Real data, real attacks Unlike many of these types of industry reports, our findings are based on actual deployments, in real customers. We don’t scour the headlines to see what attacks were most prevalent, or ask trade show attendees what their biggest concerns might be. Need to monitor breach methods in real production environments, then takes the anonymized data and highlights what attacks are best at thwarting or bypassing security, as well as other key trends. Defense-in-depth is dead? It appears most companies maintain a strong focus on perimeter security for network-based attacks, but aren’t doing much to prevent malicious file transfer at the network level. It would appear that file-level scanning is pushed all the way down to endpoints only, negating the defense-in-depth strategy of having multiple layers of protection across the kill chain. Additionally, we saw a high-level of successful attacks which were able to move laterally once inside networks. In f...