The Cybercrime Storm Continues Are You Prepared? Can You Prevent Data Breaches?
Contents Information security is broken Legacy security can t stop today s threats The new model of security isolate threats The benefits of Bromium Summary 02
Picture this: A storm is barreling down on your organization. The rising tide brings flood waters. Would you place your faith in decades-old safeguards? Would you trust your levee not to break? Gifted with the hindsight of recent disasters, not many of us would trust outdated safeguards, yet that is exactly the situation that so many information security executives face today. Many organizations are still clinging to security solutions from the past millennium. Read on to learn how the legacy information security model is fundamentally broken, how malicious actors take advantage of this and how to evolve to a new security architecture that defeats attacks by isolating them, preventing breaches. 01
Information security is broken. According to industry analysts, more than $70 billion is spent on information security each year an increase of approximately 300 percent over the past decade. Despite this staggering spend, it seems that more organizations than ever are getting breached; estimates peg the number at an astounding 97 percent. Every week a new third-party report highlights that virtually every enterprise has been compromised and many of them don t even know it! In 2014 alone, there were more than 1,500 reported breaches, which resulted in more than 500 million records being compromised seven times more than the previous year. This only takes into account the reported breaches, so the figured is assuredly much higher. The 2015 Verizon Data Breach Incident Report (DBIR) states that there are five malware events every second almost half a million per day! More than 70 percent of breaches start at the endpoint. Where did the industry go wrong and what can be done to right it? It is clear that the industry is failing in its primary goal of keeping malicious code off PCs. GARTNER Our anti-virus product just doesn t cut it One in five pieces of malware go undetected. IT MANAGER, CONAGRA
2013 600+ breaches 90+ million records 2014 1,500+ breaches 500+ million records BREACHES 2,000 1,500 1,000 500 0 2013 2014 COMPANIES BREACHED* Central Hudson Gas & Electric Drupal Evernote Living Social Nintendo Scribd South Africa Police Twitter Ubisoft Ubuntu Washington State Court System Yahoo Japan Aaron Brothers Adobe American Express AOL Capitol One Comcast COX Ebay etrade Home Depot JPMC Kmart Lexis Nexis Michael s Stores Nasdaq NVIDIA Paytime PF Chang s Sands Snapchat SONY Staples Sutherland Healthcare Target Walgreens *partial list 03
Threats have evolved to evade decades-old protections 04
Legacy security can t stop today s threats. In 1994, Firewalls and Internet Security: Repelling the Wily Hacker set an industry standard for information security: it defined perimeter-enabled internal collaboration, but prevented external access. This may have worked 20 years ago, but environments have grown increasingly complex due to the proliferation of Internet-enabled businesses, cloud-based applications and a mobile workforce. Attacks may now be delivered through a hotel s WiFi network or even malicious advertising. Not even mainstream sites, such as YouTube or Dictionary.com, can be trusted by default. Signature writers for detectionbased solutions are failing, unable to keep up with these complex environments and rapidly changing threats. According to the 2015 Verizon DBIR, 70 to 90 percent of malware samples are unique to the organization they attack, rendering signaturebased detection irrelevant. Additionally, 75 percent of attacks spread from victim zero to victim one in less than 24 hours, again rendering signature-based detection irrelevant. In fact, the vast majority of attacks only exist for 24 hours hardly enough time for malware researchers to create and disseminate the signatures to stop them. 05
The new model of security isolate threats. Legacy Solutions Can t Stop the Modern Attacks Seen Today There is a solution that can Bromium. Bromium has pioneered a new security model of threat isolation to prevent data breaches. Our unique approach revolutionizes endpoint security and stops cyber attacks, including advanced persistent threats, zero-day attacks, and spear-phishing attacks more effectively than any other solution available today. Bromium s microvirtualization (micro-vm) technology automatically and instantly isolates all user tasks and content in a secure container. Malware that may enter the micro-vm through, for example, vulnerable applications or malicious websites can t access anything outside of the micro-vm. Endpoint threat isolation should be a core component of security prevention programs. With Bromium we have an ability to gain increased visibility into threats and mitigate their disruption to our business and clients. This is the most significant advancement in security in decades. BOB BIGMAN, FORMER CISO, CIA ROLAND CLOUTIER, CSO, ADP 06
When the user completes the task, the micro-vm is discarded, along with any malware that may be present. Threats and exploits become a non-issue. And because malware can be allowed to safely execute within the confines of the micro-vm, security professionals have unmatched visibility into its behavior and characteristics and can apply that threat intelligence across the entire organization to quickly defend against future attacks. Micro-virtualization is a gamechanging technology for the enterprise. CISO, AETNA It is phenomenally effective. There is nothing else like it out there. CISO, PIONEER Bromium has pioneered a new security model 07
The benefits of Bromium. Protect Data and IP Bromium isolates every website, document or email attachment in a micro-vm. This hardware-enabled isolation contains any malware in the micro-vm, where it cannot escape or persist, and can t compromise an organization. Bromium defeats attacks on the endpoint, in the office or on the road and keeps you out of the headlines. Click on Anything Bromium relieves users from the burden of security. With Bromium users are protected from email-based attacks and browser-based attacks, and have the freedom to do their jobs anywhere and access anything without ever worrying about security. And it is all transparent to the end user, so they can click on anything, anywhere, without risk of compromise. Streamline Security Bromium dramatically reduces or eliminates the cost and complexity of time-consuming manual processes, such as managing false alerts, deploying patches and remediating compromised endpoints. IT has more time for other, more strategic, activities. Bromium isolated 100% of advanced attacks in our independent testing. NSS LABS We could not compromise or breach the vsentry micro-vm, even after exhaustive penetration testing. IOACTIVE Deploy application containment to isolate risky applications, such as browsers and PDF viewers, from the core endpoint system resources where these applications are the primary avenue of attack. GARTNER
Bromium prevents data breaches 09
Summary Traditional defenses cannot withstand the new breed of attacks cybercriminals are using today. Detection doesn t work anymore, leaving organizations that have not moved to a new model of protection increasingly vulnerable. The network perimeter has crumbled raising the importance of protecting the endpoint. The new model of endpoint security threat isolation prevents data breaches and provides complete visibility into attacks. The new era of endpoint protection has dawned. Will your organization be one of those to embrace the new model and be safely high and dry? Or will you drown in a sea of modern attacks and cyber threats? 010
Bromium, Inc. 20813 Stevens Creek Blvd Cupertino, CA 95014 info@bromium.com +1.408.213.5668 Bromium UK Ltd. Lockton House 2nd Floor, Clarendon Road Cambridge CB2 8FH +44.1223.314914 For more information refer to www.bromium.com or contact sales@bromium.com Copyright 2015 Bromium, Inc. All rights reserved. EB.Overview.US-EN.1508