You have
72 HRS
to disclose a data
breach under
the EU’s General
Data Protection
Regulation.
It looks like the bad guys also connected to a fi le server.
The scope of this attack depends on what’s on that
server. Reveal(x) uses its understanding of fi le protocols
to determine that no customer data was accessed.
(^4) DETERMINE THE BLAST RADIUS
The fi le server isn’t the only area of concern. Through secure
decryption of your network traffi c, Reveal(x) helps your team
determine that the attacker connected to your public cloud
storage via HTTPS.
(^5) CONTINUE THE PURSUIT
More than
70 M
records were
stolen or leaked
in 2018 due to
misconfigured
cloud storage.
Upon further investigation, your team determines that
the intruder used a Drupal exploit to attack one of your
VPN-connected, cloud-hosted virtual machines. It was
detected by Reveal(x) Cloud, halting any attempts to
access any of your cloud resources and storage.
(^6) CONTROL THE CLOUD
Your data is safe, but it’s time to determine how the attacker
got in — the DC wasn’t directly connected to the Internet.
The fake DC accepted a connection from a security camera,
one with a known remote code execution vulnerability. But
the fi rmware was never updated.
(^72) STRENGTHEN YOUR WEAK POINTS
You don’t know how long this security
camera was compromised. How long
threats go undetected is known as dwell
time. Fortunately, Reveal(x) alerts you and
helps your team respond the moment
the attacker moves. Your data is safe, but
vigilance is never-ending.
8 CUT DWELL TIME
TO LEARN MORE, VISIT EXTRAHOP.COM/SECURE
More than
70 %
of web traffic
is encrypted.
SOURCE: Google
Average threat dwell time:
78 D AY S
SOURCE: 2019 Mandiant FireEye
Reveal(x) offers
59 %
more efficient threat response.
SOURCE: IDC
Detection and response
costs account for
60 %
of security budgets.
SOURCE: Gartner Research
SOURCE: Symantec