rethink security - Centrify

0 downloads 181 Views 5MB Size Report
of organizations experience an average of 5 or more security breaches.2. TODAY'S SECURITY. IS NOT SECURE. It's Time for
TODAY’S SECURITY IS NOT SECURE It’s Time for a Massive Rethink in Security

Tens of billions of dollars are being spent on cyber security annually, yet organizations are still being breached at an alarming rate.

$75B+

spent on cyber security technology like firewalls, virtual private networks (VPNs), and antivirus software.1

5-year IT-security spending is forecasted to reach

$1 TRILLION by 2021.2

Yet 66%

of organizations experience an average of 5 or more security breaches.2

With the rapid introduction of new technologies, platforms, applications, and practices...

90%

of all organizations are moving to the cloud.3

42.5%

of the entire global workforce is expected to be mobile by 2022.5 Up to

200 BILLION IoT devices will need to be secured by 2020.4

Traditional static, perimeter-based security methods are not secure.

And no password is safe.

W E A K PA S S W O R D

2/3

password

|

D E FAU LT PA S S W O R D

admin

of confirmed data breaches involve weak, default, or stolen passwords.6

|

S T O L E N PA S S W O R D

johndoe1

|

An average of approximately

166,000 records are lost or stolen every hour.7

80%

of security breaches involve privileged credentials.8

And the problem gets bigger as the human attack surface reaches

4 BILLION people online by 2020.9

The business impact is

catastrophic...

The cost of data breaches is projected to reach

$2.1 TRILLION by 2019

Companies lose 5% in stock value on the day a breach 10 is announced.

Yahoo is now facing an SEC probe regarding 2013 and 2014 data breaches that compromised the sensitive information of over one billion users and singlehandedly devalued Yahoo by $350 million.12

2013

After a 2014 data breach, Target reported a loss of $440 million in profits—a decrease of 46%.11

2014

Dozens of well known companies experienced major outages after the DNS provider Dyn experienced a severe and extended DDoS attack. The cause? Millions of IoT devices with the same unchanged default password were hijacked to create the so-called Mirai botnet.13

2016

During the U.S. presidential election, groups of attackers gained access to DNC servers and released sensitive information that had a major impact on the presidential election.

Over 50% of CMOs say their breaches caused significant brand and reputation damage and decreased customer

and consumer trust in their organization.

14

This new threatscape requires a paradigm shift.

Next Dimension Security™ Where Security Follows Identity REDUCE BREACHES BY 50%

More IAM mature enterprises see drastically improved security.15

LOWER IAM TECHNOLOGY COSTS BY 40% The more IAM approaches employed, the greater the technology savings reported.16

SAVE AN AVERAGE $5M IN BREACH COSTS IAM mature organizations have fewer breaches resulting in lower costs.17

IMPROVE END-USER PRODUCTIVITY

46% of more IAM mature organizations eliminated redundant security technologies or vendors to improve productivity.18

Find out how to protect your enterprises from breaches.

RETHINK SECURITY A massive paradigm shift in the age of access

Download the eBook, RETHINK SECURITY: A Massive Paradigm Shift in the Age of Access.

DOWNLOAD

1 http://www.forbes.com/sites/stevemorgan/2016/03/09/world wide-cybersecurity-spending-increasing-to-170-billion-by-2020

8 http://solutionsreview.com/identity-management/privileged-accountmanagement-by-the-numbers

2 http://cybersecurityventures.com/cybersecurity-market-report 3 www.logicworks.net/blog/2015/03/difference-private-public-hybrid-cloud-comparison

9 http://blogs.microsoft.com/microsoftsecure/2016/01/27/the-emerging-era-ofcyber-defense-and-cybercrime

4 http://www.fool.com/investing/2016/11/23/iot-stocks-what-to-watch-in-2017.aspx

10 Centrify/Ponemon Study.

5 https://www.strategyanalytics.com/access-services/enterprise/mobile-workforce/ market-data/report-detail/global-mobile-workforce-forecast-update-2016-2022#.WIZSsrGZP64

11 http://nypost.com/2014/02/26/targets-profits-down-46-after-data-breach

6 http://www.verizonenterprise.com/resources/reports/ rp_dbir-2016-executive-summary_xg_en.pdf

13 https://www.wired.com/2016/11/web-shaking-mirai-botnet-splintering-also-evolving

7 http://breachlevelindex.com

15-18 Forrester, Stop the Breach, January 2017.

12 http://www.wsj.com/articles/yahoo-faces-sec-probe-over-data-breaches-1485133124 14 Centrify/Ponemon Study.