Preserve. Protect. Recover! Configuration tools may not be a traditional security solution, but as an automated component in a larger initiative, enables key security features. “Antivirus ‘is dead,’ says Brian Dye, Symantec's SVP for information security. Dye estimates antivirus now catches just 45% of cyberattacks. ” -Wall Street Journal May 4, 2014 IF ANTI-VIRUS IS DEAD, THEN WHAT? How configuration automation fills the vulnerability gap (813) 444-2231 [email protected]www.utopicsoftware.com Earlier this month, the progenitors of anti-virus software declared that “anti-virus is dead.” (Wall Street Journal May 4, 2014) According to Symantec and other industry leading statistics the software designed to prevent malware, spyware and other intrusive tactics are doomed to failure. They say that anti-virus only catches 45% of the threats. The battle is being lost because prevention and protection are always two steps behind. As fast as someone comes up with a preventive signature, six more even nastier bugs are developed and released on unsuspecting networks. It is said that 95% of all networks (source: FireEye and ThreatSTOP) have some sort of active infection. SECURITY
5
Embed
Preserve. Protect. Recover! IF ANTI-VIRUS IS DEAD, THEN WHAT? › wp-content › resources › ... · Earlier this month, the progenitors of anti-virus software declared that anti-virus
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Preserve. Protect. Recover!
Configuration tools may not be a traditional security solution, but as an automated component in a larger initiative, enables key security features.
“Antivirus ‘is dead,’ says Brian Dye, Symantec's SVP for information security. Dye estimates antivirus now catches just 45% of cyberattacks. ” -Wall Street Journal May 4, 2014
IF ANTI-VIRUS IS DEAD,THEN WHAT?
How configuration automation fills the vulnerability gap
PC end-points 2,000 Incidents per year (1:90 days/device) 8,100 Cost per incident $28.50 (based on nt’l salary avg) Hours for manual intervention 7,450* (> 3.5 FTE system techs) Existing Costs $212,325
New AUTOMATED Configuration Process
PC end-points 2,000 Incidents per year (1:90 days/device) 810 (90% reduction) Cost per incident $28.50 Hours for manual intervention 744* (1/3 FTE system techs) Adjusted Costs $21,204
Annual Savings: $191,121 or 6,700 combined personnel to reassign to higher level tasks
ROI: After investment (subscription and services), ROI was achieved in 97 days.
Automation also promotes the ability to respond to higher value
threats in a shorter amount of time. And if you can reduce the
number of security incidents through automation, you reduce the
risk of data loss, which again can amount to staggering amounts of
money given the potential cost of a single breach.
Repair/Recovery/Reimage may not be a traditional security solution, but as an automated component in
a larger initiative, enables key security features that are not only compliance requirements, but keep the
operating environment running smooth over the course of the lifecycle. And, for that reason alone, should
be included as part of any organization’s next generation security arsenal.