Presentation is loading. Please wait.

Presentation is loading. Please wait.

Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.

Similar presentations


Presentation on theme: "Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing."— Presentation transcript:

1 Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

2 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 2 Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks..03% Dridex.02% Dyre ? Targeted Today’s security tools are failing.

3 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 3 Advanced threats target the way people work. Source: Verizon DBIR. >90% of targeted attacks start with email <10% start from web, social and other sources 100% of targeted attacks affect people

4 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 4 People are creating more data to protect. Average user creates 2TB of data/year Humans create up to 80% of an organization’s total data Typical attack surface up 44X Source: IDC.

5 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 5 The way people work is changing. Cloud Endpoints Networks

6 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 6 Is the way you work being used against you? Mobile Social Media Email Customer Service and Support Brand Engagement Applications Personal and Corporate Data Web Authentication Employee Identity

7 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 7 What is your social media security risk? Account Takeover Fraudulent Accounts Malware “Troll” Content Spam

8 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 8 Are your mobile apps leaking data? “75% of all mobile security breaches will be through apps” (Gartner IT Infrastructure & Operations Management Summit 2014)

9 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 9 Key Findings of The Human Factor 2015 On average, users click 1-in-25 malicious links in phish 66% of clicks occur within 24 hours after the message is received Peak delivery times are during business hours 1-in-5 clicks on malicious links occur off the network Attackers adapt faster than users can be educated

10 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 10 Can you tell when you’re being attacked?

11 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 11 Stopping Advanced Threats Know bad actors and tools across the attack chain, updating the defenses continuously. Be in the flow of the attack channels to provide comprehensive protection. Stop attacks everywhere people use the target channel, on network or off, on any device. See EverythingCorrelate EverythingProtect Everywhere ACTION INSIGHT

12 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 12 The Right Approach: 1. Stop advanced threats before they get to people 2.Protect the information people create to reduce the attack surface and compliance risk 3.Enable your people to respond quickly when things go wrong

13 Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 13 proofpoint Next-generation cybersecurity to protect the way people work today


Download ppt "Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing."

Similar presentations


Ads by Google