2. THE SHAPE OF THE FUTURE
Endpoint
Enterprise
Everything
Where does the physical world end and the digital begin?
Cloud
App Revolution
IoT
Global
Mobile
Social
Network
Users
Apps
Data
3. WHO ARE THE OPPONENTS?
Hacktivists
Politically
or socially
motivated
Organized
Crime
Big business
hacking
Nation States
State-
sponsored,
highly
sophisticated
7. FIVE STEPS TO CHANGE THE ODDS
o Design in security by default
o Reduce surface and create
segmentation
o Use and lead the community
o Go to the real source of truth
(behavioral data)
o Enable visibility and control
8. EXPLOITING ADVERSARY WEAKNESSES
o Embedded security increases
friction for adversary
o Well-enabled security team allows
early identification
o Community acts as force multiplier
o Automated analysis and response
limits impact
10. CONNECT
THE DOTS
See the full attack story
Spot previously unseen activities
Ever-evolving picture of your
environment
Centrally correlate across every
endpoint
Behavioral analytics