Presentation is loading. Please wait.

Presentation is loading. Please wait.

Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.

Similar presentations


Presentation on theme: "Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection."— Presentation transcript:

1 telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection to where the threats are Fran Howarth Senior Analyst, Security Bloor Research

2 telling the right story Confidential © Bloor Research 2010 The realities of malware today Previously on the decline, malware threats are on the rise again Greater chance of success

3 telling the right story Confidential © Bloor Research 2010 The internet is the new perimeter “You’ve already been de-perimeterised” An alternative take on the term “de-perimeterisation”, first coined by the Jericho Forum, that describes security exploits such as internet worms and viruses that are designed to bypass the borders of organisations using web and email threats. Source: Network World

4 telling the right story Confidential © Bloor Research 2010 Reliance on email and the internet is growing 62% of people check work email over the weekend 55% of mobile email users upgraded to a new phone just to get email 59% admit to checking email from the bathroom Source: AOL email addiction survey 2009

5 telling the right story Confidential © Bloor Research 2010 Today’s ubiquity of communication

6 telling the right story Confidential © Bloor Research 2010 The imperative for data security Some recent headlines: “Hacked website exposes customers’ credit card details” “State employee data accessible on website exposing names, addresses, DOB and social security numbers” “Names and social security numbers of about 5,000 accidentally posted to web” Source: DataLossDB

7 telling the right story Confidential © Bloor Research 2010 Why existing security technologies are no longer enough Too many malware variants, introduced too fast Existing mechanisms using signatures can’t cope—too long to develop and too much hassle to update all users in in-house deployments Mobile workers left out in the cold New technologies make the threats worse—social networking, Web 2.0 in general Browser as principal means of infection Hybrid threats using blended mechanisms

8 telling the right story Confidential © Bloor Research 2010 Move protection to the cloud Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering Mobile workers and remote offices Internet Corporate network at HQ Management reporting dashboard for audit Cloud-based web security Services and analysis centre Remote data centre for failover and redundancy Anti-virus Anti-spyware Anti-phishing Application blocking Policy enforcement URL filtering

9 telling the right story Confidential © Bloor Research 2010 Why the cloud makes sense XXX Organisation relies purely on perimeter defences Traffic routed via cloud-based service provider enables better, more economical protection Only good traffic reaches organisation Email and web Security provided In the cloud

10 telling the right story Confidential © Bloor Research 2010 What drove your move to SaaS? Ranked from 1 = not a factor to 5 = major driver Source: InformationWeek Analytics 2010 SaaS survey of 131 business technology Professionals using SaaS

11 telling the right story Confidential © Bloor Research 2010 Conclusions Web and email security is a necessity in today’s world where the web is a prime vector of attack Moving protection to where the threats emanate from provides better, faster protection against increasingly complex, sophisticated threats being seen Not only is the available protection provided faster and is of higher quality than traditional security technologies, but the use of cloud-based services can afford organisations with substantial cost benefits as well

12 telling the right story Confidential © Bloor Research 2010 Fran Howarth, Bloor Research fran.howarth@bloorresearch.com Thank you


Download ppt "Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection."

Similar presentations


Ads by Google