telling the right story confidential © bloor research 2010 …optimise your it investments click to...

12
telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection to where the threats are Fran Howarth Senior Analyst, Security Bloor Research

Upload: merry-cobb

Post on 26-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

telling the right storyConfidential © Bloor Research 2010 …optimise your IT investments

Click to edit Master subtitle style

Malware—taking protectionto where the threats are

Fran HowarthSenior Analyst, SecurityBloor Research

telling the right storyConfidential © Bloor Research 2010

The realities of malware today

40

45

50

55

60

65

70

75

80

% respondents faced malware threat in past year

Previously on the decline, malware threats are on the rise again

Greater chanceof success

telling the right storyConfidential © Bloor Research 2010

The internet is the new perimeter

“You’ve already been de-perimeterised”

An alternative take on the term “de-perimeterisation”, first coined by the Jericho Forum, that describes security exploits such as internet worms and viruses thatare designed to bypass the borders of organisations using web and email threats.

Source: Network World

telling the right storyConfidential © Bloor Research 2010

Reliance on email and theinternet is growing

62% of people check work email over the weekend

55% of mobile email users upgraded to a new phone just to get email

59% admit to checking email from the bathroom

Source: AOL email addiction survey 2009

telling the right storyConfidential © Bloor Research 2010

Today’s ubiquity of communication

telling the right storyConfidential © Bloor Research 2010

The imperative for data security

Some recent headlines:

“Hacked website exposes customers’ credit card details”

“State employee data accessible on website exposing names, addresses, DOB and social security numbers”

“Names and social security numbers of about 5,000 accidentally posted to web”

Source: DataLossDB

telling the right storyConfidential © Bloor Research 2010

Why existing securitytechnologies are no longer enough

Too many malware variants, introduced too fast

Existing mechanisms using signatures can’t cope—too long to develop and too much hassle to update all users in in-house deployments

Mobile workers left out in the cold

New technologies make the threats worse—social networking, Web 2.0 in general

Browser as principal means of infection

Hybrid threats using blended mechanisms

telling the right storyConfidential © Bloor Research 2010

Move protection to the cloud

Anti-virusAnti-spywareAnti-phishingApplication blockingPolicy enforcementURL filtering

Mobile workers and

remote offices

Internet Corporate networkat HQ

Management reporting

dashboard for audit

Cloud-based web security Services and

analysis centre

Remote data centrefor failover and

redundancy

Anti-virusAnti-spywareAnti-phishingApplication blockingPolicy enforcementURL filtering

telling the right storyConfidential © Bloor Research 2010

Why the cloud makes sense

X X X

Organisation relies purely on perimeter defences

Traffic routed via cloud-based service provider enablesbetter, more economical protection

Only good traffic reaches organisation

Email and webSecurity providedIn the cloud

telling the right storyConfidential © Bloor Research 2010

What drove your move to SaaS?

0 2 4 6 8 10 12

Ranked from 1 = not a factor to 5 = major driver

Source: InformationWeek Analytics 2010 SaaS survey of131 business technology Professionals using SaaS

telling the right storyConfidential © Bloor Research 2010

Conclusions

Web and email security is a necessity in today’s world where the web is a prime vector of attack

Moving protection to where the threats emanate from provides better, faster protection against increasingly complex, sophisticated threats being seen

Not only is the available protection provided faster and is of higher quality than traditional security technologies, but the use of cloud-based services can afford organisations with substantial cost benefits as well

telling the right storyConfidential © Bloor Research 2010

Fran Howarth, Bloor Research

[email protected]

Thank you