infographic: fighting cybercrime with actionable insights

2
Fighting cybercrime with actionable insights Cybercriminals use hacked or misrepresented information to exploit flaws in your business processes for their gain. Meanwhile, you suffer the consequences in the form of financial losses and damage to your reputation. $445 billion: The annual cost of cybercrime to the global economy 1 1400: The average number of cyber- attacks on an organization every week 2 $11 million: The average cost of a successful cyber-attack on an organization 3 8 months: The average length of time that a cyber- attack goes undetected 4 61% of organizations in a recent survey stated that data theft and cybercrime are the greatest threats to their reputation. 5 50% of organizations surveyed were not confident in their security programs. 5 The good news: Hidden in the same data that criminals and criminal networks are exploiting are the insights and intelligence that can be used to identify and disrupt them, and we have a solution that can help you do that. Consider these statistics. 61 % 50 % Therefore… Yet…

Upload: ibm-analytics

Post on 08-Aug-2015

74 views

Category:

Government & Nonprofit


3 download

TRANSCRIPT

Page 1: INFOGRAPHIC: Fighting cybercrime with actionable insights

Fighting cybercrime with actionable insightsCybercriminals use hacked or misrepresented information to exploit flaws in your business processes for their gain. Meanwhile, you suffer the consequences in the form of financial losses and damage to your reputation.

$445 billion: The annual cost of cybercrime to the global economy1

1400: The average number of cyber-attacks on an organization every week2

$11 million: The average cost of a successful cyber-attack on an organization3

8 months: The average length of time that a cyber-attack goes undetected4

61% of organizations in a recent survey stated that data theft and cybercrime are the greatest threats to their reputation.5

50% of organizations surveyed were not confident in their security programs.5

The good news: Hidden in the same data that criminals and criminal networks are exploiting are the insights and intelligence that can be used to identify and disrupt them, and we have a solution that can help you do that.

Consider these statistics.

61% 50%

Therefore… Yet…

Page 2: INFOGRAPHIC: Fighting cybercrime with actionable insights

1 http://www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV201406092 http://w3-01.ibm.com/sales/ssi/cgi-bin/ssialias?subtype=WH&infotype=SA&appname=GTSI_SE_TM_USEN&htmlfid=SEW03031USEN&attachment=SEW03031USEN.PDF3 http://securityaffairs.co/wordpress/18517/cyber-crime/ponemon-2013-cost-of-cyber-crime.html4 https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks1/5 http://www.securitymagazine.com/articles/print/85702-questions-to-determine-your-enterprises-cyber-attack-defenses

IBM i2® Enterprise Insight Analysis combines world-class big data advanced analytics capabilities that can be applied at speed and scale. Your organization can uncover hidden connections and insights, buried in hundreds of terabytes of all kinds of data, in near real time.

By turning big data into insights, i2 Enterprise Insight Analysis can enable smarter security decisions.

Unlocking hidden insights in the reams of big data is the key to finding the perpetrators hiding in the noise. To learn more about the i2 Enterprise Insight Analysis offering, visit the following website: ibm.com/software/products/en/enterprise-intelligence-analysis

Operational warehouse

continuously imports data and organizes

different data types from multiple sources.

Content analytics extracts useful entities and relationships from

unstructured data.

Identity and relationship

resolution reconciles duplicate entries and reveals non-obvious

relationships up to 6 levels deep.

Geospatial analytics uses geographical data for analysis.

Advanced big data analytics visualizes, analyzes and queries massive volumes of data and provides results at lightning-fast speeds.

Cyber security analytics identifies and protects against anomalies or criminal behavior in your information infrastructure.

Visualization

© Copyright IBM Corporation 2014. IBM, the IBM logo, ibm.com and i2 are trademarks of IBM Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.