Building a Security Services Business Case. Robin Gareiss Executive Vice President & Founding Partner

Size: px
Start display at page:

Download "Building a Security Services Business Case. Robin Gareiss Executive Vice President & Founding Partner www.nemertes.com"

Transcription

1 Building a Security Services Business Case Robin Gareiss Executive Vice President & Founding Partner

2 Agenda About Nemertes The Security Services Landscape and Drivers Best Practices for ROI and Business Case Example: Network Based Firewall Service Bottom Line

3 Nemertes: Bridging the Gap Between Business & IT Quantifies the business impact of emerging technologies Conducts in-depth interviews with IT professionals Advises businesses on critical issues such as: Unified Communications Social Computing Data Centers & Cloud Computing Security Next-generation WANs Cost models, RFPs, Architectures, Strategies

4 Security Services Reality Check Will security services meet the corporate risk profile? What services are best to outsource? h Straight forward functions like firewalls versus complex and customized functions like identity management Does the corporate culture work with security outsourcing? h Structured versus ad hoc operations h Distributed versus centralized operations How does outsourcer skill set compare to internal resources?

5 Security Services Landscape Premise-Based Hybrid Cloud Web Application Security Managed IDS/IPS Endpoint Security Security Information & Event Management (SIEM) Endpoint Security Data Leak Preventio n (DLP) Anti-X & Content Inspectio n Web Application Security Endpoint Security Vulnerability & Compliance Management Anti-X X& Content Inspectio n Managed Firewall Managed FW/IDS/IPS Managed Firewall/IPS & DDoS

6 Security: Drivers for Managed Security Services

7 Best Practices for Security Services ROI Model Determine candidate security functions to outsource h Focus on compliance, control, and organizational culture Look for measurable security functions h Skill level of person required h Frequency of tasks h Time associated with task Assess opportunity costs h What else can these people be doing?

8 Steps for Success

9 Example: Network Based Firewall Service Baseline Requirements: Number of employees using the service? Loaded cost of engineering staff? Current Security Operations Center (SOC) staffing versus desired SOC staffing? h Full-time versus 9-5, Monday - Friday Net Present Value (NPV), Depreciation Method and Amortization Period?

10 Network Based Firewall Service

11 Capital Costs Cost Quantity Annual Total Premise Firewall $ 7,875 4 $ 31,500 Depreciation Year 1 $ 2,500 4 $ 10,000 Depreciation Year 2 $ 3,333 4 $ 13,332 Depreciation Year 3 $ 1,112 4 $ 4,448 Depreciation Year 4 $ $ 2,220

12 Operational Costs Quantity Time (Hours) Total Hours Annual Cost Maximum rules in FW ACL 30 Number of on-premise firewalls 4 Number of rule changes per year $ 30,080* Number of patches per firewall/year $ 9,024* Time to implement new firewall 8 Annual Internet Bandwidth (Assume $500/month) 4 $ 24,000 Annual HW/SW $1,775/year 4 $ 7,100 Number of SOC Engineers (24 x 7) 5 $ 450,000* *Assumes Engineer Unloaded Salary of $90,000

13 Outsourcing Costs Monthly Fee Low High Average Typical Network Based Firewall Service $14,000 $20,000 $17,000* Includes 4 T1 Service No on-premise equipment Full-time SOC Support *Fees assessed from multiple NBFWS providers

14 Putting it all Together Return DIY NBFWS Year One CapEx $ 41,500 $ 0 Year 2 CapEx $ 13,332 $ 0 Year 3 CapEx $ 4, $ 0 Annual OpEx $ 520,204 $ 384,000* First Year Total $ 561,704 $ 384, Year Return $ 177,704 Second Year Total $ 533,536 $ 384, Year Return $ 327,240 Third Year Total $ 524,652 $ 384, Year Return $ 467,892 * Assumes two security staff remain to support non-firewall functions (M-F, 9-5)

15 Bottom Line Evaluate compliance, culture and operational environment before choosing candidate services Assess outsourcing effect on risk posture Choose services with measurable tasks h Quantize and quantify h Be realistic Focus on outsourcing as a means to maximize security staff skill set Outsource functions that require 24x7 SOC operations

16 Thank You Robin Gareiss Executive Vice President & Founding Partner

Security Services Business Case. Robin Gareiss Executive Vice President & Sr. Founding Partner www.nemertes.com

Security Services Business Case. Robin Gareiss Executive Vice President & Sr. Founding Partner www.nemertes.com Security Services Business Case Robin Gareiss Executive Vice President & Sr. Founding Partner www.nemertes.com Agenda About Nemertes The Security Services Landscape and Drivers Best Practices for ROI and

More information

Network-Based Firewall: Extending the Firewall into the Cloud

Network-Based Firewall: Extending the Firewall into the Cloud Network-Based Firewall: Extending the Firewall into the Cloud By Ted Ritter, CISSP, senior analyst, Nemertes Research Executive Summary Network-based firewall services (NBFW) are gaining momentum. By their

More information

The Evolving Security Landscape. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com

The Evolving Security Landscape. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com The Evolving Security Landscape Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Security and Compliance Trends Technology Overview and Business Drivers

More information

Business Risk Assessment - A Primer

Business Risk Assessment - A Primer The Evolving Security Landscape: Technology Overview and Business Drivers Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Technology Overview and

More information

Dt Data Center Best Practices: Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com

Dt Data Center Best Practices: Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Dt Data Center Best Practices: Thriving When Staff Costs Are Cut Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes The Business Problem Recommendations

More information

TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS

TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS brought to you by ISSUE PAPER TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS How Vendor Selection Impacts ROI By Robin Gareiss President, Nemertes Research Q2 15 True Cost of Ownership for Unified Communication

More information

Minimizing Costs, Maximizing Value of IP Telephony

Minimizing Costs, Maximizing Value of IP Telephony Minimizing Costs, Maximizing Value of IP Telephony By Irwin Lazar VP and Service Director, Nemertes Research Executive Summary IT leaders face the challenge of delivering improved collaboration capabilities

More information

The Evolution to Cloud Communications

The Evolution to Cloud Communications The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid

More information

The Evolution to Cloud Communications

The Evolution to Cloud Communications The Evolution to Cloud Communications The adoption of Cloud Communications by enterprises: An evolution, not a revolution Table of Contents Introduction... 1 The Emergence of Private, Public and Hybrid

More information

TRENDS IN THE THREAT LANDSCAPE

TRENDS IN THE THREAT LANDSCAPE TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day Making Leaders Successful Every Day Why & How Enterprises Are Adopting the Cloud James Staten, VP, Principal Analyst The bottom line 1. Public cloud adoption is driven by the business, not IT Empowered

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Do More with MPLS: A Foundation for Security

Do More with MPLS: A Foundation for Security Do More with MPLS: A Foundation for Security By John E. Burke Principal Research Analyst, Nemertes Research Executive Summary Organizations of all sizes find it a challenge to maintain the skilled staff

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

Opex vs. Capex. How your Business Can Take Advantage of Technology and Increase ROI. www.ipromedia.us

Opex vs. Capex. How your Business Can Take Advantage of Technology and Increase ROI. www.ipromedia.us Opex vs. Capex How your Business Can Take Advantage of Technology and Increase ROI www.ipromedia.us Content 4 Opex vs. Capex 8 Take Advantage of Opex With a Hosted Communications System 12 How to Take

More information

Convergence: VOIP/UC Business Case. Robin Gareiss Executive Vice President, Sr. Founding Partner www.nemertes.com

Convergence: VOIP/UC Business Case. Robin Gareiss Executive Vice President, Sr. Founding Partner www.nemertes.com Convergence: VOIP/UC Business Case Robin Gareiss Executive Vice President, Sr. Founding Partner www.nemertes.com Agenda About Nemertes Business Case for VoIP & UC h Drivers h Getting Started h Team Approach

More information

The Case for Managed Security Services for Log Monitoring and Management

The Case for Managed Security Services for Log Monitoring and Management White Paper The Case for Managed Security Services for Log Monitoring and Management www.solutionary.com (866) 333-2133 The Case for Managed Security Services for Log Monitoring and Management Contents

More information

Moving PeopleSoft to the Cloud

Moving PeopleSoft to the Cloud PINPOINT SOLUTIONS FOR PROJECT DRIVEN ENTERPRISES Moving PeopleSoft to the Cloud Strategy & Selection Service 2012 www.cardinalpointsolutions.com Pinpoint Solutions for Project Driven Enterprises PeopleSoft

More information

NEC Managed Security Services

NEC Managed Security Services NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is

More information

Video Conferencing: A TCO Analysis

Video Conferencing: A TCO Analysis Video Conferencing: A TCO Analysis A Look at What Companies Really Spend By Irwin Lazar, Vice President & Research Director, Nemertes Research Philip Clarke, Research Analyst, Nemertes Research Executive

More information

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats John Burke Principal Research Analyst Nemertes Research www.nemertes.com Agenda About Nemertes

More information

Harnessing the Cloud to Maximize Unified Communications Investment. One Source Networks White Paper

Harnessing the Cloud to Maximize Unified Communications Investment. One Source Networks White Paper Harnessing the Cloud to Maximize Unified Communications Investment One Source Networks White Paper Harnessing the Cloud to Maximize Unified Communications Investment As the world becomes hyper-connected

More information

Making the Right Unified Communications Strategy Moves in a Cloud World. 3447 N. Hoyne Ave. Chicago, IL 60618 www.roinetworks.com

Making the Right Unified Communications Strategy Moves in a Cloud World. 3447 N. Hoyne Ave. Chicago, IL 60618 www.roinetworks.com Making the Right Unified Communications Strategy Moves in a Cloud World 3447 N. Hoyne Ave. Chicago, IL 60618 Phone: (312) 753-7880 (949) info@cloudsourceservices.com 248-5000 27101 www.cloudsourceservices.com

More information

DevOps: The Key to Delivering High Quality Application Services Faster

DevOps: The Key to Delivering High Quality Application Services Faster DevOps: The Key to Delivering High Quality Application Services Faster Stephen Elliot Vice President Cloud and IT Infrastructure DevOps Defined DevOps is a methodology that unifies a team including business

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

Index. Executive Summary. Cost Drivers in the Total Cost of Ownership Analysis 4. Capital expenses 4. Design and deployment costs 4.3 Ongoing infrastructure costs 5.4 Ongoing operations and support costs

More information

SECURITY IN THE CLOUD

SECURITY IN THE CLOUD Common Knowledge: Kevin Burns SECURITY IN THE CLOUD (aka- Insecurity in the Cloud) Real Issue: You don t know what you don t know For Instance - First Question who is responsible for securing what? Who

More information

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com Hybrid Cloud Mini Roundtable April 17, 2013 Expect Excellence www.divihn.com Today s Agenda What to expect today Introductions Plus, why are you here this evening? What is Hybrid Cloud? Why Hybrid Cloud?

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

CloudCheck Compliance Certification Program

CloudCheck Compliance Certification Program CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT WHITE PAPER AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT COST ANALYSIS OF TWO DELIVERY MODELS: SELF-MANAGED SIEM VS. MANAGED SIEM SERVICES AN EXECUTIVE S GUIDE TO BUDGETING

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Economic Benefits of Cisco CloudVerse

Economic Benefits of Cisco CloudVerse Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Aligning CFO and CIO Priorities

Aligning CFO and CIO Priorities whitepaper economics Aligning and Priorities Forward-thinking organizations are viewing computing as an investment in business transformation, not just a way to cut costs for IT. Thanks to the, s and s

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider. CIO 100, August 2015

Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider. CIO 100, August 2015 Taking the Complexity Out of Hybrid IT : Questions for Every CIO to Consider CIO 100, August 2015 Today s Presenters Wade Alt Senior Vice President Sungard Availability Services Rajeev Ankireddypalli Vice

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P.

HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P. HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY 1 INSTANT-ON ENTERPRISE Everything and everyone s connected Everyone expects immediate gratification and instant results Business & IT one and

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network

More information

TOTAL COST OF OWNERSHIP OF PANDA MANAGED OFFICE PROTECTION Learn how a SaaS Endpoint Solution reduces Operating Costs www.pandasecurity.com Pag.. Executive Summary Businesses of all sizes today are increasingly

More information

Take Your Vision to the Cloud

Take Your Vision to the Cloud Take Your Vision to the Cloud Executive Summary Many Professional Service firms are moving their Deltek Vision solution to cloud with the aim of focusing limited IT resources on core business requirements

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives Key Takeaways Economic pressures and the new expectations of users, which are being driven by the growth

More information

Outsourcing telephonic data collection, a whitepaper

Outsourcing telephonic data collection, a whitepaper Outsourcing telephonic data collection, a whitepaper Introduction The last decade has seen the MR environment change rapidly, and the pace of change is increasing every year, leading to this whitepaper:

More information

Contact Centers in the Cloud: A Better Way to Source

Contact Centers in the Cloud: A Better Way to Source Contact Centers in the Cloud: A Better Way to Source By Irwin Lazar Vice President and Service Director, Nemertes Research Executive Summary Contact Center Software as a Service (CCSaaS) solutions provide

More information

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: iselia@odysseyconsultants.com,

More information

Rose Business Technologies

Rose Business Technologies Benefits of Software as a Service (SaaS) Software as a Service (SaaS) may be defined simply as software applications deployed over the Internet. With SaaS, a third-party provider licenses an application

More information

Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI

Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI IDC ExpertROI SPOTLIGHT Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI Sponsored by: Cisco Matthew Marden December 2015 Overview Pulsant is a United Kingdom-based IT infrastructure

More information

DEMAND GENERATION: And The Cold Call STAR-Pro Methodology

DEMAND GENERATION: And The Cold Call STAR-Pro Methodology Demand Generation DEMAND GENERATION: And The Cold Call STAR-Pro Methodology There s a new era in marketing. Did you notice the paradigm shift? Or more importantly, have you actively aligned your marketing

More information

WAN Governance The Cloud Making use of it for your business

WAN Governance The Cloud Making use of it for your business Beyond the Network WAN Governance The Cloud Making use of it for your business www.ipanematech.com First Question : What is Governance? Governance relates to decisions that define expectations, grant power,

More information

Developing a Successful HANA Analytics Roadmap. Rob Jerome Director, Business Intelligence rob.j@dickinson-assoc.com @rob_jerome

Developing a Successful HANA Analytics Roadmap. Rob Jerome Director, Business Intelligence rob.j@dickinson-assoc.com @rob_jerome Developing a Successful HANA Analytics Roadmap Rob Jerome Director, Business Intelligence rob.j@dickinson-assoc.com @rob_jerome 1 We Are: Focus: Our People: Offices: Delivery of quality SAP Business Suite,

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

Federal Cyber Security Outlook for 2010

Federal Cyber Security Outlook for 2010 Federal Cyber Security Outlook for 2010 National IT Security Challenges Mounting How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

e2e Secure Cloud Connect Service - Service Definition Document

e2e Secure Cloud Connect Service - Service Definition Document e2e Secure Cloud Connect Service - Service Definition Document Overview A cloud connectivity service that connects users, devices, offices and clouds together over the Internet. Organisations can choose

More information

Delivering the New Collaboration Experience

Delivering the New Collaboration Experience Delivering the New Collaboration Experience welcome to the human network. Delivering the New Collaboration Experience The nature of work is changing rapidly. Multiple trends are causing a profound transition

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Managing Application Sprawl in the Cloud Era

Managing Application Sprawl in the Cloud Era Managing Application Sprawl in the Cloud Era Regaining visibility and control with next-generation application performance management January 2012 This paper addresses how diverse teams within the organization

More information

Saas vs. Traditional ERP: Which is Right for You?

Saas vs. Traditional ERP: Which is Right for You? Saas vs. Traditional ERP: Which is Right for You? Eric Kimberling President and Chairman Panorama Consulting Solutions www.panorama-consulting.com Phone: 720-515-1ERP Twitter: @erickimberling 1 Agenda

More information

Technology Brief Demystifying Cloud Security

Technology Brief Demystifying Cloud Security Demystifying Cloud Security xo.com Demystifying Cloud Security Contents Introduction 3 Definition of the cloud 3 Cloud security taxonomy 4 Cloud Infrastructure Security 5 Tenant- based Security 5 Security

More information

Sabre Travel Network Consulting Services

Sabre Travel Network Consulting Services Sabre Travel Network Consulting Services Unparalled Expertise Comprehensive Methodology Proven Value Sabre Travel Network Consulting Services It has never been more important to understand how your business

More information

DWSD & AT&T Contract & Services Realignment Detroit Water and Sewerage Department

DWSD & AT&T Contract & Services Realignment Detroit Water and Sewerage Department DWSD & AT&T Contract & Services Realignment Detroit Water and Sewerage Department October 8, 2014 DWSD to AT&T: provide DWSD more for less? in the mist of the perfect storm of increasing customer expectations,

More information

Cloud and VM Based Security

Cloud and VM Based Security Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]

More information

Public/Private/Hybrid Cloud: Selecting your Enterprise Strategy

Public/Private/Hybrid Cloud: Selecting your Enterprise Strategy Public/Private/Hybrid Cloud: Selecting your Enterprise Strategy 1 Agenda Cloud Computing The Business Case for Cloud Computing Technical Considerations in the Decision Summary Q&A www.mindshift.com 2 We

More information

Whitepaper WHY VOICE IN THE CLOUD

Whitepaper WHY VOICE IN THE CLOUD WHY VOICE IN THE CLOUD Why Voice in the Cloud 2 TABLE OF CONTENTS Introduction... 3 Lower Cost... 4 MINIMAL CAPITAL REQUIREMENTS... 4 COMMODITY EQUIPMENT... 4 HIGHER RESOURCE UTILIZATION... 4 PREDICTABLE

More information

IDC ExpertROI SPOTLIGHT

IDC ExpertROI SPOTLIGHT IDC ExpertROI SPOTLIGHT New Relic Yields 314% ROI for Global Technology Manufacturer Sponsored by New Relic Randy Perry September 2013 Overview As this global technology manufacturer has aggressively embraced

More information

Towards Threat Wisdom

Towards Threat Wisdom Towards Threat Wisdom Duncan Brown dbrown@idc.com @duncanwbrown What our world looks like Incidents Threats 48% 1 1mpd 2 Infections x14 3 Sources: 1. PwC, The Global State of Information Security Survey

More information

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS) MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The

More information

Delivering Security From The Cloud: Turning a Risk into a Weapon. John Pescatore SANS, Director Emerging Security Trends

Delivering Security From The Cloud: Turning a Risk into a Weapon. John Pescatore SANS, Director Emerging Security Trends Delivering Security From The Cloud: Turning a Risk into a Weapon John Pescatore SANS, Director Emerging Security Trends 1 Cloud Computing: Definition and Key Attributes A style of computing where scalable

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Agenda Problem Description Issues for Consideration Mitigation of the Issues Options

More information

Mobile Security: The good, the bad, the way forward

Mobile Security: The good, the bad, the way forward Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &

More information

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

How To Backup From Your Computer To Your Phone Or Tablet Or Computer MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

Compliance and Cloud Computing

Compliance and Cloud Computing Compliance and Cloud Computing Balaji Palanisamy Director, Southwest- US Coalfire Systems, Inc. July 24, 2014 Agenda Introduction Cloud Computing Basics Cloud Computing Threats Security vs. Compliance

More information

A leadership perspectives white paper

A leadership perspectives white paper Managed security cyber threat prevention A leadership perspectives white paper Recommended next steps for business leaders Number 5 in a series Executive Summary Enterprise IT security staffs continue

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

Capping Server Cost and Energy Use with Hybrid Cloud Computing

Capping Server Cost and Energy Use with Hybrid Cloud Computing Capping Server Cost and Energy Use with Hybrid Cloud Computing Richard Gimarc Amy Spellmann Mark Preston CA Technologies Uptime Institute RS Performance Connecticut Computer Measurement Group Friday, June

More information

Cisco Virtual Desktop Infrastructure Strategy Service

Cisco Virtual Desktop Infrastructure Strategy Service Cisco Virtual Desktop Infrastructure Strategy Service Build a Comprehensive Business Case for a Virtual Desktop Infrastructure Implementation The Cisco Virtual Desktop Infrastructure Strategy Service helps

More information

Whitepaper WHY MOVE VOICE TO THE CLOUD

Whitepaper WHY MOVE VOICE TO THE CLOUD WHY MOVE VOICE TO THE CLOUD Why Move Voice to the Cloud 2 Table of Contents Introduction... 3 Lower Cost... 4 MINIMAL CAPITAL REQUIREMENTS... 4 COMMODITY EQUIPMENT... 4 HIGHER RESOURCE UTILIZATION... 4

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information

Cyber security in healthcare

Cyber security in healthcare Cyber security in healthcare Julian Meyrick, Vice President IBM Security Services Europe julian_meyrick@uk.ibm.com Healthcare is one of the top 5 industries that continue to offer attackers the most significant

More information

Critical Success Factors for Cloud Adoption

Critical Success Factors for Cloud Adoption Critical Success Factors for Cloud Adoption George Salemie AT&T Cloud Solutions 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks

More information

Private and shared private cloud flexibility and efficiency. Olivier Quesson, Chief Commercial Officer, Orange Business Services Russia & CIS

Private and shared private cloud flexibility and efficiency. Olivier Quesson, Chief Commercial Officer, Orange Business Services Russia & CIS Private and shared private cloud flexibility and efficiency Olivier Quesson, Chief Commercial Officer, Orange Business Services Russia & CIS Cloud market today and tomorrow Global public cloud purchases

More information

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES Cyber threats continue to rapidly evolve in frequency and sophistication, posing a constant and serious threat to business organisations

More information

Unified Communications Overview

Unified Communications Overview A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a

More information

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies

More information

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Matteo Masserini Steven Kulley Tarun Sondhi Emerging Region Sales Specialist Regional Product Manager - EMEA

More information

How To Understand Cloud Economics

How To Understand Cloud Economics WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information