[ad_1]
Transcript
Eva Chen: Women and gents, prospects, companions, and cybersecurity specialists, thanks for becoming a member of us at Views 2021. I feel in 2020, we, all collectively, share one factor… all of us skilled a 12 months that we by no means skilled earlier than. The pandemic pressured us into bodily isolation and we can not meet nose to nose, however that isolation truly pressured us to speed up the digital transformation.
That digital transformation signifies that we’re working from residence. We’re learning from residence. We’re pressured to to not journey, however we’re much more linked within the cyber conflict. Sadly, cybercriminals are exploring this tremendous linked cyber world and due to this fact our cyber safety resolution must take a giant step into the transformation. Why is all this [happening]? First, allow us to take a look at the risk panorama that’s taking place in 2020.
In 2020, FBI truly obtained greater than 2,000 complaints every day, which signify 69% improve YoY… Meaning US $4.2 billion in losses to the cyber criminals. Additionally, we noticed that cybercriminals now are launching extra completely different sort of assaults.
There is a 34% improve in new ransomware household techniques and increasingly vital sector are being attacked. Not solely the risk panorama and the attacker modified, but in addition there is a new problem due to the infrastructure change or the person habits change. There are two huge modifications. First one, is the cloud… there’s increasingly prospects.
You and your group are pressured to speak extra along with your accomplice or along with your buyer by means of the cloud infrastructure and due to this fact there’s extra cloud purposes launched. We’re seeing over 56% of organizations that encounter cyber safety occasion, which contain cloud native purposes as a consequence of misconfiguration or an unpatched vulnerability.
So, cloud and DevOps environments introduce new challenges for the cybersecurity atmosphere. The second space that we’re seeing greater challenges is IT meets OT. Earlier than, we all the time suppose the operation applied sciences similar to manufacturing unit manufacturing, are remoted and that they don’t seem to be being linked over the IT infrastructure. However, due to the necessity to make this digital transformation, we see OT and IT are linked.
And due to this fact, the cyber criminals are attacking this total OT atmosphere. Now we have seen the oil pipeline or the most important semiconductor manufacturing firm are being attacked from the IT facet, however in actual fact, totally on the OT facet. Subsequently the IT and OT wants introduce a brand new problem for cyber security. It’s because primarily as a result of digital transformation signifies that our worth chain has modified. Earlier than, the primary worth creation is coming from the fabric, the uncooked materials transforms right into a product—that’s the place the worth is being created.
However right now, the most important worth chain truly comes from the info which you could acquire and make the appropriate choice. That’s the place the most important worth being created. This digital transformation is making the businesses must do extra of that acquisition. After which connecting all this information in order that we are able to do drill down evaluation of all this information and make the appropriate choice. That’s the reason digital transformation means extra information being collected and all this information are extra linked. And the choice you’re making based mostly on this linked information are extra vital to your online business operation. Subsequently, we’re seeing that cyber safety wants to suit into this new worth chain.
Earlier than we most likely can say, oh, we defend every of the factors. The place the customers are utilizing their laptop, we defend the top level and, for servers, we defend the info within the server. However now we have to take a look at this complete worth chain and we have to have the safety in every of the info acquisition factors. Plus, we have to safe all this information when they’re linked. Subsequently, cybersecurity must evolve right into a platform view for our buyer… Seeing how their information travels within the group and the way these protections are put in place to guard [the entire] worth chain.
Subsequently, Pattern Micro provide you with [Trend Micro] Imaginative and prescient One resolution, the place we are able to have all these completely different sensors for the info acquisition factors and put it into the info lake the place we are able to analyze all of the cybersecurity incidents and current it to our buyer with the general safety posture. However, our resolution is extra alert. Probably the most worth coming from Pattern Micro Imaginative and prescient One is it [can] show you how to take advantage of vital and proper cybersecurity selections.
[Here] is an actual case which you could see—if an organization has 1000 gadgets in 24 hours interval, often you may acquire greater than 100 million uncooked logs, and this log [40 million] will likely be recognized as priceless to research. You may even drill down and say, these are the detection logs, which we often ship to a SIEM. There’s nonetheless, day-after-day, there’s 25,000 logs that you need to ship to the SIEM. It is unimaginable for any safety operations middle to take the choice based mostly on the variety of alerts and logs.
So, Pattern Micro Imaginative and prescient One, crucial worth comes from that we filtered all these hits, after which we are able to drill all the way down to solely three… Daily you’ll obtain the three most vital and summarized cyber safety occasions, the place you may see the place this assault got here from and what motion you want to take.
From greater than 100 million uncooked logs, we drill all the way down to solely the three occasions that you want to maintain. That is what we try to current to our buyer with our platform method. With Pattern Micro Imaginative and prescient One, our platform method is past know-how.
Pattern Micro has been in cybersecurity for 33 years, and naturally, we’re very pleased with our know-how benefits that we offer, or the centralized visibility we’ve got, or the [deployment], simply utilized to completely different factors. However, crucial half is not only the know-how benefit. We imagine crucial half is we are able to combine, make the most of, and we perceive our prospects’ environments and create safety that matches for our buyer.
Subsequently, our buyer will have the ability to make the most of our know-how to realize a enterprise benefit. We will perceive what business you’re in and due to this fact, what sort of safety is most crucial for your online business operation. You may obtain simpler compliance on your business sector. You may… defend your most crucial infrastructure [faster]. And due to this fact, help you all through your worth chain lifecycle. That is the worth that Pattern Micro is offering by means of [Trend Micro] Imaginative and prescient One.
Collectively, we imagine this new method, we are able to unlock higher choice to worth chain, as a result of you may…detect and reply to cyber safety occasion [faster]. By persevering with to enhance and defend your safety posture… to realize an information to choice worth stream.
Thanks very a lot. I feel within the Views occasion, we are able to all share completely different views from [around the world] and we, collectively, will create a safer cyber safety world. We hope that will help you in securing your digital transformation. Thanks.
[ad_2]