ICA
ICA
ICA Self-Defending Networks • ‘Digital antibodies’ neutralize threats • Automatically responds to threats faster than any security team can • Takes measured, targeted actions • Does not disrupt day-to-day business or damage productivity • Frees up people by providing more context – learn from responses to actions
Industry Medical Institution WannaCry Ransomware Intrusion point: Phishing email Possible purpose: File encryption ICA GLOBAL THREAT CASE STUDY - Detection of abnormal behavior - Connection to extremely rare domains - Windows OS file sharing protocol (SMB) vulnerability -Automatic detection / blocking of Ransomware - Real time and automatically - Suspicious connection made harmless within 30 seconds - Prevent ransom request
ICA Emerging Threat Example: Biometric Scanner • Biometric building access system breached • Fingerprint records taken from company network • Physical security compromised by digital attack • Hacker could alter levels of authorization • Logs edited to cover tracks
Recommend
More recommend