CLOSING THE 1% GAP THAT S COSTING YOU MILLIONS

Similar documents
Case Study. Top Financial Services Provider Ditches Detection for Isolation

Endpoint Security Transformed. Isolation: A Revolutionary New Approach

Managed Endpoint Defense

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Security By Design: Application Isolation & Containment

The Hidden Costs of Detect-to-Protect Security

A Simple Guide to Understanding EDR

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER

The 2017 State of Endpoint Security Risk

Defend Against the Unknown

The C-Level Executive s Guide to Transforming Endpoint Security

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE ACCENTURE CYBER DEFENSE SOLUTION

The Cybercrime Storm Continues. Are You Prepared? Can You Prevent Data Breaches?

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Maximizing IT Security with Configuration Management WHITE PAPER

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Machine Learning and Advanced Analytics to Address Today s Security Challenges

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

Ransomware piercing the anti-virus bubble

Symantec Endpoint Protection 14

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

BUFFERZONE Advanced Endpoint Security

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Security and Compliance for Office 365

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Live Attack Visualization and Analysis. What does a Malware attack look like?

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

QUICK WINS: Why You Must Get Defensive About Application Security

Building a Smart Segmentation Strategy

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

FIREWALL BEST PRACTICES TO BLOCK

June 2 nd, 2016 Security Awareness

esendpoint Next-gen endpoint threat detection and response

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Securing Digital Transformation

Advanced Malware Protection: A Buyer s Guide

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Bromium: Virtualization-Based Security

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

with Advanced Protection

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

The threat landscape is constantly

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

Better Security. Fewer Resources. Cylance Bolsters Endpoint Protection Without PC Performance Impact or Incremental Costs

Popular SIEM vs aisiem

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Solving the AV Problem. Whitepaper

Cybersecurity and Hospitals: A Board Perspective

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

Gujarat Forensic Sciences University

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Security Gap Analysis: Aggregrated Results

Carbon Black PCI Compliance Mapping Checklist

Designated Cyber Security Protection Solution for Medical Devices

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

CloudSOC and Security.cloud for Microsoft Office 365

Panda Security 2010 Page 1

ANATOMY OF AN ATTACK!

2018 Edition. Security and Compliance for Office 365

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

AKAMAI CLOUD SECURITY SOLUTIONS

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

2017 Annual Meeting of Members and Board of Directors Meeting

Protect Your End-of-Life Windows Server 2003 Operating System

A Guide to Closing All Potential VDI Security Gaps

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

BUFFERZONE Advanced Endpoint Security

Transforming Security from Defense in Depth to Comprehensive Security Assurance

HEALTH CARE AND CYBER SECURITY:

Reduce Your Network's Attack Surface

Protect Your End-of-Life Windows Server 2003 Operating System

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

9 Steps to Protect Against Ransomware

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Zimperium Global Threat Data

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

CyberArk Privileged Threat Analytics

Symantec Ransomware Protection

MESSAGING SECURITY GATEWAY. Solution overview

Fortinet, Inc. Advanced Threat Protection Solution

MODERN DESKTOP SECURITY

TRAPS ADVANCED ENDPOINT PROTECTION

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

What is Penetration Testing?

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

The Artificial Intelligence Revolution in Cybersecurity

Transcription:

CLOSING THE 1% GAP THAT S COSTING YOU MILLIONS

When 99% is just not good enough Even with the next-generation tools, anti-virus protection will never reach 100% effectiveness. The 1% of threats that are slipping through layered defense systems cost organizations $3.62 million per breach. Ponemon Institute 3 Executive Summary Worldwide enterprise security spending is expected to reach $96.3 billion in 2018, an increase of 8 percent from 2017 1. Organizations are spending more on security than ever before, but the number and severity of cyber attacks is on the rise, resulting in hundreds of millions of dollars in losses for businesses worldwide. Despite advancements in cybersecurity, malware is still getting through existing defenses. Often malware exploits legitimate business applications through a single compromised endpoint to gain a foothold on an entire organization before spreading laterally, resulting in catastrophic data breaches, damage, and destruction. The constantly shifting cybersecurity landscape and the growing sophistication of attackers are making it exceedingly difficult to build prevention systems that can detect the newest exploits. This is especially evident when zero-day attacks such as WannaCry 2 first break out, rapidly infecting organizations through a previously undetected flaw in computer operating systems. Even when a fix becomes available, the ransomware continues to spread at an incredible speed through companies who have not yet patched their devices. Fundamentally, anti-virus (AV) solutions alone don t work well on an enterprise scale. Even with the most advanced technology available to today s cyber defenders, AV protection will never reach 100 percent effectiveness. It s the 1 percent of threats that are slipping through layered defense systems and even the most advanced AV solutions that is costing organizations a staggering $3.62 million per breach. 3 The good news is that you can close that 1 percent gap and keep your network secure against even the most unpredictable and cunning attacks. This white paper explains why, in the age of zero-day and polymorphic malware, AV can no longer guarantee your company s security, and introduces the concepts of application isolation and virtualization-based security as the most practical and cost-effective last line of defense for today s enterprises. Anti-Virus Solutions Can Never Reach 100% Effectiveness For years, AV vendors have competed for the best detection rates, but despite the introduction of the next-gen anti-virus (NGAV) solutions that use machine learning (ML), the goal of achieving 100 percent rate of detection remains out of reach. The fundamental issue is that detection requires a patient zero an initial victim, an endpoint that s being used by malware to try and penetrate the rest of the organization. Before a solution can be found, a security team needs to identify the threat, the ingress point, and try to understand exactly what actions are being

performed by the malicious code. In today s world of zero-day and polymorphic malware, this course of action is not effective, and even prompt action leaves organizations vulnerable. Machine learning vendor data is included starting from this date 94% 88% 94% 96% 98% 99% 99% 2011 2012 2013 2014 2015 2016 2017 Leading AV Vendor Effectiveness in Protecting Against Malware Infections AV-TEST GmbH an independent service provider in IT security and anti-virus research conducts monthly tests to evaluate the effectiveness of the leading AV vendor solutions against zero-day malware attacks. This chart shows the results on the Business Windows Client for the month of October, years 2011 through 2017. Complete results and individual vendor scores can be found at: https://www.av-test.org/en/press/test-results/ The difficult job of defending against polymorphic malware Up to 99% of malware has polymorphic capabilities and 97% of malicious files are completely unique to each endpoint. AV alone is not enough to provide security for organizations infrastructure and proprietary enterprise assets. 2016 Verizon Data Breach Investigations Report Verizon s 2016 Data Breach Investigation Report found that 99 percent of malware hashes are seen for only 58 seconds or less. 4 What s more, most malware is only seen once so even with the aid of ML, AV software simply can t detect the malicious code before it has morphed into something completely different. Detection-based security will always be a step behind the attackers. Even the newest ML models are ineffective against zero-day, unknown, and polymorphic malware, and fare especially poorly against sophisticated nation-state threats. By manipulating the machine training data, cybercriminals can trick ML into classifying malicious samples as legitimate; or disguise malware through bit shifting, repacking, or compressing, to force ML to falsely classify it as safe. These are the fundamental facts that organizations must consider when selecting their cybersecurity strategy: There will always be software vulnerabilities that cyber criminals can exploit Organizations and their data will continue to be targeted with malicious code and threats It s not feasible to fully anticipate an attacker s next move. Signature-based AV is effective at catching what has previously been seen, but not as effective against today s polymorphic malware. It s estimated that 97% of malware is unique to a specific endpoint. 5

Anti-virus has been the first line of defense for many firms over the last quarter of a century. Generally speaking, AV relies on malware signatures and behavioral analysis to uncover threats to people s PCs and smartphones. But in the last 10 years, research has indicated AV is rarely successful in detecting smart malware. Forbes/Security 6 Is Anti-Virus Needed for Compliance? Organizations who drop AV, like Netflix famously did back in 2015, garner headlines. But many industries are still required to use AV to meet specific compliance requirements, in particular, policies governing payment card protection (PCI DSS). Many of today s organizations continue to pay licensing fees for AV software because they view it as a necessary checkbox item that is a part of their layered defense strategy, and to avoid penalties for non-compliance. It is no surprise that compliance with PCI DSS does not mean that your organization is protected. When the retailer Target 7 and other entities such as Heartland Payment Systems 8 were breached, they were PCI-compliant. While AV is still required to meet compliance regulations, it doesn t have to be a cost center. Numerous free AV solutions are available today, enabling you to meet compliance regulations without spending considerable resources on recurring software licensing fees. Application Isolation Closes the 1% Gap Fundamentally, stopping malware by using detection is flawed. It will always be a matter of catch-up, as the writers of malicious code tend to always be one step ahead. Rather than playing catch up with attackers, application isolation neutralizes threats before they inflict damage. Cyber attacks are on the rise. The volume of successful breaches per company has grown more than 27% 9 from an average of 102 in 2016 to 130 in 2017. Ransomware attacks alone have doubled in frequency, from 13 to 27 percent 10, with widely publicized malware like WannaCry and Petya affecting thousands of targets and disrupting organizations around the world. Trying to keep up with this onslaught armed only with AV solutions is not a sustainable strategy. A shift is needed if we are to succeed at stopping new threats. Instead of trying to identify if code is malicious before it runs, why not let it actually run to confirm its real intention? Unlike traditional security technologies that try to stop malicious code from running using various pre-execution techniques, the application isolation approach allows malicious code to run while fully tracing the kill chain to generate a complete malware manifest. In the meantime, the malware is completely precluded from infecting the operating system or accessing the internal network. Virtualization-based security works by opening each application and task (such as a document or browser tab) inside a unique hardware-enforced micro-virtual machine (micro-vm). Isolated malware cannot access high-value information, credentials, or the enterprise network. Bromium s virtualization-based security solution completely removes the need for remediation upon conclusion of each user task, endpoints self-remediate by automatically discarding each micro-vm, eliminating malware persistence.

What s a micro-vm? Virtualization-based security uses hardware-isolated micro- VMs for each task a user performs using information and files originating from unknown sources. Micro-VMs provide a secure environment where user tasks are isolated from one another, the host system, and the organization s internal network. Micro-VMs isolate unknown incoming content from the host while letting users click with confidence. Application isolation doesn t rely on signatures to detect malicious activity. Each protected endpoint learns about the attack through introspection of what is going on inside the micro-vm. Once the browser tab or file is closed, the malware is disposed of along with the micro-vm. All information about the threat is collected and shared in real time with other endpoints to protect the entire organization. Bromium s virtualization-based security approach supplies breachless threat intelligence feeds concerning isolated malware attacks in a variety of standardized formats to help harden the additional layered defenses that missed the threat initially. Virtualization-based security and application isolation dramatically decrease attack surfaces and protect users whether they are online or offline. Most importantly, they help turn your largest liability your endpoints and servers into your best defense. Task Within an Application OSI API System Processes Each micro-vm contains the entire operating system stack, including the Windows Kernel. Application isolation shifts the attack surface from the massive OS and application footprint, down to the hypervisor and CPU. Kernel Micro-VM CPU

Virtualization-Based Security Saves Millions Bromium s virtualization-based security remediates any threats simply by closing the malicious application, document, or browser tab automatically terminating the micro-vm and any malware it contains. According to Cybersecurity Ventures report, global ransomware damage costs are predicted to exceed $11.5 billion annually by 2019 up from $325 million in 2015. 11 Application isolation closes the 1 percent gap by stopping zero-day attacks and unknown targeted malware even threats created using nation-state tools dramatically reducing the risk of security breaches for enterprises and government agencies. Organizations that add application isolation to backstop their traditional layered defenses no longer need to worry about the costly impact of ransomware. Bromium s virtualization-based security remediates any threats simply by closing the malicious application, document, or browser tab. Doing so automatically terminating the micro-vm and any malware it contained. Since there is no breach, there is no need for remediation or reimaging of infected PCs. Another cost-saving benefit of the virtualization approach to security is that events generated for isolated threats are highly likely to be true positive alerts, thus significantly reducing the costs for triage and investigation of false positives. A recent Vanson Bourne research 12 reveals that conventional detection tools, such as threat and intrusion detection systems, anti-virus software, firewalls, etc. unleash thousands of alerts per day, but up to 70 percent of all these alerts are false positives. Even more importantly, the extremely rare false negatives (missed detections) are still protected by Bromium isolation, providing the ultimate backstop to devastating breaches. It can be extremely time consuming to for the SOC team to try to understand the nature of each attack, determine how the hacker gained entry, what actions they took, and how much damage has been done. With thousands of alerts to triage every single day, security teams spend hundreds of thousands of hours per year on this task alone, over-stretching limited resources and keeping the SOC team buried in security alerts. Add to it the cost of overtime, paying for third-party investigative and remediation services, the additional expense required for rebuilding of compromised devices and applying emergency patches, and the cost of labor for managing alerts and remediating attacks can exceed $16 million per year. Tools and licenses: Labor: Advanced threat detection tools - $159K Emergency patching - $30K Detonation environments - $112K Rebuilding devices - $96K Anti-virus - $44K Triaging threats - $16M Whitelisting/blacklisting systems 30K Total: $16.7 million per year

Conclusion Organizations of all types and sizes are increasingly moving away from anti-virus because it is simply not sufficient for protection at enterprise scale. Application isolation protects assets and networks from the final 1 percent of malware that continues to slip through layered defenses, costing businesses and governments millions. Organizations that are required to have anti-virus to meet specific compliance regulations can cost-effectively couple application isolation with a free AV solution that is already bundled with existing licensed software. Benefits of application isolation and control: Businesses can dramatically reduce the cost of cybersecurity, while ensuring that systems and data are fully protected False-positive detections no longer require the expenditure of scarce resources to track down False negatives (missed detections) don t result in costly breaches because threats are isolated Endpoint remediation and reimaging due to malware infections become practically non-existent Security patching for applications and operating systems can be planned, eliminating costly crisis patching

Protect Before You Detect with Bromium Secure Platform Bromium uses virtualization-based security to protect your brand, data and people. We convert an enterprise s largest liability endpoints and servers into its best defense. By leveraging our patented hardware-enforced containerization to deliver application isolation and control, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security or scalable pinpoint implementation targeting your most severe threat vectors and counts a rapidly growing set of Fortune 500 companies and government agencies with the most demanding security requirements as customers. Contact Bromium for more information about how application isolation and control can help you protect before you detect using virtualization, and turn around your approach to security. Citations 1. Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017, December 2017 2. WannaCry ransomware: what is it and how to protect yourself, Wired 3. Ponemon Institute s 2017 Cost of Data Breach Study, June 2017 4. 2016 Verizon Data Breach Investigations Report, April 2016 5. Webroot 2017 Threat Report 6. Netflix Is Dumping Anti-Virus, Presages Death Of An Industry, Forbes, August 26, 2015 7. Anatomy of the Target Data Breach, ZDNet 8. Heartland Payment Systems Suffers Data Breach, Forbes 9. Cost of cyber crime study 2017, The Cybersecurity Observatory 10. Cost of cyber crime study 2017, The Cybersecurity Observatory 11. Ransomware Damage Report, 2017 Edition, Cybersecurity Ventures, May 2017 12. The Hidden Costs of Detect-to-Protect Security, Vanson Bourne Bromium, Inc. 20883 Stevens Creek Blvd. Suite 100 Cupertino, CA 95014 +1 408 213 5668 Bromium UK Ltd. 2nd Floor, Lockton House Clarendon Road Cambridge CB2 8FH +44 1223 314914 For more information visit Bromium.com or write to info@bromium.com. Copyright 2018 Bromium, Inc. All rights reserved. 04122018