Presentation is loading. Please wait.

Presentation is loading. Please wait.

Strong Security for Your Weak Link:

Similar presentations


Presentation on theme: "Strong Security for Your Weak Link:"— Presentation transcript:

1 Strong Security for Your Weak Link:
Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

2 Today’s security tools are failing.
.03% Dridex .02% Dyre ? Targeted Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks.

3 Advanced threats target the way people work.
100% of targeted attacks affect people <10% start from web, social and other sources >90% of targeted attacks start with Source: Verizon DBIR.

4 People are creating more data to protect.
Average user creates 2TB of data/year Humans create up to 80% of an organization’s total data Typical attack surface up 44X Source: IDC.

5 The way people work is changing.
Cloud Endpoints Networks

6 Is the way you work being used against you?
Mobile Social Media Web Authentication Employee Identity Customer Service and Support Brand Engagement Applications Personal and Corporate Data

7 What is your social media security risk?
Spam Fraudulent Accounts Malware “Troll” Content Account Takeover

8 Are your mobile apps leaking data?
“75% of all mobile security breaches will be through apps” (Gartner IT Infrastructure & Operations Management Summit 2014)

9 Key Findings of The Human Factor 2015
On average, users click 1-in-25 malicious links in phish 66% of clicks occur within 24 hours after the message is received Peak delivery times are during business hours 1-in-5 clicks on malicious links occur off the network Attackers adapt faster than users can be educated

10 Can you tell when you’re being attacked?

11 Stopping Advanced Threats
INSIGHT ACTION See Everything Correlate Everything Protect Everywhere Be in the flow of the attack channels to provide comprehensive protection. Know bad actors and tools across the attack chain, updating the defenses continuously. Stop attacks everywhere people use the target channel, on network or off, on any device.

12 The Right Approach: Stop advanced threats before they get to people
Protect the information people create to reduce the attack surface and compliance risk Enable your people to respond quickly when things go wrong

13 proofpoint Next-generation cybersecurity to protect the way people work today


Download ppt "Strong Security for Your Weak Link:"

Similar presentations


Ads by Google