Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PALO ALTO, CA -- (Marketwired) -- 10/08/13 -- HP (NYSE: HPQ) today unveiled the results from a global study conducted by the Ponemon Institute, indicating that the cost, frequency and time to resolve cyberattacks continue to rise for the fourth consecutive year.(1)
Conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products, the 2013 Cost of Cyber Crime Study found that the average annualized cost of cybercrime incurred by a benchmark sample of U.S. organizations was $11.56 million,(1) representing a 78 percent increase since the initial study was conducted four years ago.(2) The results also revealed that the time it takes to resolve a cyberattack has increased by nearly 130 percent during this same period, with the average cost incurred to resolve a single attack totalling more than $1 million.(2)
The sophistication of cyberattacks has grown exponentially in recent years, as adversaries both specialize and share intelligence in order to obtain sensitive data and disrupt critical enterprise functions. According to the 2013 Cost of Cyber Crime Study, advanced security intelligence tools such as security information and event management (SIEM), network intelligence systems, and big data analytics, can significantly help to mitigate data threats and reduce the cost of cybercrime.(1)
Key findings from the 2013 study include:
"The threat landscape continues to evolve as cyberattacks grow in sophistication, frequency and financial impact," said Frank Mong, vice president and general manager, Solutions, Enterprise Security Products, HP. "For the fourth consecutive year, we have seen the cost savings that intelligent security tools and governance practices can bring to organizations, and as HP, we are committed to continuing to deliver both industry-leading solutions and research to further disrupt the threat life cycle of the adversary."
The real cost of cyberattacks
Security intelligence solutions and governance practices make the difference
"Information is a powerful weapon in an organization's cybersecurity arsenal," said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. "Based on real-world experiences and in-depth interviews with more than 1,000 security professionals around the globe, the Cost of Cyber Crime research provides valuable insights into the causes and costs of cyberattacks. The research is designed to help organizations make the most cost-effective decisions possible in minimizing the greatest risks to their companies."
In addition to the fourth annual study of U.S. companies, Ponemon conducted cybercost studies for companies in Australia, Germany, Japan and the United Kingdom for the second year in a row. A study of French companies was conducted for the first time this year. Of the countries surveyed, the U.S. sample reported the highest total average cost of cybercrime, at $11.6 million, while the Australia sample reported the lowest, at $3.7 million.(1) The global results are available in a separate report entitled, 2013 Global Report on the Cost of Cyber Crime.
Findings from the studies will be presented via webcast on Oct. 29 and 30. Details for the U.S. webinar can be found at https://www.brighttalk.com/r/ghs. Details for the EMEA and APJ webinars can be found at https://www.brighttalk.com/r/nDs and https://www.brighttalk.com/r/xDs, respectively.
With industry-leading products from ArcSight, Fortify and TippingPoint, HP delivers a comprehensive security portfolio that enables businesses to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms. With HP Enterprise Security Products, businesses are better able to disrupt the adversary, manage risk and extend their security capabilities to better protect their organizations.
Additional information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.
HP's premier EMEA client event, HP Discover, takes place Dec. 10-12 in Barcelona, Spain.
About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.
(1) "2013 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2013.
(2) Based on internal analysis of the results from the 2010-2013 "Cost of Cyber Crime Study: United States" reports from Ponemon Institute.
(3) "2012 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2012.
(4) The study defines a successful attack as one that results in the infiltration of a company's core networks or enterprise systems. It does not include a plethora of attacks that are stopped by the company's firewall defense.
(5) This year the category of malicious-insider attacks includes the cost of stolen devices.
(6) In the context of this study, an external cost is one that is created by external factors such as fines, litigation and marketability of stolen intellectual properties.
This news release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of management for future operations; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy; the impact of macroeconomic and geopolitical trends and events; the need to manage third party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Quarterly Report on Form 10-Q for the fiscal quarter ended April 30, 2013 and HP's other filings with the Securities and Exchange Commission, including HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2012. HP assumes no obligation and does not intend to update these forward-looking statements.
© 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2424762
Add to Digg Bookmark with del.icio.us Add to Newsvine
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs