Wired USA - 03.2020

(Barré) #1
You have

72 HRS


to disclose a data
breach under
the EU’s General
Data Protection
Regulation.

It looks like the bad guys also connected to a fi le server.
The scope of this attack depends on what’s on that
server. Reveal(x) uses its understanding of fi le protocols
to determine that no customer data was accessed.


(^4) DETERMINE THE BLAST RADIUS
The fi le server isn’t the only area of concern. Through secure
decryption of your network traffi c, Reveal(x) helps your team
determine that the attacker connected to your public cloud
storage via HTTPS.
(^5) CONTINUE THE PURSUIT
More than


70 M


records were
stolen or leaked
in 2018 due to
misconfigured
cloud storage.

Upon further investigation, your team determines that
the intruder used a Drupal exploit to attack one of your
VPN-connected, cloud-hosted virtual machines. It was
detected by Reveal(x) Cloud, halting any attempts to
access any of your cloud resources and storage.

(^6) CONTROL THE CLOUD
Your data is safe, but it’s time to determine how the attacker
got in — the DC wasn’t directly connected to the Internet.
The fake DC accepted a connection from a security camera,
one with a known remote code execution vulnerability. But
the fi rmware was never updated.
(^72) STRENGTHEN YOUR WEAK POINTS
You don’t know how long this security
camera was compromised. How long
threats go undetected is known as dwell
time. Fortunately, Reveal(x) alerts you and
helps your team respond the moment
the attacker moves. Your data is safe, but
vigilance is never-ending.


8 CUT DWELL TIME


TO LEARN MORE, VISIT EXTRAHOP.COM/SECURE


More than

70 %


of web traffic
is encrypted.
SOURCE: Google

Average threat dwell time:

78 D AY S


SOURCE: 2019 Mandiant FireEye

Reveal(x) offers

59 %


more efficient threat response.
SOURCE: IDC

Detection and response
costs account for

60 %


of security budgets.
SOURCE: Gartner Research

SOURCE: Symantec
Free download pdf