
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfrsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 

Leading Automation and Threat Sharing with Prescriptive Intelligence

  • 1. Actionable Threat Intelligence. Now. Leading the Automation and Threat Information Sharing Industry
  • 2. BrightPoint Security Prescriptive Threat Intelligence and Predictive Insight Leveraging Communities For Faster Protection. BrightPoint. Outsmarting the Bad Guys, Together. 2
  • 3. In the Dark 3 Worm Trojan Malware Web Attacks Botnet DDOS Ransom ware Spam Botnet Forum Activity Worm Zero day Trojan Trojan Spam Zero day Forum Activity DDOS Root kit Virus Botnet DDOS Botnet Root kit Virus Botnet Torrent Usage Zero day Spam Phishing Botnet Botnet Trojan DDOS DDOS Torrent Usage Worm Virus Spam Ransom ware Malware Phishing Worm DDOS Botnet Malware Root kit 198.20.70.114 md5:760c35a80d 758f032d02cf4db 12d3e55
  • 4. Sources:;PWC 2014; Verizon Data Breach Report 2014 Attack Complexity and Impact Growing 4 Attack Velocity Increasing 75% 79% Challenge Up, Confidence Down of CISOs believe their job is more challenging than 2 years ago Victim 1 to Victim 2 in 24 hours. Victim 2 to 3 in only 1 hour
  • 5. Immediate, Prescriptive, Predictive Intelligence 5 Threat Intelligence Command Platform Detect Prevent Analyze
  • 6. Intelligence Powered By Your Digital Ecosystem 6
  • 7. •  Ajay Nigam, Products •  Jill Kyte, Marketing Experienced Security Leadership Scaling Business •  Anne Bonaparte, CEO •  Rich Reybok, Engineering 7
  • 8. BrightPoint Security •  Real Time Threat Intelligence Relevance and Context –  Automation and enrichment delivers enterprise-centric relevance and context •  Predictive Insight and Prescriptive Response –  Risk-prioritized prescriptive response and predictive insight for proactive defense •  Unique Insights From Digital Ecosystems, Supply Chains and Peers –  Granular policy-based control for secure bi-directional threat intelligence sharing •  Differentiated, Patented, Scalable Federated Architecture and Solution –  Built by and for security practitioners - easy to deploy, independent, extensible •  Experienced Team Scaling the Business –  Key partnerships and customers, expanding roadmap, building momentum 8
  • 9. Machine Learning + Human Intelligence 9 BrightPoint. Outsmarting the Bad Guys, Together.
  • 10. Actionable Threat Intelligence. Now. www.BrightPointSecurity.com