1 / 9

John Prisco Chief Executive Officer

SINET 16 Presentation. John Prisco Chief Executive Officer. 2013 Data Breach Report 621 Confirmed Data Breaches, 44 Million Compromised Records, 47,000 Security Incidents. The Facts. 69 % OF BREACHES WERE SPOTTED BY AN EXTERNAL PARTY.

favian
Download Presentation

John Prisco Chief Executive Officer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SINET 16 Presentation John Prisco Chief Executive Officer

  2. 2013 Data Breach Report • 621 Confirmed Data Breaches, 44 Million Compromised Records, 47,000 Security Incidents The Facts • 69% OF BREACHES WERE SPOTTED BY AN EXTERNAL PARTY. • Only 9% OF BREACHES WERE DISCOVERED BY INTERNAL IT STAFF • 66% OF CASES WERE NOT DISCOVERED FOR MONTHS, EVEN YEARS

  3. The New Defense-In-Depth Strategy Network Endpoint

  4. Current Solutions Virtualization Sandbox Whitelisting WEAKNESSES WEAKNESSES WEAKNESSES • - Does not detect malware • Persistent components susceptible to breach • Requires enterprise-wide computer hardware ‘forklift’ upgrade • Must lockdown enterprise for effective use • Maintenance too difficult for endpoints • Masked executables and encrypted traffic defeat the sandbox • Rule set uses prior knowledge TRIUMFANT ADVANTAGES TRIUMFANT ADVANTAGES TRIUMFANT ADVANTAGES • Rule set independent of prior knowledge • Detects masked executables and encrypted traffic • No lockdown required • Effective for servers and endpoints • Detects and remediates malware • Operates with all existing hardware

  5. Policy Templates Adaptive Reference Model Triumfant Big Data Analytics Approach Model Creation Analytic Engine Collector Agents Database Collector Agents

  6. Policy Templates Root Cause Analysis Adaptive Reference Model K A R R Triumfant Big Data Analytics Approach Diagnose and Remediate Analytic Engine Collector Agents Responses Database Collector Agents

  7. Partners Triumfant is a McAfee Compatible certified member of the McAfee Security Innovation Alliance. Triumfant is a certified member of the ArcSight Common Event Format (CEF) Partner Program. Triumfant has developed a “comply to connect” product with Juniper. Triumfant is integrated with Symantec. Triumfant is integrated with bmcRemedy. Common Criteria EAL2+ Certification U.S. Army Information Assurance Approved Product Certifications CyberScope – NIST certified FDCC SCAP – NIST certified

  8. Summary: If you have implemented these defenses… Virtualization FW+IDS/IPS, Whitelisting Sandbox You also need a pragmatic, cost-effective endpoint defense: Triumfant completes your defense-in-depth strategy If you’re

  9. Thank You! john.prisco@triumfant.com 301.917.6281 If you’re

More Related