FireEye, Inc. | Maginot Revisited: More Real-World Results from Real-World Tests

Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. In this follow-up to our groundbreaking May 2014 report, “Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model,” we examine new data gathered in the ensuing weeks. Like France’s famed Maginot Line—an impressive but ultimately futile defense line built in the run-up to World War II to stave off a German invasion—today’s defenses are failing.

Because FireEye sensors operate behind other security layers, we have unique vantage point from which to gauge other security tools. By design, any threat observed by FireEye in the study had passed through all other security defenses.

The new data validates our original findings and identifies several new trends. Across all industry segments, 96 percent of systems were breached on average. And 27 percent of those breaches involved advanced malware. 

Download the report to learn:

  • How real-world settings gauge security tools in a way lab tests can’t
  • Why the vast majority of defense-in-depth deployments are failing
  • What industries saw the biggest increases in attacks
  • How your threat profile compares to other industry segments
  • The most frequently encountered malware families in your industry

Maginot Revisited: More Real-World Results from Real-World Tests

Complimentary Report

Download the Report

© 2017 FireEye, Inc. All rights reserved. Privacy Policy. FireEye on Facebook    FireEye on Twitter    FireEye on LinkedIn    FireEye Blog: Malware Intelligence Lab