Download presentation
Presentation is loading. Please wait.
1
Today’s cyber security landscape
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2
WHAT DO THEY ALL HAVE IN COMMON?
DATA BREACHES SINCE 2004 WHAT DO THEY ALL HAVE IN COMMON? 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
3
Existing Point Solutions FAILED
Sandbox AV IPS White Listing FW Existing Point Solutions FAILED TO STOP THE BREACH A patchwork of point solutions that failed to stop the breach 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
4
Harder to Prevent & Detect
MALWARE 40% STOPPING MALWARE IS NOT ENOUGH LOW HIGH THREAT SOPHISTICATION Harder to Prevent & Detect MALWARE 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
5
Harder to Prevent & Detect
NON-MALWARE ATTACKS MALWARE 40% YOU NEED COMPLETE BREACH PREVENTION 60% LOW HIGH NON-MALWARE ATTACKS THREAT SOPHISTICATION Harder to Prevent & Detect MALWARE TERRORISTS HACKTIVISTS/ VIGILANTES CYBER- CRIMINALS Organized Criminal Gangs NATION- STATES 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
6
ENDPOINT DETECTION AND RESPONSE
Continuous Breach Prevention NEXT-GEN ANTIVIRUS ENDPOINT DETECTION AND RESPONSE MANAGED HUNTING Cloud Delivered 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
7
WHAT IS NEXT-GEN AV? Machine Learning Block Known Bad
FEATURES Machine Learning Block Known Bad IOA Behavioral Blocking Exploit Mitigation 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
8
WHAT DOES NEXT-GEN AV DO?
BENEFITS Machine Learning IOA Behavioral Blocking Block Known Bad Exploit Mitigation BUSINESS VALUE PREVENTS ALL TYPES OF ATTACKS Protect against Known/Unknown Malware Protect Against Zero-Day Attacks Eliminate Ransomeware No Signature Updates No User Impact—Less than 1% CPU overhead Reduce re-imaging time and costs 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
9
TODAY’S ENDPOINT DETECTION AND RESPONSE
FEATURES PREVENT AGAINST ! DVR FOR ENDPOINT SILENT FAILURE 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
10
ENDPOINT DETECTION AND RESPONSE DOES…
BUSINESS VALUE BENEFITS PREVENT AGAINST SILENT FAILURE DVR FOR ENDPOINT 5 Second Enterprise Search No Hardware or Storage Costs Full Spectrum Visibility Reduced Time to Remediation 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
11
BREACH PREVENTION SERVICES
DON’T WAIT ON THE ADVERSARIES TO FIND YOU FEATURES 24 x 7 BREACH PREVENTION SERVICES Team of Hunters Working for You CS Feedback (round 2): All industries, customers over 170 countries does not make sense as they are listed her Remove. Focus on: Continuous incident response Crowdsourced across all industries and geographies 24x7 team of hunters working for you Reduced alert fatigue: prescriptive actions FINDING THE ADVERSARY So You Don’t Have To 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
12
BREACH PREVENTION SERVICES
THE VALUE OF PROACTIVE HUNTING BUSINESS VALUE BENEFITS FINDING THE ADVERSARY So You Don’t Have To BREACH PREVENTION SERVICES Team of Hunters Working for You 24 x 7 Stop the “Mega” Breach Force Multiplier Community Immunity Reduce Alert Fatigue: Focus on What Matters ! 2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.