John Prisco Chief Executive Officer SINET 16 Presentation
Feb 06, 2016
John PriscoChief Executive Officer
SINET 16 Presentation
The Facts
• 69% OF BREACHES WERE SPOTTED BY AN EXTERNAL PARTY.
• Only 9% OF BREACHES WERE DISCOVERED BY INTERNAL IT STAFF
• 66% OF CASES WERE NOT DISCOVERED FOR MONTHS, EVEN YEARS
2013 Data Breach Report621 Confirmed Data Breaches, 44 Million Compromised Records, 47,000 Security Incidents
The New Defense-In-Depth Strategy
Network Endpoint
Sandbox
WEAKNESSES
- Masked executables and encrypted traffic defeat the sandbox
- Rule set uses prior knowledge
- Rule set independent of prior knowledge
- Detects masked executables and encrypted traffic
TRIUMFANT ADVANTAGES
Virtualization Whitelisting
- Does not detect malware- Persistent components susceptible
to breach- Requires enterprise-wide computer
hardware ‘forklift’ upgrade
- No lockdown required- Effective for servers and endpoints
- Must lockdown enterprise for effective use
- Maintenance too difficult for endpoints
- Detects and remediates malware- Operates with all existing hardware
TRIUMFANT ADVANTAGES TRIUMFANT ADVANTAGES
WEAKNESSES WEAKNESSES
Current Solutions
AdaptiveReference
ModelDatabase
Collector
CollectorAgents
Agents
PolicyTemplates
Triumfant Big Data Analytics ApproachModel Creation
Analytic Engine
Root CauseAnalysisAdaptive
ReferenceModel
Database
Collector
CollectorAgents
Analytic Engine
PolicyTemplates
Responses
RA
RK
Triumfant Big Data Analytics ApproachDiagnose and Remediate
Agents
Triumfant is a McAfee Compatible certified member of the McAfee
Security Innovation Alliance.
Triumfant is a certified member of the ArcSight Common Event Format (CEF) Partner Program.
Triumfant is integrated with Symantec.
Triumfant has developed a “comply to connect” product with Juniper.
Triumfant is integrated with bmcRemedy.
Partners
Common Criteria EAL2+
Certification
U.S. Army Information Assurance Approved
Product
FDCC SCAP – NIST certified
CyberScope – NIST certified
Certifications
Summary: If you have implemented these defenses…
Triumfant completes your defense-in-depth strategy
You also need a pragmatic, cost-effective endpoint defense:
If you’re
Sandbox FW+IDS/IPS,
Whitelisting
Virtualization