PRTODAY / NewswireToday Free press release distribution service network

Written by / Agency / Source: Vectra Networks

Check Ads Availability|e-mail Article


Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Vectra Networks Announced the Results of the First Edition of the Post Breach Industry Report - First edition of industry study finds that all sample organizations had internal networks breached by a cyber attack; 75 Percent of hosts with multiple attack detections experienced botnet attacks - VectraNetworks.com
Vectra Networks Announced the Results of the First Edition of the Post Breach Industry Report

 

NewswireToday - /newswire/ - San Jose, CA, United States, 2014/11/05 - First edition of industry study finds that all sample organizations had internal networks breached by a cyber attack; 75 Percent of hosts with multiple attack detections experienced botnet attacks - VectraNetworks.com.

   
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Vectra Networks, a leader in real-time detection of in-progress cyber-attacks, today announced the results of the first edition of The Post Breach Industry Report, an industry study using real-world data from enterprise networks to reveal what attackers do within a network once they evade perimeter defenses.

The Post Breach Industry Report collected data over five months from more than 100,000 hosts within sample organizations to gain a deeper understanding of breaches that inevitably bypass perimeter defenses, and what attackers do once inside networks. The study found that more than 11,000 hosts experienced one or multiple cyber-attacks that made it through perimeter defenses. Of these attacked hosts, 10 percent had detections for two or more attack phases such as botnet monetization, command and control, reconnaissance, lateral movement and exfiltration.

Overall, 15 percent of hosts in the participating organizations experienced a targeted attack. Once the attackers established a stronghold, they performed reconnaissance via internal port scans, lateral movement using brute force attacks, remote control of the attack with command and control communication, and exfiltration through hidden tunnels.

“While many industry reports study perimeter defenses and app/web usage by authorized users on the network, The Post Breach Industry Report is the industry’s first which studied how many attacks successfully bypass perimeter security, and what attackers do once they gain network access,” said Oliver Tavakoli, CTO of Vectra Networks, whose threat detection and reporting technology was used to gather organizations’ information for the study. “Cyber-attacks are increasingly sophisticated, highly organized, and successful despite $60 billion invested in cyber security annually worldwide. All of the attack phases detected are ones that evaded organizations’ perimeter and endpoint security systems.”

A copy of the study can be found at the Vectra Networks website.

Additional key findings of the study include:
• Eighty-five percent of attacks experienced by the sample organizations were opportunistic attacks. Two percent of the hosts experiencing an opportunistic attack were being used to spread botnet malware to other computers within the organization.
• Fifteen percent of attacks experienced by the sample organizations were targeted attacks. Two percent of these hosts under targeted attack were breached to the exfiltration stage, where the attacker was preparing to steal data.
• Seven percent of hosts had both botnet and exfiltration detections, which indicates possible theft of credentials for use in a subsequent targeted attack against the sample organization or other organizations.

The Post Breach Industry Report evaluates detection data from Vectra’s X-series platforms deployed in production networks. Vectra Networks detects attacks at every phase of an ongoing attack, regardless of how the attack enters an organization’s network and the application, operating system or device involved. The platform continuously monitors an organization’s network and provides automated, intuitive and prioritized reporting so security analysts can address the highest business risks quickly. The selected organizations in this study operate in a variety of industries, including technology, financial services and higher education.

About Vectra Networks

Vectra Networks (vectranetworks.com) is the leading innovator in real-time detection of in-progress cyber-attacks. Vectra delivers continuous automated cyber-attack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, Accel Partners, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. More information can be found at the website.

Vectra Networks is a registered trademark of Vectra Networks in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

 
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Written by / Agency / Source: Vectra Networks

 
 

Availability: All Regions (Including Int'l)

 

Traffic Booster: [/] Quick Newswire Today Visibility Checker

 

Distribution / Indexing: [+]

 
 
# # #
 
IT Security Anti-Spam Computer Security - Purchase keywords tags antivirus software firewall spyware removal virus scan computer security IT Security Anti-Spam malware / Banner Ads!.

 
  Your Banner Ad showing on ALL
IT Security/Anti-Spam articles,
CATCH Visitors via Your Competitors Announcements!


Vectra Networks Announced the Results of the First Edition of the Post Breach Industry Report

Company website links NOT available to basic submissions
It is OK to republish and/or LINK any newswire for any legitimate media purpose as long as you name Newswire Today and LINK as the source.
 
  Is this your article?
Activate ALL web links and social stream by Upgrading to Press Release PREMIUM Plan Now!

|
Publisher Contact: Dan Spalding - VectraNetworks.com 
408-326-2020 dan[.]spaldingcomm.com
 
Newswire Today - PRZOOM / PRTODAY disclaims any content contained in this article. If you need/wish to contact the company who published the current release, you will need to contact them - NOT us. Issuers of articles are solely responsible for the accuracy of their content. Our complete disclaimer appears here.
IMPORTANT INFORMATION: Issuance, publication or distribution of this press release in certain jurisdictions could be subject to restrictions. The recipient of this press release is responsible for using this press release and the information herein in accordance with the applicable rules and regulations in the particular jurisdiction. This press release does not constitute an offer or an offering to acquire or subscribe for any Vectra Networks securities in any jurisdiction including any other companies listed or named in this release.

IT Security/Anti-Spam via RSSAdd NewswireToday - PRZOOM Headline News to FeedBurner
Find who RetweetFollow @NewswireTODAY



Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!


Read Latest Articles From Vectra Networks / Company Profile


Read IT Security/Anti-Spam Most Recent Related Newswires:

Verint Named to 2017 CRM Watchlist
Frost & Sullivan Commends Coronet’s Pioneering Mobile Security Product that Protects Against Commjacking
Verint Partners with Frontline to Expand Customer Engagement Solutions Across the Netherlands
Aricent and Rohde & Schwarz Cybersecurity Unveil A Unique Bandwidth Control Solution to Enhance Customer Experience for Mobile Operators
Radware Secures Deal with Leading Content Delivery Network to Support its Security Services Over Three Year Period
Ensono Achieves EU-US Privacy Shield Certification
Accenture Integrates Blockchain Technology with Thales Hardware Security Module to Address Key Risks for Financial Services, Government, Healthcare an
Bitdefender Wins ‘Outstanding Product’ Award from AV-Comparatives
Rohde & Schwarz Cybersecurity Showcases At RSA 2017 Solutions for Secure Internet of Things
Leading Insurance Company in Southeast Asia to Deploy Verint Customer Engagement Optimization Solutions
Rambus Introduces High Bandwidth Memory PHY on GLOBALFOUNDRIES FX-14™ ASIC Platform Using 14nm LPP Process Technology
Barracuda Accelerates Customer Cloud Transitions with New 'Cloud Ready' Program
Comodo Named to Gartner Endpoint Protection Platform (EPP) Magic Quadrant
Verint Receives New Homeland Security Technology Innovation Award
Rambus Unveils 56G SerDes PHYs on Leading-Edge FinFET Technology

Boost Your Social Network
& Crowdfunding Campaigns


LIFETIME SOCIAL MEDIA WALL
NewswireToday Celebrates 10 Years in Business


PREMIUM Members


Visit  BizJobs.com

Visit  NAKIVO, Inc.





 
  ©2017 Newswire Today — Limelon Advertising, Co.
Home | About | Advertise/Pricing | Contact | Investors | Privacy/TOS | Sitemap | FRANCAIS
newswire, PR free press releases distribution service magazines engine news alert newsroom press room breaking news public relations articles company news alerts newswiredistribution ezine bizentrepreneur biznewstoday digital business report market search pr firms agencies reports distri-bution today investor relation successful internet entrepreneurs newswire distribution prtoday.com freenewswiredistribution asianewstoday bizwiretoday USA pr UK today - NOT affiliated with PRNewswire as we declined their partnership offer in 2013
 
PRTODAY & NewswireTODAY are NOT affiliated with USA TODAY (usatoday.com)