telling the right story confidential © bloor research 2010 …optimise your it investments click to...
TRANSCRIPT
telling the right storyConfidential © Bloor Research 2010 …optimise your IT investments
Click to edit Master subtitle style
Malware—taking protectionto where the threats are
Fran HowarthSenior Analyst, SecurityBloor Research
telling the right storyConfidential © Bloor Research 2010
The realities of malware today
40
45
50
55
60
65
70
75
80
% respondents faced malware threat in past year
Previously on the decline, malware threats are on the rise again
Greater chanceof success
telling the right storyConfidential © Bloor Research 2010
The internet is the new perimeter
“You’ve already been de-perimeterised”
An alternative take on the term “de-perimeterisation”, first coined by the Jericho Forum, that describes security exploits such as internet worms and viruses thatare designed to bypass the borders of organisations using web and email threats.
Source: Network World
telling the right storyConfidential © Bloor Research 2010
Reliance on email and theinternet is growing
62% of people check work email over the weekend
55% of mobile email users upgraded to a new phone just to get email
59% admit to checking email from the bathroom
Source: AOL email addiction survey 2009
telling the right storyConfidential © Bloor Research 2010
The imperative for data security
Some recent headlines:
“Hacked website exposes customers’ credit card details”
“State employee data accessible on website exposing names, addresses, DOB and social security numbers”
“Names and social security numbers of about 5,000 accidentally posted to web”
Source: DataLossDB
telling the right storyConfidential © Bloor Research 2010
Why existing securitytechnologies are no longer enough
Too many malware variants, introduced too fast
Existing mechanisms using signatures can’t cope—too long to develop and too much hassle to update all users in in-house deployments
Mobile workers left out in the cold
New technologies make the threats worse—social networking, Web 2.0 in general
Browser as principal means of infection
Hybrid threats using blended mechanisms
telling the right storyConfidential © Bloor Research 2010
Move protection to the cloud
Anti-virusAnti-spywareAnti-phishingApplication blockingPolicy enforcementURL filtering
Mobile workers and
remote offices
Internet Corporate networkat HQ
Management reporting
dashboard for audit
Cloud-based web security Services and
analysis centre
Remote data centrefor failover and
redundancy
Anti-virusAnti-spywareAnti-phishingApplication blockingPolicy enforcementURL filtering
telling the right storyConfidential © Bloor Research 2010
Why the cloud makes sense
X X X
Organisation relies purely on perimeter defences
Traffic routed via cloud-based service provider enablesbetter, more economical protection
Only good traffic reaches organisation
Email and webSecurity providedIn the cloud
telling the right storyConfidential © Bloor Research 2010
What drove your move to SaaS?
0 2 4 6 8 10 12
Ranked from 1 = not a factor to 5 = major driver
Source: InformationWeek Analytics 2010 SaaS survey of131 business technology Professionals using SaaS
telling the right storyConfidential © Bloor Research 2010
Conclusions
Web and email security is a necessity in today’s world where the web is a prime vector of attack
Moving protection to where the threats emanate from provides better, faster protection against increasingly complex, sophisticated threats being seen
Not only is the available protection provided faster and is of higher quality than traditional security technologies, but the use of cloud-based services can afford organisations with substantial cost benefits as well
telling the right storyConfidential © Bloor Research 2010
Fran Howarth, Bloor Research
Thank you