• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

Articles/ Forensics/ Incident Response/ Network Traffic Analysis/ Security Operations/ Threat Hunting

Reducing Remediation Costs from a Breach

Matt Alderman June 3, 2020

Data breaches are becoming more costly.  According to the 2019 Cost of a Data Breach Report, the average total cost of a data breach is $3.92 million, up 12% over the past five years.  The average size of a data breach is 25,575 records, up 3.9% from the previous year.  With these continued increases, how can organizations prepare to reduce their remediation costs in the event of a breach? 

Time is money, in more ways than one…   

Let’s start with detection and containment.  According to the report, it now takes a combined 279 days to identify and contain a breach, up from 266 in last year’s report.   However, companies able to detect and contain a breach in under 200 days spent on average $1.2 million less.

Next, let’s discuss incident response.  Having an incident response plan and testing it can have a dramatic reduction in remediation costs associated with a data breach.  The report claims that companies with an incident response plan that tested it at least twice experienced $1.23 million less in data breach costs on average than those that had neither in place.

And finally, organizations that have deployed security automation technologies generally spent just half of what organizations without such tools spent on a data breach.  All of these time savings activities add up to significant savings, but how do you capitalize on it?

This is where a solution like VIAVI adds real value.  VIAVI’s real-time threat hunting solution helps detect attackers sooner, while VIAVI’s post-breach solution accelerates response and remediation. Designed for enterprise networks, VIAVI’s solutions analyze traffic behavior over time and store full fidelity forensic-level conversations. Automated workflows and real-time visualizations arm SecOps teams with a comprehensive view of network threat landscape at a moment’s notice. These actionable insights decrease time to know and time to resolution, drastically reducing your remediation costs.

VIAVI combines NetOps and SecOps for better Network Security Intelligence using these unique capabilities:

  • Global threat identification with scope and impact in a real-time threat map
  • Host and service profiling that notifies and records details of hosts/services falling outside their normal behavior profile
  • Full-fidelity forensic reconstruction of packet and flow-based data
  • Enriched Flow records that illustrate relationships between User, IP, MAC address, and application usage in the network.

To learn more about VIAVI, watch the interview on Enterprise Security Weekly here or visit securityweekly.com/VIAVI for more information.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

uptrend line arrows with bar chart in stock market on blue color background

Articles /

Ransomware Damage Claims Driving Insurance Hikes

Cloud Mirroring

Forensics /

Cloud Native Network Detection and Response

istockphoto-901681690-612x612

Incident Response /

How The Best Defense Gets Better: Part 2

‹ Protecting Your Application from Abuse › Packet Collection and Analysis at Scale

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes