FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 / 408.321.6300 / 877.FIREEYE (347.3393) / [email protected] fireeye.com © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. INFO.MVX.EN-US.112016 LEARN MORE www.fireeye.com/network Organizations can minimize the risks of costly cyber breaches with the right network security solution. FOUR REQUIREMENTS OF NETWORK SECURITY 1 3 OUTCOMES FROM THE IDEAL NETWORK SECURITY SOLUTION CONSISTENT LEVEL OF PROTECTION ACROSS LOCATIONS AND DEVICES 1 ALERT TO FIX IN MINUTES 2 OPERATIONALLY COST EFFICIENT 3 Identify and build the right network security solution for your needs RAPID INCIDENT RESPONSE 2 REAL TIME DETECTION AND BLOCKING Network Security to Combat Threats in Rapidly Changing Organizations 320 DAYS Cybercriminals evade traditional security solutions, break into organizations and stay undetected for months. 2 80% Malware is targeted and often used only once 3 making signature- and policy-based defenses ineffective. MALWARE USED ONCE +80% ALERTS Most alerts are unreliable 4 and generated in numbers that overwhelm security teams, slowing response to critical incidents. $4M The average cost of a data breach is significant. 1 Breach attempts are evasive, stealthy, frequent and costly. THREAT LANDSCAPE Migration to public cloud increases Internet traffic by 40%. All this traffic must be inspected for threats. Non-Windows devices supported by 96% of organizations 5 today are often not as well protected as Windows devices. +40% 96% 40% Adoption of direct-to-Internet links by 40% of branches 6 increases exposure to attacks outside the strongly protected headquarters. Business-driven IT transformation expands the organizational attack surface. IT TRANSFORMATION 5 JAMF Software (2015). "2015 Survey. Managing Apple Devices in the Enterprise." 6 IDC (February 2016). "Communication Service Provider Adoption of SD-WAN Technology and Its Impact to MPLS VPN Services." 1 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.” 2 Mandiant Consulting (2016). "M-Trends 2016." 3 Joshua Goldfarb (September 19, 2016). "Detection Innovations." 4 Ponemon Institute LLC (January 2015). "The Cost of Malware Containment." INTELLIGENCE-LED SECURITY SCALABLE AND FLEXIBLE DEPLOYMENT MODELS 4