Uncover advanced attacks and detect breaches
Transcription
Uncover advanced attacks and detect breaches
At-a-glance Uncover advanced attacks and detect breaches Advanced Compromise Assessment from HP and Mandiant Protect your business from reputational damage, data exfiltration, and financial loss by evaluating if your business has been compromised and the attackers are still active. Insights • Nearly 25% of all advanced attacks target the retail and financial services industries.1 • The average time for organizations to detect a breach is 205 days.2 • 69% of breaches are reported by a third party.3 You need to understand the risk of a cyber-attack on your business, personal, financial, and proprietary data. The cyberthreat landscape is rapidly evolving, and the sophistication of attacks has increased. And worryingly, the sources of attacks are now from highly motivated, well-funded adversaries often supported by crime syndicates and nation states. This new generation of cyber-attacks is highly targeted and seeks to remain undetected in order to perform cyber-sabotage activities or acquire intellectual property, financial data, and confidential or sensitive personal information over an extended period of time. Traditional security controls, such as firewalls, intrusion prevention systems, anti-virus, and web gateways—although still necessary—are no longer sufficient. They are failing to protect enterprises from these advanced targeted attacks and the broader problem of advanced malware. They rely on signatures and known patterns to identify and block threats but are ineffective in detecting unknown threats. andiant (FireEye) M Trends, A View from the M Front Lines, 2015 Report 2 Ibid 3 Ibid 1 This leaves a significant gap in network defenses, leaving enterprises vulnerable to zero-day and targeted advanced persistent threat (APT) attacks with their custom-developed malware. Once inside an organization, the malware uses several persistence mechanisms seeking to remain completely undetected. It can then infect other endpoints, allow further reconnaissance, steal credentials and data, or simply lie dormant until the attacker is ready to strike. Know your risks, gain visibility, and protect You know that your organization is under constant threat of attack, but you don’t know how at risk you really are. You have tight security control over your corporate assets but need assurance that threats aren’t lying dormant within your network or evading your protective measures. Combating these advanced threats and persistent adversaries requires a new approach and security model. The model needs to be real time and proactive, and you must have the capability to respond immediately and effectively to advanced and highly targeted threats. At-a-glance | Advanced Compromise Assessment from HP and Mandiant Take steps before it’s too late Team with security specialists The first step is to gain visibility of the present state of dormant and active live threats within your network environment and across your IT asset estate. The Advanced Compromise Assessment from HP and Mandiant consists of consultancy-led services that help you detect, prevent, and manage the risk from cyber-security incidents and provides warning of potential security breaches caused by advanced persistent threats. The service combines HP and Mandiant experience and methodology, developed over hundreds of investigations, the latest threat intelligence, and specialized knowledge of advanced attacker’s tools and techniques. We work with you to evaluate which systems and networks might have been compromised by stealthy and sophisticated advanced threats and zero-day malware. Through the temporary deployment of FireEye proprietary network and host-based inspection technology focused in APT detection, we search for signs of compromise to determine if attackers have been active in the past or are currently active, and identify infected assets. We also perform anomaly detection, identifying which systems and network traffic have different attributes from those typical in the environment. When signs of compromise or anomalies are identified, our team analyzes relevant data using a wide range of log and malware analysis skills and forensics expertise. By combining this information with unique threat intelligence, we confirm findings and eliminate false positives. The last stage of the Advanced Compromise Assessment service provides you a comprehensive and structured report that explains in detail our approach, summarizes all key steps, and presents key findings and recommendations. This information enables you to make the right business decisions and increase your security posture. We help enterprise and government clients protect what matters. By understanding your critical operations and mission-driven needs, we work with you to ensure information security within your organization. We provide consulting services to assist with your security strategy and help design and deploy your security improvement programs. We deliver integrated, innovative, and trusted security solutions that are proved to reduce business risk. And our managed service extends your team’s capabilities, delivering operational security efficiency, improving your security posture, and maximizing your investment in information security. HP and FireEye security consulting and managed service operations incorporate: •A joint reference architecture that includes FireEye and HP offerings •Unparalleled global reach, expertise, and access to security remediation—underpinned by best-in-class technology, methodologies, and incident response expertise •Combined global, machine-based threat intelligence and incident response analysis from millions of network and endpoint-based sensors, hundreds of incident response engagements, and billions of security events •FireEye proprietary technology to automate investigative activities for hosts and network traffic, enabling rapid assessment for even the largest and most complex networks •Expert teams available 24/7 to deliver incident response to critical security breaches •Globally available, state-of-the art forensic laboratories and testing facilities No matter where you are, or how big your organization is, we can help you protect critical information and processes while keeping your operations flexible, efficient, and responsive. Learn more at hp.com/go/fightback © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. April 2015 This is an HP Indigo digital print.