4. 4
Privileged Accounts are Targeted in All
Advanced Attacks
Mandiant, M-Trends and APT1 Report
“…100% of breaches
involved stolen
credentials.”
“APT intruders…prefer to
leverage privileged accounts
where possible, such as Domain
Administrators, service accounts
with Domain privileges, local
Administrator accounts, and
privileged user accounts.”
5. 5
The Facts Speak for Themselves: You Will Be
Breached
There is no such thing as perfect security.
Attackers get smarter and change tactics all of the time.
Companies who have made responsible and sustained investments in
IT continue to be compromised.
100% 94% 416 100%
Of victims have
up-to-date
antivirus software
Of breaches are
reported by third
parties
Median number of days
advanced attackers are
on the network before
being detected
Of breaches
involved stolen
credentials
Mandiant, 2013
8. 8
Four Critical Steps to Stopping Advanced Threats
Protect and manage privileged account
credentials
Control, isolate and monitor privileged access
and activity on servers and databases
Use real-time privileged account analytics to
detect and respond to in-progress attacks
Discover all of your privileged accounts