Mais conteúdo relacionado Symantec Survey: Cybersecurity Threats! Are You Prepared?1. THREATS!AREYOUPREPARED?
TraditionalPC
Threats
100
80
60
20
40
0
10
30
50
70
90
66%
Risk
NewMobile
Threats
Risk
100
80
60
20
40
0
10
30
50
70
90
71%
Compromised
Email
Risk
100
80
60
20
40
0
10
30
50
70
90
66%
80 75 70 65 60 55 50 45 40
40
45
50
55
60
65
70
75
80
UNPREPAREDPREPARED
HIGHRISKLOWRISK
RECOMMENDATIONS
100
80
60
20
40
0
10
30
50
70
90
67%
Prepared
Advanced
Persistent
Threats
Doyouhaveadequatein-house
expertisetoremediate
AdvancedPersistentThreats?
100
80
60
20
40
0
10
30
50
70
90
69%
Risk
Canasinglevendorprovidea
completesolutionforAdvanced
PersistentThreats/Advanced
TargetedAttacks?
Prepared
100
80
60
20
40
0
10
30
50
70
90
54%
Prepared
100
80
60
20
40
0
10
30
50
70
90
55%
Prepared
100
80
60
20
40
0
10
30
50
70
90
57%
• Todays targeted attacks require a multi-layered approach– where data between the endpoints, web and
messaging gateways, and data center is protected.
• Advanced targeted attacks also require fast detection– accurate detection, analysis, and rapid remediation is
key. A solution combineing global threat intelligence, fine-tuned correlation of attack activity across network and endpoint, and
tightly integrated endpoint protection is ideal.
• Secure devices– only legitimate users should be granted access to corporate assets. A strong two-factor authentication
solution is a best practice.
• Ultimately the data itself must be secured wherever it lives– encryption, mobile management, and data loss
prevention solutions are essential components of an end-to-end security strategy.
Securing Servers
Securing Network
Gateways
71%
70%
Securing Mobile
Devices 45%
Securing Endpoints
Correlating Data to
Identify Threats
Correlating Data to
Identify Targeted
Attacks
69%
51%
49%
CurrentSecurity
Effectiveness
Finding employees with
necessary security
expertise
Obtaining support
from upper
management
Obtaining Budget
76%
60%
Finding solutions to
meet my needs 57%
53%
Implementing desired
integration or data sharing
between security tools
Implementing the
chosen solution
Devising a
comprehensive
security plan
60%
59%
57%
KeyChallengesby
Priority
Protecting against
data loss from insider
threats
Supporting BYOD
Securing against
APTs/advanced
targeted attacks
Securing access for
remote or mobile
users/devices
74%
73%
Implementing security
for virtual datacenter
or private cloud
68%
62%
Monitoring/protecting
endpoints
Securing against
targeted attacks
72%
72%
69%
FutureSecurityStrategies
byImportance
Yes48%No
36%
No74%
Yes26%
No,butweareusing
anoutsideservice
16%
New Mobile Threats
Access of Stolen/Lost Laptops
Access of Stolen
Mobile Devices
Apple OSs Attacks
Unauthorized
Server Access
Data Loss
(insider threat)
Traditional PC
Threats
Compromised
Email Accounts
Advanced
Persistent Threats
www.symantec.com