Building a Security Services Business Case. Robin Gareiss Executive Vice President & Founding Partner
|
|
- Constance Parrish
- 8 years ago
- Views:
Transcription
1 Building a Security Services Business Case Robin Gareiss Executive Vice President & Founding Partner
2 Agenda About Nemertes The Security Services Landscape and Drivers Best Practices for ROI and Business Case Example: Network Based Firewall Service Bottom Line
3 Nemertes: Bridging the Gap Between Business & IT Quantifies the business impact of emerging technologies Conducts in-depth interviews with IT professionals Advises businesses on critical issues such as: Unified Communications Social Computing Data Centers & Cloud Computing Security Next-generation WANs Cost models, RFPs, Architectures, Strategies
4 Security Services Reality Check Will security services meet the corporate risk profile? What services are best to outsource? h Straight forward functions like firewalls versus complex and customized functions like identity management Does the corporate culture work with security outsourcing? h Structured versus ad hoc operations h Distributed versus centralized operations How does outsourcer skill set compare to internal resources?
5 Security Services Landscape Premise-Based Hybrid Cloud Web Application Security Managed IDS/IPS Endpoint Security Security Information & Event Management (SIEM) Endpoint Security Data Leak Preventio n (DLP) Anti-X & Content Inspectio n Web Application Security Endpoint Security Vulnerability & Compliance Management Anti-X X& Content Inspectio n Managed Firewall Managed FW/IDS/IPS Managed Firewall/IPS & DDoS
6 Security: Drivers for Managed Security Services
7 Best Practices for Security Services ROI Model Determine candidate security functions to outsource h Focus on compliance, control, and organizational culture Look for measurable security functions h Skill level of person required h Frequency of tasks h Time associated with task Assess opportunity costs h What else can these people be doing?
8 Steps for Success
9 Example: Network Based Firewall Service Baseline Requirements: Number of employees using the service? Loaded cost of engineering staff? Current Security Operations Center (SOC) staffing versus desired SOC staffing? h Full-time versus 9-5, Monday - Friday Net Present Value (NPV), Depreciation Method and Amortization Period?
10 Network Based Firewall Service
11 Capital Costs Cost Quantity Annual Total Premise Firewall $ 7,875 4 $ 31,500 Depreciation Year 1 $ 2,500 4 $ 10,000 Depreciation Year 2 $ 3,333 4 $ 13,332 Depreciation Year 3 $ 1,112 4 $ 4,448 Depreciation Year 4 $ $ 2,220
12 Operational Costs Quantity Time (Hours) Total Hours Annual Cost Maximum rules in FW ACL 30 Number of on-premise firewalls 4 Number of rule changes per year $ 30,080* Number of patches per firewall/year $ 9,024* Time to implement new firewall 8 Annual Internet Bandwidth (Assume $500/month) 4 $ 24,000 Annual HW/SW $1,775/year 4 $ 7,100 Number of SOC Engineers (24 x 7) 5 $ 450,000* *Assumes Engineer Unloaded Salary of $90,000
13 Outsourcing Costs Monthly Fee Low High Average Typical Network Based Firewall Service $14,000 $20,000 $17,000* Includes 4 T1 Service No on-premise equipment Full-time SOC Support *Fees assessed from multiple NBFWS providers
14 Putting it all Together Return DIY NBFWS Year One CapEx $ 41,500 $ 0 Year 2 CapEx $ 13,332 $ 0 Year 3 CapEx $ 4, $ 0 Annual OpEx $ 520,204 $ 384,000* First Year Total $ 561,704 $ 384, Year Return $ 177,704 Second Year Total $ 533,536 $ 384, Year Return $ 327,240 Third Year Total $ 524,652 $ 384, Year Return $ 467,892 * Assumes two security staff remain to support non-firewall functions (M-F, 9-5)
15 Bottom Line Evaluate compliance, culture and operational environment before choosing candidate services Assess outsourcing effect on risk posture Choose services with measurable tasks h Quantize and quantify h Be realistic Focus on outsourcing as a means to maximize security staff skill set Outsource functions that require 24x7 SOC operations
16 Thank You Robin Gareiss Executive Vice President & Founding Partner
Security Services Business Case. Robin Gareiss Executive Vice President & Sr. Founding Partner www.nemertes.com
Security Services Business Case Robin Gareiss Executive Vice President & Sr. Founding Partner www.nemertes.com Agenda About Nemertes The Security Services Landscape and Drivers Best Practices for ROI and
More informationNetwork-Based Firewall: Extending the Firewall into the Cloud
Network-Based Firewall: Extending the Firewall into the Cloud By Ted Ritter, CISSP, senior analyst, Nemertes Research Executive Summary Network-based firewall services (NBFW) are gaining momentum. By their
More informationThe Evolving Security Landscape. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com
The Evolving Security Landscape Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Security and Compliance Trends Technology Overview and Business Drivers
More informationBusiness Risk Assessment - A Primer
The Evolving Security Landscape: Technology Overview and Business Drivers Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Technology Overview and
More informationDt Data Center Best Practices: Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com
Dt Data Center Best Practices: Thriving When Staff Costs Are Cut Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes The Business Problem Recommendations
More informationTRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS
brought to you by ISSUE PAPER TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS How Vendor Selection Impacts ROI By Robin Gareiss President, Nemertes Research Q2 15 True Cost of Ownership for Unified Communication
More informationMinimizing Costs, Maximizing Value of IP Telephony
Minimizing Costs, Maximizing Value of IP Telephony By Irwin Lazar VP and Service Director, Nemertes Research Executive Summary IT leaders face the challenge of delivering improved collaboration capabilities
More informationThe Evolution to Cloud Communications
The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid
More informationThe Evolution to Cloud Communications
The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid
More informationTRENDS IN THE THREAT LANDSCAPE
TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies
More informationMaking Leaders Successful Every Day
Making Leaders Successful Every Day Why & How Enterprises Are Adopting the Cloud James Staten, VP, Principal Analyst The bottom line 1. Public cloud adoption is driven by the business, not IT Empowered
More informationIntelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
More informationDo More with MPLS: A Foundation for Security
Do More with MPLS: A Foundation for Security By John E. Burke Principal Research Analyst, Nemertes Research Executive Summary Organizations of all sizes find it a challenge to maintain the skilled staff
More informationManaged Security Service Providers vs. SIEM Product Solutions
White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services
More informationOpex vs. Capex. How your Business Can Take Advantage of Technology and Increase ROI. www.ipromedia.us
Opex vs. Capex How your Business Can Take Advantage of Technology and Increase ROI www.ipromedia.us Content 4 Opex vs. Capex 8 Take Advantage of Opex With a Hosted Communications System 12 How to Take
More informationConvergence: VOIP/UC Business Case. Robin Gareiss Executive Vice President, Sr. Founding Partner www.nemertes.com
Convergence: VOIP/UC Business Case Robin Gareiss Executive Vice President, Sr. Founding Partner www.nemertes.com Agenda About Nemertes Business Case for VoIP & UC h Drivers h Getting Started h Team Approach
More informationThe Case for Managed Security Services for Log Monitoring and Management
White Paper The Case for Managed Security Services for Log Monitoring and Management www.solutionary.com (866) 333-2133 The Case for Managed Security Services for Log Monitoring and Management Contents
More informationMoving PeopleSoft to the Cloud
PINPOINT SOLUTIONS FOR PROJECT DRIVEN ENTERPRISES Moving PeopleSoft to the Cloud Strategy & Selection Service 2012 www.cardinalpointsolutions.com Pinpoint Solutions for Project Driven Enterprises PeopleSoft
More informationNEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
More informationVideo Conferencing: A TCO Analysis
Video Conferencing: A TCO Analysis A Look at What Companies Really Spend By Irwin Lazar, Vice President & Research Director, Nemertes Research Philip Clarke, Research Analyst, Nemertes Research Executive
More informationThe Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats
The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats John Burke Principal Research Analyst Nemertes Research www.nemertes.com Agenda About Nemertes
More informationHarnessing the Cloud to Maximize Unified Communications Investment. One Source Networks White Paper
Harnessing the Cloud to Maximize Unified Communications Investment One Source Networks White Paper Harnessing the Cloud to Maximize Unified Communications Investment As the world becomes hyper-connected
More informationMaking the Right Unified Communications Strategy Moves in a Cloud World. 3447 N. Hoyne Ave. Chicago, IL 60618 www.roinetworks.com
Making the Right Unified Communications Strategy Moves in a Cloud World 3447 N. Hoyne Ave. Chicago, IL 60618 Phone: (312) 753-7880 (949) info@cloudsourceservices.com 248-5000 27101 www.cloudsourceservices.com
More informationDevOps: The Key to Delivering High Quality Application Services Faster
DevOps: The Key to Delivering High Quality Application Services Faster Stephen Elliot Vice President Cloud and IT Infrastructure DevOps Defined DevOps is a methodology that unifies a team including business
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationInformation & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
More informationOn Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
More informationIndex. Executive Summary. Cost Drivers in the Total Cost of Ownership Analysis 4. Capital expenses 4. Design and deployment costs 4.3 Ongoing infrastructure costs 5.4 Ongoing operations and support costs
More informationSECURITY IN THE CLOUD
Common Knowledge: Kevin Burns SECURITY IN THE CLOUD (aka- Insecurity in the Cloud) Real Issue: You don t know what you don t know For Instance - First Question who is responsible for securing what? Who
More informationHybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com
Hybrid Cloud Mini Roundtable April 17, 2013 Expect Excellence www.divihn.com Today s Agenda What to expect today Introductions Plus, why are you here this evening? What is Hybrid Cloud? Why Hybrid Cloud?
More informationAfrica Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa
More informationCloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
More informationCloud Security: Getting It Right
Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon
More informationAN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT
WHITE PAPER AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT COST ANALYSIS OF TWO DELIVERY MODELS: SELF-MANAGED SIEM VS. MANAGED SIEM SERVICES AN EXECUTIVE S GUIDE TO BUDGETING
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationEconomic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationAligning CFO and CIO Priorities
whitepaper economics Aligning and Priorities Forward-thinking organizations are viewing computing as an investment in business transformation, not just a way to cut costs for IT. Thanks to the, s and s
More informationSolutions as a Service N.Konstantinidis Technical Director - MNG
Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation
More informationTaking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider. CIO 100, August 2015
Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider CIO 100, August 2015 Today s Presenters Wade Alt Senior Vice President Sungard Availability Services Rajeev Ankireddypalli Vice
More informationBusiness Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationSIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
More informationHP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P.
HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY 1 INSTANT-ON ENTERPRISE Everything and everyone s connected Everyone expects immediate gratification and instant results Business & IT one and
More informationMcAfee Next Generation Firewall
McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationTOTAL COST OF OWNERSHIP OF PANDA MANAGED OFFICE PROTECTION Learn how a SaaS Endpoint Solution reduces Operating Costs www.pandasecurity.com Pag.. Executive Summary Businesses of all sizes today are increasingly
More informationTake Your Vision to the Cloud
Take Your Vision to the Cloud Executive Summary Many Professional Service firms are moving their Deltek Vision solution to cloud with the aim of focusing limited IT resources on core business requirements
More informationCorporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
More informationA Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives
A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives Key Takeaways Economic pressures and the new expectations of users, which are being driven by the growth
More informationOutsourcing telephonic data collection, a whitepaper
Outsourcing telephonic data collection, a whitepaper Introduction The last decade has seen the MR environment change rapidly, and the pace of change is increasing every year, leading to this whitepaper:
More informationContact Centers in the Cloud: A Better Way to Source
Contact Centers in the Cloud: A Better Way to Source By Irwin Lazar Vice President and Service Director, Nemertes Research Executive Summary Contact Center Software as a Service (CCSaaS) solutions provide
More informationClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: iselia@odysseyconsultants.com,
More informationRose Business Technologies
Benefits of Software as a Service (SaaS) Software as a Service (SaaS) may be defined simply as software applications deployed over the Internet. With SaaS, a third-party provider licenses an application
More informationPulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI
IDC ExpertROI SPOTLIGHT Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI Sponsored by: Cisco Matthew Marden December 2015 Overview Pulsant is a United Kingdom-based IT infrastructure
More informationDEMAND GENERATION: And The Cold Call STAR-Pro Methodology
Demand Generation DEMAND GENERATION: And The Cold Call STAR-Pro Methodology There s a new era in marketing. Did you notice the paradigm shift? Or more importantly, have you actively aligned your marketing
More informationWAN Governance The Cloud Making use of it for your business
Beyond the Network WAN Governance The Cloud Making use of it for your business www.ipanematech.com First Question : What is Governance? Governance relates to decisions that define expectations, grant power,
More informationDeveloping a Successful HANA Analytics Roadmap. Rob Jerome Director, Business Intelligence rob.j@dickinson-assoc.com @rob_jerome
Developing a Successful HANA Analytics Roadmap Rob Jerome Director, Business Intelligence rob.j@dickinson-assoc.com @rob_jerome 1 We Are: Focus: Our People: Offices: Delivery of quality SAP Business Suite,
More informationSecurity Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
More informationFederal Cyber Security Outlook for 2010
Federal Cyber Security Outlook for 2010 National IT Security Challenges Mounting How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informatione2e Secure Cloud Connect Service - Service Definition Document
e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose
More informationDelivering the New Collaboration Experience
Delivering the New Collaboration Experience welcome to the human network. Delivering the New Collaboration Experience The nature of work is changing rapidly. Multiple trends are causing a profound transition
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationManaging Application Sprawl in the Cloud Era
Managing Application Sprawl in the Cloud Era Regaining visibility and control with next-generation application performance management January 2012 This paper addresses how diverse teams within the organization
More informationSaas vs. Traditional ERP: Which is Right for You?
Saas vs. Traditional ERP: Which is Right for You? Eric Kimberling President and Chairman Panorama Consulting Solutions www.panorama-consulting.com Phone: 720-515-1ERP Twitter: @erickimberling 1 Agenda
More informationTechnology Brief Demystifying Cloud Security
Demystifying Cloud Security xo.com Demystifying Cloud Security Contents Introduction 3 Definition of the cloud 3 Cloud security taxonomy 4 Cloud Infrastructure Security 5 Tenant- based Security 5 Security
More informationSabre Travel Network Consulting Services
Sabre Travel Network Consulting Services Unparalled Expertise Comprehensive Methodology Proven Value Sabre Travel Network Consulting Services It has never been more important to understand how your business
More informationDWSD & AT&T Contract & Services Realignment Detroit Water and Sewerage Department
DWSD & AT&T Contract & Services Realignment Detroit Water and Sewerage Department October 8, 2014 DWSD to AT&T: provide DWSD more for less? in the mist of the perfect storm of increasing customer expectations,
More informationCloud and VM Based Security
Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]
More informationPublic/Private/Hybrid Cloud: Selecting your Enterprise Strategy
Public/Private/Hybrid Cloud: Selecting your Enterprise Strategy 1 Agenda Cloud Computing The Business Case for Cloud Computing Technical Considerations in the Decision Summary Q&A www.mindshift.com 2 We
More informationWhitepaper WHY VOICE IN THE CLOUD
WHY VOICE IN THE CLOUD Why Voice in the Cloud 2 TABLE OF CONTENTS Introduction... 3 Lower Cost... 4 MINIMAL CAPITAL REQUIREMENTS... 4 COMMODITY EQUIPMENT... 4 HIGHER RESOURCE UTILIZATION... 4 PREDICTABLE
More informationIDC ExpertROI SPOTLIGHT
IDC ExpertROI SPOTLIGHT New Relic Yields 314% ROI for Global Technology Manufacturer Sponsored by New Relic Randy Perry September 2013 Overview As this global technology manufacturer has aggressively embraced
More informationTowards Threat Wisdom
Towards Threat Wisdom Duncan Brown dbrown@idc.com @duncanwbrown What our world looks like Incidents Threats 48% 1 1mpd 2 Infections x14 3 Sources: 1. PwC, The Global State of Information Security Survey
More informationMANAGED SECURITY SERVICES (MSS)
MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The
More informationDelivering Security From The Cloud: Turning a Risk into a Weapon. John Pescatore SANS, Director Emerging Security Trends
Delivering Security From The Cloud: Turning a Risk into a Weapon John Pescatore SANS, Director Emerging Security Trends 1 Cloud Computing: Definition and Key Attributes A style of computing where scalable
More informationGlobal Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationOrganizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation
Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Agenda Problem Description Issues for Consideration Mitigation of the Issues Options
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationHow To Backup From Your Computer To Your Phone Or Tablet Or Computer
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
More informationCompliance and Cloud Computing
Compliance and Cloud Computing Balaji Palanisamy Director, Southwest- US Coalfire Systems, Inc. July 24, 2014 Agenda Introduction Cloud Computing Basics Cloud Computing Threats Security vs. Compliance
More informationA leadership perspectives white paper
Managed security cyber threat prevention A leadership perspectives white paper Recommended next steps for business leaders Number 5 in a series Executive Summary Enterprise IT security staffs continue
More informationHow to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
More informationCapping Server Cost and Energy Use with Hybrid Cloud Computing
Capping Server Cost and Energy Use with Hybrid Cloud Computing Richard Gimarc Amy Spellmann Mark Preston CA Technologies Uptime Institute RS Performance Connecticut Computer Measurement Group Friday, June
More informationCisco Virtual Desktop Infrastructure Strategy Service
Cisco Virtual Desktop Infrastructure Strategy Service Build a Comprehensive Business Case for a Virtual Desktop Infrastructure Implementation The Cisco Virtual Desktop Infrastructure Strategy Service helps
More informationWhitepaper WHY MOVE VOICE TO THE CLOUD
WHY MOVE VOICE TO THE CLOUD Why Move Voice to the Cloud 2 Table of Contents Introduction... 3 Lower Cost... 4 MINIMAL CAPITAL REQUIREMENTS... 4 COMMODITY EQUIPMENT... 4 HIGHER RESOURCE UTILIZATION... 4
More informationWho moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
More informationCyber security in healthcare
Cyber security in healthcare Julian Meyrick, Vice President IBM Security Services Europe julian_meyrick@uk.ibm.com Healthcare is one of the top 5 industries that continue to offer attackers the most significant
More informationCritical Success Factors for Cloud Adoption
Critical Success Factors for Cloud Adoption George Salemie AT&T Cloud Solutions 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks
More informationPrivate and shared private cloud flexibility and efficiency. Olivier Quesson, Chief Commercial Officer, Orange Business Services Russia & CIS
Private and shared private cloud flexibility and efficiency Olivier Quesson, Chief Commercial Officer, Orange Business Services Russia & CIS Cloud market today and tomorrow Global public cloud purchases
More information28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
More informationRETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
More informationCHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES
ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES Cyber threats continue to rapidly evolve in frequency and sophistication, posing a constant and serious threat to business organisations
More informationUnified Communications Overview
A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a
More informationWhy are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA
Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies
More informationChoosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!
Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Matteo Masserini Steven Kulley Tarun Sondhi Emerging Region Sales Specialist Regional Product Manager - EMEA
More informationHow To Understand Cloud Economics
WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More information