Upload
nathaniel-richards
View
218
Download
2
Embed Size (px)
Citation preview
Strong Security for Your Weak Link:
Implementing People-Centric Security
Jennifer Cheng, Director of Product Marketing
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 2
Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks.
.03%
Dridex
.02%
Dyre
?
Targeted
Today’s security tools are failing.
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 3
Advanced threats target the way people work.
Source: Verizon DBIR.
>90%of targeted
attacks start with email
<10%start from web,
social and other sources
100%of targeted
attacksaffect people
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 4
People are creating more data to protect.
Average user creates 2TB of data/year
Humans create up to 80% of an
organization’s total data
Typical attack surface up 44X
Source: IDC.
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 5
The way people work is changing.
Cloud
Endpoints
Networks
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 6
Is the way you work being used against you?
MobileSocial Media
Customer Service and
Support
Brand Engagement
Applications
Personal and Corporate Data
Web Authentication
Employee Identity
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 7
What is your social media security risk?
Account Takeover
Fraudulent Accounts Malware
“Troll” Content
Spam
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 8
Are your mobile apps leaking data?
“75% of all mobile security breaches will be through apps”
(Gartner IT Infrastructure & Operations Management Summit 2014)
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 9
Key Findings of The Human Factor 2015
On average, users click 1-in-25 malicious links in phish
66% of clicks occur within 24 hours after the message is received
Peak delivery times are during business hours
1-in-5 clicks on malicious links occur off the network
Attackers adapt faster than users can be educated
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 10
Can you tell when you’re being attacked?
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 11
Stopping Advanced Threats
Know bad actors and tools across the attack chain, updating the
defenses continuously.
Be in the flow of the attack channels to provide
comprehensive protection.
Stop attacks everywhere people use the target channel, on
network or off, on any device.
See Everything Correlate Everything Protect Everywhere
ACTIONINSIGHT
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 12
The Right Approach:
1. Stop advanced threats before they get to people
2. Protect the information people create to reduce the attack surface and compliance risk
3. Enable your people to respond quickly when things go wrong
Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 13
proofpointNext-generation cybersecurity to protect the way people work today