SCIT Labs Inc.
The Verizon Business Data Breaches Investigative Report divides a typical incidence into three stages – Point of Entry to Compromise, Compromise to Discovery and Discovery to Containment. Less than 11% of the data breaches were discovered in less than a day: 22% of breaches were discovered in days, 24% in weeks, 37% in months and 7% in years.
Discovery to Containment also takes a long time. The Verizon study, notes that only in 13% of the cases was containment completed in less than 1 day: 32% in days, 24% in weeks, 29% in months and 3% in years.
The compromise duration of a SCIT server can be less than 1 minute. SCIT servers are set up to recover automatically. Thus a SCIT server can be set up to reduce the time from discovery to containment to less than 1 minute.