As cybersecurity solutions become increasingly complex, the challenge is not a lack of data, but rather in how to cut through the noise and understand what is actionable and where to allocate resources.
Scaling API-first – The story of a global engineering organization
Mind The Gap: Cybersecurity and Operational Gaps Infographic
1. Reduce Response Times:
Visual, actionable data across the data ecosystem, including public cloud
Discover the Unknown:
Analyze threats in real-time and automatically confirm compromised hosts
Streamline Management:
Implement operational control and manage enterprise policies at scale
Palo Alto Networks is helping organizations bridge these operational gaps with its best-in-class
enterprise security platform. Find out more here. http://go.paloaltonetworks.com/panos7
Read more about the steps Enterprises can take in the near and long-terms to protect
themselves in this SANS whitepaper http://go.paloaltonetworks.com/sanswp
MIND THE GAP:Three Key Operational Gaps Hamper Organizations’ Cybersecurity Efforts
As security solutions become increasingly complex, the challenge is not a lack of data, but rather in
how to cut through the noise and understand what is actionable and where to allocate resources.
Most enterprises take more than 24 hours to mobilize an investigation on alerted incidents.There is
simply too much data being analyzed and threats are hiding in plain sight.
of enterprises are unaware of the
time it takes to investigate an incident
Source: Security Operations Centers, Ernst & Young, Oct 201433%33%
of cases, attackers are able to compromise
an organization within minutes
Source: Verizon Data Breach Investigations Report, 2015
60%60%
Target had the data to discover the threat
in 2014, but information overload meant
no one paid attention to the threat
In 70% of attacks where we know the motive for the attack, there’s a secondary victim. Discovering
unknown threats and differentiation between the critical and non-critical is crucial.
of attacks spread from Victim 0 to Victim 1
within 24 hours
Source: Verizon Data Breach Investigations Report, 201575%75%
In 2014 there was an estimated $400M
financial loss globally from 700 million
compromised records.
Source: Verizon Data Breach Investigations Report, 2015
Many companies are sitting on huge numbers of policies, many of them outdated.The complexity
of provisioning and managing a security network has become too overwhelming.
Federated approach, “tri-brid” data centers,
and public cloud adoption are accelerating
complexity in management
of organizations consumed with complex
management
Source: AlgoSec 2014 State of Network Security Survey64%64%
Gap 1: ALERT ACTION
Gap 2: UNKNOWN KNOWN
Gap 3: POLICY IMPLEMENTATION
So what can organizations do?
of security network downtime is related to
human error
Source: The Cost of Server,Application and Networks Downtime,
North American Enterprise Survey, 2015
25%25%