Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.

Similar presentations


Presentation on theme: "Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only."— Presentation transcript:

1 Tripwire Threat Intelligence Integrations

2 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only 51% of AV scanners detected new malware samples Lastline Labs 85% of breaches could be prevented by remediating known vulnerabilities US CERT Percentage of unauthorized data access was through compromised servers Verizon DBIR

3 3 Enterprise Cyberthreat Gap Response Gap Time between discovery to remediation to limit damage Detection Gap Time between actual breach and discovery Prevention Gap Time to put preventative measures in place to avoid future attacks Have we been breached? Can we avoid this from happening again? How bad is it? DETECTION GAP RESPONSE GAP PREVENTION GAP

4 4 Challenge to Close the Gap Advanced attacks—harder to detect and faster compromises – do I have an advanced threat? Limited context – need high-confidence, accurate information – where is the threat? is it on a critical system? Inadequate resources/time – need better prioritization – what is at risk? what do I fix first?

5 5 Tripwire Cyberthreat Security Portfolio Detecting indicators of breach, compromise, and vulnerability

6 6 Tripwire Dynamically Integrates Threat Intelligence Enabling zero-day and advanced threat detection and response Detect, analyze and report zero-day exploits and advanced persistent threats Automatic, immediate analysis of suspicious files and malware Complete forensics about all your secured assets Close the Detection Gap Close the Prevention Gap Automatically block files identified as malicious Control, monitor and adjust configurations Close the Response Gap Prioritize alerts and response by business context

7 7 Quickly Identify Potential Threats on High-Risk Assets Customer Use Case Identify suspicious files on critical assets Send files to partner for analysis Update controls based on identified threats !

8 8 Automated Threat Monitoring to Reduce Attack Surface Automatically download Indicators of Compromise Apply Tripwire policies to monitor for IOCs Drive workflow for remediation IOCs Customer Use Case

9 9 Quickly Detect & Respond to Advanced Threats Do I have an advanced threat? Real-time detection with advanced security intelligence High-confidence source if asset is compromised Empowering instant threat analytics and response Where is the threat? Is it on a critical system? What do I fix first? Focus on high-value assets based on business context Trigger rapid investigation based on detection & threat intel Targeted attack protection through Cybercrime Controls How can I avoid this from happening again? Continuous discovery, profiling, vulnerability and configuration assessment Control, Monitor and Adjust - configurations and policies based on new threat intelligence and new IOCs Harden configurations and adjust policies to reduce threat surface

10 THANK YOU!


Download ppt "Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only."

Similar presentations


Ads by Google